ew trap: 0xc001aba060 5 D0713 00:07:57.142282 786755 usertrap_amd64.go:225] [ 604: 604] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:07:57.142352 786755 usertrap_amd64.go:212] [ 604: 604] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.142373 786755 usertrap_amd64.go:122] [ 604: 604] Allocate a new trap: 0xc001aba060 6 D0713 00:07:57.142381 786755 usertrap_amd64.go:225] [ 604: 604] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:07:57.142614 786755 usertrap_amd64.go:212] [ 604: 604] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.142640 786755 usertrap_amd64.go:122] [ 604: 604] Allocate a new trap: 0xc001aba060 7 D0713 00:07:57.142651 786755 usertrap_amd64.go:225] [ 604: 604] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:07:57.142820 786755 usertrap_amd64.go:212] [ 604: 605] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.142859 786755 usertrap_amd64.go:122] [ 604: 605] Allocate a new trap: 0xc001aba060 8 D0713 00:07:57.142868 786755 usertrap_amd64.go:225] [ 604: 605] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:07:57.143052 786755 usertrap_amd64.go:212] [ 604: 605] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.143077 786755 usertrap_amd64.go:122] [ 604: 605] Allocate a new trap: 0xc001aba060 9 D0713 00:07:57.143089 786755 usertrap_amd64.go:225] [ 604: 605] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:07:57.143250 786755 usertrap_amd64.go:212] [ 604: 604] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.143275 786755 usertrap_amd64.go:122] [ 604: 604] Allocate a new trap: 0xc001aba060 10 D0713 00:07:57.143286 786755 usertrap_amd64.go:225] [ 604: 604] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:07:57.151967 786755 usertrap_amd64.go:212] [ 604: 604] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.151994 786755 usertrap_amd64.go:122] [ 604: 604] Allocate a new trap: 0xc001aba060 11 D0713 00:07:57.152004 786755 usertrap_amd64.go:225] [ 604: 604] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:07:57.154341 786755 usertrap_amd64.go:212] [ 604: 605] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.154364 786755 usertrap_amd64.go:122] [ 604: 605] Allocate a new trap: 0xc001aba060 12 D0713 00:07:57.154377 786755 usertrap_amd64.go:225] [ 604: 605] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:07:57.154425 786755 usertrap_amd64.go:212] [ 604: 605] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.154443 786755 usertrap_amd64.go:122] [ 604: 605] Allocate a new trap: 0xc001aba060 13 D0713 00:07:57.154451 786755 usertrap_amd64.go:225] [ 604: 605] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:07:57.154467 786755 task_signals.go:470] [ 604: 604] Notified of signal 23 D0713 00:07:57.154529 786755 task_signals.go:220] [ 604: 604] Signal 23: delivering to handler D0713 00:07:57.162223 786755 usertrap_amd64.go:212] [ 604: 604] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.162250 786755 usertrap_amd64.go:122] [ 604: 604] Allocate a new trap: 0xc001aba060 14 D0713 00:07:57.162260 786755 usertrap_amd64.go:225] [ 604: 604] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:07:57.162317 786755 task_exit.go:204] [ 604: 604] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.162345 786755 task_exit.go:204] [ 604: 604] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.162348 786755 task_signals.go:204] [ 604: 606] Signal 604, PID: 606, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.162363 786755 task_signals.go:204] [ 604: 605] Signal 604, PID: 605, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.162378 786755 task_exit.go:204] [ 604: 606] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.162371 786755 task_signals.go:204] [ 604: 608] Signal 604, PID: 608, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.162384 786755 task_signals.go:204] [ 604: 607] Signal 604, PID: 607, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.162390 786755 task_exit.go:204] [ 604: 606] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.162414 786755 task_exit.go:204] [ 604: 606] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.162430 786755 task_exit.go:204] [ 604: 608] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.162440 786755 task_exit.go:204] [ 604: 608] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.162447 786755 task_exit.go:204] [ 604: 608] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.162456 786755 task_exit.go:204] [ 604: 605] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.162465 786755 task_exit.go:204] [ 604: 605] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.162470 786755 task_exit.go:204] [ 604: 605] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.162481 786755 task_exit.go:204] [ 604: 607] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.163758 786755 task_exit.go:204] [ 604: 607] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.163774 786755 task_exit.go:204] [ 604: 607] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.163792 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.163820 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.163842 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.163912 786755 task_exit.go:204] [ 604: 604] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.166062 786755 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.167564 786755 syscalls.go:262] [ 609: 609] Allocating stack with size of 8388608 bytes D0713 00:07:57.167692 786755 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.168364 786755 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.168482 786755 usertrap_amd64.go:106] [ 609: 609] Map a usertrap vma at 61000 D0713 00:07:57.169734 786755 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc001a423c0 1 D0713 00:07:57.169834 786755 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:07:57.170842 786755 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.170864 786755 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc001a423c0 2 D0713 00:07:57.170875 786755 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:07:57.171468 786755 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.171490 786755 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc001a423c0 3 D0713 00:07:57.171501 786755 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:07:57.177982 786755 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.178009 786755 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc001a423c0 4 D0713 00:07:57.178019 786755 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:07:57.179433 786755 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.179459 786755 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc001a423c0 5 D0713 00:07:57.179471 786755 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:07:57.179510 786755 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.179528 786755 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc001a423c0 6 D0713 00:07:57.179538 786755 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:07:57.179756 786755 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.179778 786755 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc001a423c0 7 D0713 00:07:57.179787 786755 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:07:57.179963 786755 usertrap_amd64.go:212] [ 609: 610] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.179991 786755 usertrap_amd64.go:122] [ 609: 610] Allocate a new trap: 0xc001a423c0 8 D0713 00:07:57.180004 786755 usertrap_amd64.go:225] [ 609: 610] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:07:57.180236 786755 usertrap_amd64.go:212] [ 609: 610] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.180253 786755 usertrap_amd64.go:122] [ 609: 610] Allocate a new trap: 0xc001a423c0 9 D0713 00:07:57.180263 786755 usertrap_amd64.go:225] [ 609: 610] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:07:57.180328 786755 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.180365 786755 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc001a423c0 10 D0713 00:07:57.180377 786755 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:07:57.188194 786755 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.188225 786755 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc001a423c0 11 D0713 00:07:57.188238 786755 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:07:57.191565 786755 usertrap_amd64.go:212] [ 609: 610] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.191594 786755 usertrap_amd64.go:122] [ 609: 610] Allocate a new trap: 0xc001a423c0 12 D0713 00:07:57.191607 786755 usertrap_amd64.go:225] [ 609: 610] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:07:57.191708 786755 usertrap_amd64.go:212] [ 609: 610] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.191736 786755 usertrap_amd64.go:122] [ 609: 610] Allocate a new trap: 0xc001a423c0 13 D0713 00:07:57.191746 786755 usertrap_amd64.go:225] [ 609: 610] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:07:57.191781 786755 task_signals.go:470] [ 609: 609] Notified of signal 23 D0713 00:07:57.191839 786755 task_signals.go:220] [ 609: 609] Signal 23: delivering to handler I0713 00:07:57.200110 786755 compat.go:120] Unsupported syscall ioperm(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioperm for more information. D0713 00:07:57.200189 786755 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.200204 786755 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc001a423c0 14 D0713 00:07:57.200215 786755 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:07:57.200277 786755 task_exit.go:204] [ 609: 609] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.200324 786755 task_exit.go:204] [ 609: 609] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.200350 786755 task_signals.go:204] [ 609: 612] Signal 609, PID: 612, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.200344 786755 task_signals.go:204] [ 609: 611] Signal 609, PID: 611, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.200366 786755 task_exit.go:204] [ 609: 612] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.200373 786755 task_signals.go:204] [ 609: 613] Signal 609, PID: 613, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.200387 786755 task_exit.go:204] [ 609: 612] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.200409 786755 task_exit.go:204] [ 609: 612] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.200428 786755 task_signals.go:204] [ 609: 614] Signal 609, PID: 614, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.200456 786755 task_exit.go:204] [ 609: 614] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.200465 786755 task_signals.go:204] [ 609: 610] Signal 609, PID: 610, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.200479 786755 task_exit.go:204] [ 609: 614] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.200492 786755 task_exit.go:204] [ 609: 614] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.200506 786755 task_exit.go:204] [ 609: 613] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.200524 786755 task_exit.go:204] [ 609: 613] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.200540 786755 task_exit.go:204] [ 609: 613] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.200551 786755 task_exit.go:204] [ 609: 610] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.200560 786755 task_exit.go:204] [ 609: 610] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.200566 786755 task_exit.go:204] [ 609: 610] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.200574 786755 task_exit.go:204] [ 609: 611] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.201942 786755 task_exit.go:204] [ 609: 611] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.201974 786755 task_exit.go:204] [ 609: 611] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.201990 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.202041 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.202068 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.202122 786755 task_exit.go:204] [ 609: 609] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.202925 786755 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.205010 786755 syscalls.go:262] [ 615: 615] Allocating stack with size of 8388608 bytes D0713 00:07:57.205303 786755 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.206587 786755 usertrap_amd64.go:212] [ 615: 615] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.206628 786755 usertrap_amd64.go:106] [ 615: 615] Map a usertrap vma at 62000 D0713 00:07:57.206710 786755 usertrap_amd64.go:122] [ 615: 615] Allocate a new trap: 0xc0008b4360 1 D0713 00:07:57.206743 786755 usertrap_amd64.go:225] [ 615: 615] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:07:57.207009 786755 usertrap_amd64.go:212] [ 615: 615] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.207068 786755 usertrap_amd64.go:122] [ 615: 615] Allocate a new trap: 0xc0008b4360 2 D0713 00:07:57.207089 786755 usertrap_amd64.go:225] [ 615: 615] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:07:57.207839 786755 usertrap_amd64.go:212] [ 615: 615] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.207864 786755 usertrap_amd64.go:122] [ 615: 615] Allocate a new trap: 0xc0008b4360 3 D0713 00:07:57.207881 786755 usertrap_amd64.go:225] [ 615: 615] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:07:57.213899 786755 usertrap_amd64.go:212] [ 615: 615] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.213973 786755 usertrap_amd64.go:122] [ 615: 615] Allocate a new trap: 0xc0008b4360 4 D0713 00:07:57.214000 786755 usertrap_amd64.go:225] [ 615: 615] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:07:57.215208 786755 usertrap_amd64.go:212] [ 615: 615] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.215255 786755 usertrap_amd64.go:122] [ 615: 615] Allocate a new trap: 0xc0008b4360 5 D0713 00:07:57.215270 786755 usertrap_amd64.go:225] [ 615: 615] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:07:57.215492 786755 usertrap_amd64.go:212] [ 615: 615] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.215520 786755 usertrap_amd64.go:122] [ 615: 615] Allocate a new trap: 0xc0008b4360 6 D0713 00:07:57.215532 786755 usertrap_amd64.go:225] [ 615: 615] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:07:57.216000 786755 usertrap_amd64.go:212] [ 615: 615] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.216028 786755 usertrap_amd64.go:122] [ 615: 615] Allocate a new trap: 0xc0008b4360 7 D0713 00:07:57.216040 786755 usertrap_amd64.go:225] [ 615: 615] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:07:57.216305 786755 usertrap_amd64.go:212] [ 615: 616] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.216332 786755 usertrap_amd64.go:122] [ 615: 616] Allocate a new trap: 0xc0008b4360 8 D0713 00:07:57.216344 786755 usertrap_amd64.go:225] [ 615: 616] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:07:57.216512 786755 usertrap_amd64.go:212] [ 615: 616] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.216536 786755 usertrap_amd64.go:122] [ 615: 616] Allocate a new trap: 0xc0008b4360 9 D0713 00:07:57.216547 786755 usertrap_amd64.go:225] [ 615: 616] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:07:57.216684 786755 usertrap_amd64.go:212] [ 615: 615] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.216709 786755 usertrap_amd64.go:122] [ 615: 615] Allocate a new trap: 0xc0008b4360 10 D0713 00:07:57.216720 786755 usertrap_amd64.go:225] [ 615: 615] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:07:57.217745 786755 usertrap_amd64.go:212] [ 615: 616] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.217771 786755 usertrap_amd64.go:122] [ 615: 616] Allocate a new trap: 0xc0008b4360 11 D0713 00:07:57.217789 786755 usertrap_amd64.go:225] [ 615: 616] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:07:57.217847 786755 usertrap_amd64.go:212] [ 615: 616] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.217858 786755 usertrap_amd64.go:122] [ 615: 616] Allocate a new trap: 0xc0008b4360 12 D0713 00:07:57.217868 786755 usertrap_amd64.go:225] [ 615: 616] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:07:57.217903 786755 task_signals.go:470] [ 615: 615] Notified of signal 23 D0713 00:07:57.218015 786755 task_signals.go:220] [ 615: 615] Signal 23: delivering to handler D0713 00:07:57.225606 786755 usertrap_amd64.go:212] [ 615: 615] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.225635 786755 usertrap_amd64.go:122] [ 615: 615] Allocate a new trap: 0xc0008b4360 13 D0713 00:07:57.225649 786755 usertrap_amd64.go:225] [ 615: 615] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:07:57.230501 786755 task_signals.go:470] [ 615: 615] Notified of signal 23 D0713 00:07:57.230591 786755 task_signals.go:220] [ 615: 615] Signal 23: delivering to handler I0713 00:07:57.240755 786755 compat.go:120] Unsupported syscall iopl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/iopl for more information. D0713 00:07:57.240823 786755 usertrap_amd64.go:212] [ 615: 615] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.240837 786755 usertrap_amd64.go:122] [ 615: 615] Allocate a new trap: 0xc0008b4360 14 D0713 00:07:57.240851 786755 usertrap_amd64.go:225] [ 615: 615] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:07:57.240923 786755 task_exit.go:204] [ 615: 615] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.241000 786755 task_exit.go:204] [ 615: 615] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.241002 786755 task_signals.go:204] [ 615: 616] Signal 615, PID: 616, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.241024 786755 task_signals.go:204] [ 615: 618] Signal 615, PID: 618, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.241020 786755 task_signals.go:204] [ 615: 617] Signal 615, PID: 617, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.241046 786755 task_exit.go:204] [ 615: 616] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.241131 786755 task_signals.go:204] [ 615: 619] Signal 615, PID: 619, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.241169 786755 task_exit.go:204] [ 615: 616] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.241186 786755 task_exit.go:204] [ 615: 616] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.241203 786755 task_exit.go:204] [ 615: 618] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.241213 786755 task_exit.go:204] [ 615: 618] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.241227 786755 task_exit.go:204] [ 615: 618] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.241237 786755 task_exit.go:204] [ 615: 617] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.241244 786755 task_exit.go:204] [ 615: 617] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.241256 786755 task_exit.go:204] [ 615: 617] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.241270 786755 task_exit.go:204] [ 615: 619] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.242889 786755 task_exit.go:204] [ 615: 619] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.242977 786755 task_exit.go:204] [ 615: 619] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.242998 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.243069 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.243099 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.243143 786755 task_exit.go:204] [ 615: 615] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.243965 786755 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.246385 786755 syscalls.go:262] [ 620: 620] Allocating stack with size of 8388608 bytes D0713 00:07:57.246603 786755 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.247861 786755 usertrap_amd64.go:212] [ 620: 620] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.247912 786755 usertrap_amd64.go:106] [ 620: 620] Map a usertrap vma at 66000 D0713 00:07:57.248063 786755 usertrap_amd64.go:122] [ 620: 620] Allocate a new trap: 0xc00158e840 1 D0713 00:07:57.248103 786755 usertrap_amd64.go:225] [ 620: 620] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:07:57.248619 786755 usertrap_amd64.go:212] [ 620: 620] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.248650 786755 usertrap_amd64.go:122] [ 620: 620] Allocate a new trap: 0xc00158e840 2 D0713 00:07:57.248667 786755 usertrap_amd64.go:225] [ 620: 620] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:07:57.249444 786755 usertrap_amd64.go:212] [ 620: 620] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.249476 786755 usertrap_amd64.go:122] [ 620: 620] Allocate a new trap: 0xc00158e840 3 D0713 00:07:57.249497 786755 usertrap_amd64.go:225] [ 620: 620] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:07:57.256463 786755 usertrap_amd64.go:212] [ 620: 620] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.256498 786755 usertrap_amd64.go:122] [ 620: 620] Allocate a new trap: 0xc00158e840 4 D0713 00:07:57.256514 786755 usertrap_amd64.go:225] [ 620: 620] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:07:57.257824 786755 usertrap_amd64.go:212] [ 620: 620] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.257849 786755 usertrap_amd64.go:122] [ 620: 620] Allocate a new trap: 0xc00158e840 5 D0713 00:07:57.257866 786755 usertrap_amd64.go:225] [ 620: 620] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:07:57.258001 786755 usertrap_amd64.go:212] [ 620: 620] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.258012 786755 usertrap_amd64.go:122] [ 620: 620] Allocate a new trap: 0xc00158e840 6 D0713 00:07:57.258022 786755 usertrap_amd64.go:225] [ 620: 620] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:07:57.258613 786755 usertrap_amd64.go:212] [ 620: 620] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.258644 786755 usertrap_amd64.go:122] [ 620: 620] Allocate a new trap: 0xc00158e840 7 D0713 00:07:57.258656 786755 usertrap_amd64.go:225] [ 620: 620] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:07:57.260999 786755 usertrap_amd64.go:212] [ 620: 621] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.261031 786755 usertrap_amd64.go:122] [ 620: 621] Allocate a new trap: 0xc00158e840 8 D0713 00:07:57.261043 786755 usertrap_amd64.go:225] [ 620: 621] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:07:57.261295 786755 usertrap_amd64.go:212] [ 620: 621] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.261321 786755 usertrap_amd64.go:122] [ 620: 621] Allocate a new trap: 0xc00158e840 9 D0713 00:07:57.261332 786755 usertrap_amd64.go:225] [ 620: 621] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:07:57.261449 786755 usertrap_amd64.go:212] [ 620: 620] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.261474 786755 usertrap_amd64.go:122] [ 620: 620] Allocate a new trap: 0xc00158e840 10 D0713 00:07:57.261485 786755 usertrap_amd64.go:225] [ 620: 620] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:07:57.262236 786755 usertrap_amd64.go:212] [ 620: 621] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.262256 786755 usertrap_amd64.go:122] [ 620: 621] Allocate a new trap: 0xc00158e840 11 D0713 00:07:57.262267 786755 usertrap_amd64.go:225] [ 620: 621] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:07:57.262338 786755 usertrap_amd64.go:212] [ 620: 621] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.262364 786755 usertrap_amd64.go:122] [ 620: 621] Allocate a new trap: 0xc00158e840 12 D0713 00:07:57.262378 786755 usertrap_amd64.go:225] [ 620: 621] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:07:57.262456 786755 task_signals.go:470] [ 620: 620] Notified of signal 23 D0713 00:07:57.262557 786755 task_signals.go:220] [ 620: 620] Signal 23: delivering to handler D0713 00:07:57.270206 786755 usertrap_amd64.go:212] [ 620: 620] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.270271 786755 usertrap_amd64.go:122] [ 620: 620] Allocate a new trap: 0xc00158e840 13 D0713 00:07:57.270292 786755 usertrap_amd64.go:225] [ 620: 620] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:07:57.273342 786755 task_signals.go:470] [ 620: 620] Notified of signal 23 D0713 00:07:57.273384 786755 task_signals.go:220] [ 620: 620] Signal 23: delivering to handler D0713 00:07:57.273515 786755 task_signals.go:481] [ 620: 620] No task notified of signal 23 D0713 00:07:57.273546 786755 task_signals.go:220] [ 620: 620] Signal 23: delivering to handler D0713 00:07:57.273645 786755 task_signals.go:470] [ 620: 620] Notified of signal 23 D0713 00:07:57.273673 786755 task_signals.go:220] [ 620: 620] Signal 23: delivering to handler I0713 00:07:57.282639 786755 compat.go:120] Unsupported syscall ioprio_get(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_get for more information. D0713 00:07:57.282723 786755 usertrap_amd64.go:212] [ 620: 620] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.282734 786755 usertrap_amd64.go:122] [ 620: 620] Allocate a new trap: 0xc00158e840 14 D0713 00:07:57.282745 786755 usertrap_amd64.go:225] [ 620: 620] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:07:57.282816 786755 task_exit.go:204] [ 620: 620] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.282842 786755 task_exit.go:204] [ 620: 620] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.282861 786755 task_signals.go:204] [ 620: 623] Signal 620, PID: 623, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.282855 786755 task_signals.go:204] [ 620: 622] Signal 620, PID: 622, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.282873 786755 task_exit.go:204] [ 620: 623] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.282880 786755 task_exit.go:204] [ 620: 622] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.282894 786755 task_exit.go:204] [ 620: 622] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.282899 786755 task_signals.go:204] [ 620: 621] Signal 620, PID: 621, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.282901 786755 task_exit.go:204] [ 620: 622] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.282927 786755 task_signals.go:204] [ 620: 624] Signal 620, PID: 624, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.282950 786755 task_exit.go:204] [ 620: 623] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.282956 786755 task_exit.go:204] [ 620: 623] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.282966 786755 task_exit.go:204] [ 620: 621] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.282974 786755 task_exit.go:204] [ 620: 621] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.282987 786755 task_exit.go:204] [ 620: 621] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.283005 786755 task_exit.go:204] [ 620: 624] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.284838 786755 task_exit.go:204] [ 620: 624] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.284907 786755 task_exit.go:204] [ 620: 624] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.285013 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.285094 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.285107 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.285161 786755 task_exit.go:204] [ 620: 620] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.285839 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.287499 786755 syscalls.go:262] [ 625: 625] Allocating stack with size of 8388608 bytes D0713 00:07:57.287598 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.289832 786755 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.289869 786755 usertrap_amd64.go:106] [ 625: 625] Map a usertrap vma at 63000 D0713 00:07:57.289942 786755 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc001abac60 1 D0713 00:07:57.289969 786755 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:07:57.300891 786755 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.300934 786755 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc001abac60 2 D0713 00:07:57.300985 786755 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:07:57.301743 786755 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.301773 786755 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc001abac60 3 D0713 00:07:57.301786 786755 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:07:57.307727 786755 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.307755 786755 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc001abac60 4 D0713 00:07:57.307766 786755 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:07:57.309012 786755 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.309040 786755 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc001abac60 5 D0713 00:07:57.309050 786755 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:07:57.309094 786755 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.309112 786755 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc001abac60 6 D0713 00:07:57.309120 786755 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:07:57.309442 786755 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.309492 786755 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc001abac60 7 D0713 00:07:57.309509 786755 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:07:57.309689 786755 usertrap_amd64.go:212] [ 625: 626] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.309705 786755 usertrap_amd64.go:122] [ 625: 626] Allocate a new trap: 0xc001abac60 8 D0713 00:07:57.309712 786755 usertrap_amd64.go:225] [ 625: 626] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:07:57.309838 786755 usertrap_amd64.go:212] [ 625: 626] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.309849 786755 usertrap_amd64.go:122] [ 625: 626] Allocate a new trap: 0xc001abac60 9 D0713 00:07:57.309854 786755 usertrap_amd64.go:225] [ 625: 626] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:07:57.309963 786755 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.309987 786755 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc001abac60 10 D0713 00:07:57.310001 786755 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:07:57.318053 786755 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.318084 786755 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc001abac60 11 D0713 00:07:57.318096 786755 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:07:57.320796 786755 usertrap_amd64.go:212] [ 625: 626] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.320825 786755 usertrap_amd64.go:122] [ 625: 626] Allocate a new trap: 0xc001abac60 12 D0713 00:07:57.320841 786755 usertrap_amd64.go:225] [ 625: 626] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:07:57.320901 786755 usertrap_amd64.go:212] [ 625: 626] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.320924 786755 usertrap_amd64.go:122] [ 625: 626] Allocate a new trap: 0xc001abac60 13 D0713 00:07:57.320934 786755 usertrap_amd64.go:225] [ 625: 626] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:07:57.321068 786755 task_signals.go:470] [ 625: 625] Notified of signal 23 D0713 00:07:57.321155 786755 task_signals.go:220] [ 625: 625] Signal 23: delivering to handler I0713 00:07:57.329056 786755 compat.go:120] Unsupported syscall ioprio_set(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_set for more information. D0713 00:07:57.329144 786755 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.329156 786755 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc001abac60 14 D0713 00:07:57.329169 786755 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:07:57.329231 786755 task_exit.go:204] [ 625: 625] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.329263 786755 task_exit.go:204] [ 625: 625] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.329285 786755 task_signals.go:204] [ 625: 626] Signal 625, PID: 626, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.329294 786755 task_signals.go:204] [ 625: 628] Signal 625, PID: 628, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.329311 786755 task_signals.go:204] [ 625: 629] Signal 625, PID: 629, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.329321 786755 task_exit.go:204] [ 625: 626] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.329407 786755 task_signals.go:204] [ 625: 627] Signal 625, PID: 627, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.329434 786755 task_exit.go:204] [ 625: 629] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.329469 786755 task_exit.go:204] [ 625: 629] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.329480 786755 task_exit.go:204] [ 625: 629] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.329496 786755 task_exit.go:204] [ 625: 628] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.329505 786755 task_exit.go:204] [ 625: 628] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.329518 786755 task_exit.go:204] [ 625: 628] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.329529 786755 task_exit.go:204] [ 625: 627] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.329627 786755 task_exit.go:204] [ 625: 626] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.329643 786755 task_exit.go:204] [ 625: 626] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.330951 786755 task_exit.go:204] [ 625: 627] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.330986 786755 task_exit.go:204] [ 625: 627] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.331009 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.331046 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.331070 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.331156 786755 task_exit.go:204] [ 625: 625] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.332014 786755 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.333700 786755 syscalls.go:262] [ 630: 630] Allocating stack with size of 8388608 bytes D0713 00:07:57.333831 786755 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.335694 786755 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.335736 786755 usertrap_amd64.go:106] [ 630: 630] Map a usertrap vma at 60000 D0713 00:07:57.335830 786755 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc00158e9c0 1 D0713 00:07:57.335852 786755 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:07:57.336308 786755 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.336331 786755 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc00158e9c0 2 D0713 00:07:57.336341 786755 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:07:57.336858 786755 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.336882 786755 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc00158e9c0 3 D0713 00:07:57.336893 786755 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:07:57.342899 786755 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.342932 786755 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc00158e9c0 4 D0713 00:07:57.342945 786755 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:07:57.344342 786755 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.344415 786755 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc00158e9c0 5 D0713 00:07:57.344436 786755 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:07:57.344489 786755 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.344496 786755 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc00158e9c0 6 D0713 00:07:57.344513 786755 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:07:57.345217 786755 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.345248 786755 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc00158e9c0 7 D0713 00:07:57.345259 786755 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:07:57.345519 786755 usertrap_amd64.go:212] [ 630: 632] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.345545 786755 usertrap_amd64.go:122] [ 630: 632] Allocate a new trap: 0xc00158e9c0 8 D0713 00:07:57.345554 786755 usertrap_amd64.go:225] [ 630: 632] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:07:57.345714 786755 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.345744 786755 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc00158e9c0 9 D0713 00:07:57.345755 786755 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:07:57.346195 786755 usertrap_amd64.go:212] [ 630: 631] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.346219 786755 usertrap_amd64.go:122] [ 630: 631] Allocate a new trap: 0xc00158e9c0 10 D0713 00:07:57.346228 786755 usertrap_amd64.go:225] [ 630: 631] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:07:57.354436 786755 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.354479 786755 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc00158e9c0 11 D0713 00:07:57.354494 786755 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:07:57.357126 786755 usertrap_amd64.go:212] [ 630: 631] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.357154 786755 usertrap_amd64.go:122] [ 630: 631] Allocate a new trap: 0xc00158e9c0 12 D0713 00:07:57.357169 786755 usertrap_amd64.go:225] [ 630: 631] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:07:57.357263 786755 usertrap_amd64.go:212] [ 630: 631] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.357280 786755 usertrap_amd64.go:122] [ 630: 631] Allocate a new trap: 0xc00158e9c0 13 D0713 00:07:57.357346 786755 usertrap_amd64.go:225] [ 630: 631] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:07:57.358952 786755 task_signals.go:470] [ 630: 630] Notified of signal 23 D0713 00:07:57.359170 786755 task_signals.go:220] [ 630: 630] Signal 23: delivering to handler I0713 00:07:57.367095 786755 compat.go:120] Unsupported syscall kcmp(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kcmp for more information. D0713 00:07:57.367242 786755 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.367287 786755 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc00158e9c0 14 D0713 00:07:57.367325 786755 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:07:57.368118 786755 task_exit.go:204] [ 630: 630] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.368162 786755 task_exit.go:204] [ 630: 630] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.368167 786755 task_signals.go:204] [ 630: 634] Signal 630, PID: 634, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.368202 786755 task_exit.go:204] [ 630: 634] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.368221 786755 task_exit.go:204] [ 630: 634] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.368227 786755 task_exit.go:204] [ 630: 634] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.368249 786755 task_signals.go:204] [ 630: 632] Signal 630, PID: 632, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.368261 786755 task_exit.go:204] [ 630: 632] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.368262 786755 task_signals.go:204] [ 630: 631] Signal 630, PID: 631, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.368285 786755 task_signals.go:204] [ 630: 633] Signal 630, PID: 633, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.368296 786755 task_exit.go:204] [ 630: 632] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.368302 786755 task_exit.go:204] [ 630: 632] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.368313 786755 task_exit.go:204] [ 630: 631] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.368326 786755 task_exit.go:204] [ 630: 631] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.368332 786755 task_exit.go:204] [ 630: 631] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.368340 786755 task_exit.go:204] [ 630: 633] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.370074 786755 task_exit.go:204] [ 630: 633] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.370102 786755 task_exit.go:204] [ 630: 633] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.370116 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.373063 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.373097 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.373326 786755 task_exit.go:204] [ 630: 630] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.373951 786755 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.375282 786755 syscalls.go:262] [ 635: 635] Allocating stack with size of 8388608 bytes D0713 00:07:57.375410 786755 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.376274 786755 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.376331 786755 usertrap_amd64.go:106] [ 635: 635] Map a usertrap vma at 60000 D0713 00:07:57.376413 786755 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0008b4480 1 D0713 00:07:57.376499 786755 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:07:57.376858 786755 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.376924 786755 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0008b4480 2 D0713 00:07:57.376977 786755 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:07:57.377404 786755 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.377429 786755 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0008b4480 3 D0713 00:07:57.377440 786755 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:07:57.382430 786755 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.382506 786755 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0008b4480 4 D0713 00:07:57.382569 786755 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:07:57.384523 786755 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.384553 786755 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0008b4480 5 D0713 00:07:57.384572 786755 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:07:57.384614 786755 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.384623 786755 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0008b4480 6 D0713 00:07:57.384630 786755 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:07:57.384840 786755 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.384859 786755 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0008b4480 7 D0713 00:07:57.384867 786755 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:07:57.385104 786755 usertrap_amd64.go:212] [ 635: 636] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.385188 786755 usertrap_amd64.go:122] [ 635: 636] Allocate a new trap: 0xc0008b4480 8 D0713 00:07:57.385226 786755 usertrap_amd64.go:225] [ 635: 636] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:07:57.385477 786755 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.385552 786755 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0008b4480 9 D0713 00:07:57.385577 786755 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:07:57.385745 786755 usertrap_amd64.go:212] [ 635: 636] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.385802 786755 usertrap_amd64.go:122] [ 635: 636] Allocate a new trap: 0xc0008b4480 10 D0713 00:07:57.385834 786755 usertrap_amd64.go:225] [ 635: 636] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:07:57.393289 786755 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.393323 786755 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0008b4480 11 D0713 00:07:57.393335 786755 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:07:57.396837 786755 usertrap_amd64.go:212] [ 635: 636] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.396873 786755 usertrap_amd64.go:122] [ 635: 636] Allocate a new trap: 0xc0008b4480 12 D0713 00:07:57.396888 786755 usertrap_amd64.go:225] [ 635: 636] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:07:57.396969 786755 usertrap_amd64.go:212] [ 635: 636] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.396983 786755 usertrap_amd64.go:122] [ 635: 636] Allocate a new trap: 0xc0008b4480 13 D0713 00:07:57.396992 786755 usertrap_amd64.go:225] [ 635: 636] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:07:57.397021 786755 task_signals.go:470] [ 635: 635] Notified of signal 23 D0713 00:07:57.397071 786755 task_signals.go:220] [ 635: 635] Signal 23: delivering to handler I0713 00:07:57.405749 786755 compat.go:120] Unsupported syscall kexec_load(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kexec_load for more information. D0713 00:07:57.406087 786755 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.406117 786755 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0008b4480 14 D0713 00:07:57.406131 786755 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:07:57.406189 786755 task_exit.go:204] [ 635: 635] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.406223 786755 task_exit.go:204] [ 635: 635] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.406252 786755 task_signals.go:204] [ 635: 636] Signal 635, PID: 636, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.406270 786755 task_exit.go:204] [ 635: 636] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.406279 786755 task_exit.go:204] [ 635: 636] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.406283 786755 task_exit.go:204] [ 635: 636] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.406299 786755 task_signals.go:204] [ 635: 637] Signal 635, PID: 637, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.406326 786755 task_exit.go:204] [ 635: 637] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.406335 786755 task_exit.go:204] [ 635: 637] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.406342 786755 task_exit.go:204] [ 635: 637] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.406363 786755 task_signals.go:204] [ 635: 638] Signal 635, PID: 638, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.406374 786755 task_exit.go:204] [ 635: 638] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.406380 786755 task_exit.go:204] [ 635: 638] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.406385 786755 task_exit.go:204] [ 635: 638] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.406407 786755 task_signals.go:204] [ 635: 639] Signal 635, PID: 639, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.406430 786755 task_exit.go:204] [ 635: 639] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.406438 786755 task_exit.go:204] [ 635: 639] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.406445 786755 task_exit.go:204] [ 635: 639] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.406458 786755 task_signals.go:204] [ 635: 640] Signal 635, PID: 640, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.406475 786755 task_exit.go:204] [ 635: 640] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.407924 786755 task_exit.go:204] [ 635: 640] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.407965 786755 task_exit.go:204] [ 635: 640] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.407985 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.408020 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.408030 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.408137 786755 task_exit.go:204] [ 635: 635] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.408822 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.410373 786755 syscalls.go:262] [ 641: 641] Allocating stack with size of 8388608 bytes D0713 00:07:57.410529 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.413395 786755 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.413435 786755 usertrap_amd64.go:106] [ 641: 641] Map a usertrap vma at 67000 D0713 00:07:57.413533 786755 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc001a42d50 1 D0713 00:07:57.413556 786755 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:07:57.414149 786755 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.414171 786755 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc001a42d50 2 D0713 00:07:57.414179 786755 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:07:57.414887 786755 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.414904 786755 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc001a42d50 3 D0713 00:07:57.414922 786755 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:07:57.420546 786755 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.420562 786755 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc001a42d50 4 D0713 00:07:57.420577 786755 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:07:57.421653 786755 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.421679 786755 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc001a42d50 5 D0713 00:07:57.421688 786755 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:07:57.421779 786755 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.421811 786755 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc001a42d50 6 D0713 00:07:57.421829 786755 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:07:57.422133 786755 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.422157 786755 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc001a42d50 7 D0713 00:07:57.422165 786755 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:07:57.422327 786755 usertrap_amd64.go:212] [ 641: 642] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.422348 786755 usertrap_amd64.go:122] [ 641: 642] Allocate a new trap: 0xc001a42d50 8 D0713 00:07:57.422356 786755 usertrap_amd64.go:225] [ 641: 642] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:07:57.422580 786755 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.422607 786755 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc001a42d50 9 D0713 00:07:57.422622 786755 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:07:57.422724 786755 usertrap_amd64.go:212] [ 641: 642] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.422750 786755 usertrap_amd64.go:122] [ 641: 642] Allocate a new trap: 0xc001a42d50 10 D0713 00:07:57.422761 786755 usertrap_amd64.go:225] [ 641: 642] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:07:57.431572 786755 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.431659 786755 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc001a42d50 11 D0713 00:07:57.431686 786755 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:07:57.435887 786755 usertrap_amd64.go:212] [ 641: 642] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.435973 786755 usertrap_amd64.go:122] [ 641: 642] Allocate a new trap: 0xc001a42d50 12 D0713 00:07:57.435991 786755 usertrap_amd64.go:225] [ 641: 642] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:07:57.436089 786755 usertrap_amd64.go:212] [ 641: 642] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.436118 786755 usertrap_amd64.go:122] [ 641: 642] Allocate a new trap: 0xc001a42d50 13 D0713 00:07:57.436129 786755 usertrap_amd64.go:225] [ 641: 642] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:07:57.436241 786755 task_signals.go:470] [ 641: 641] Notified of signal 23 D0713 00:07:57.436358 786755 task_signals.go:220] [ 641: 641] Signal 23: delivering to handler D0713 00:07:57.445618 786755 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.445651 786755 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc001a42d50 14 D0713 00:07:57.445663 786755 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:07:57.445720 786755 task_exit.go:204] [ 641: 641] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.445755 786755 task_exit.go:204] [ 641: 641] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.445761 786755 task_signals.go:204] [ 641: 642] Signal 641, PID: 642, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.445785 786755 task_signals.go:204] [ 641: 644] Signal 641, PID: 644, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.445788 786755 task_exit.go:204] [ 641: 642] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.445808 786755 task_signals.go:204] [ 641: 643] Signal 641, PID: 643, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.445813 786755 task_signals.go:204] [ 641: 645] Signal 641, PID: 645, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.445826 786755 task_exit.go:204] [ 641: 642] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.445830 786755 task_exit.go:204] [ 641: 642] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.445841 786755 task_exit.go:204] [ 641: 644] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.445846 786755 task_exit.go:204] [ 641: 644] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.445849 786755 task_exit.go:204] [ 641: 644] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.445856 786755 task_exit.go:204] [ 641: 643] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.445860 786755 task_exit.go:204] [ 641: 643] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.445863 786755 task_exit.go:204] [ 641: 643] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.445870 786755 task_exit.go:204] [ 641: 645] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.447743 786755 task_exit.go:204] [ 641: 645] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.447773 786755 task_exit.go:204] [ 641: 645] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.447792 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.447826 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.447849 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.447929 786755 task_exit.go:204] [ 641: 641] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.448795 786755 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.450244 786755 syscalls.go:262] [ 646: 646] Allocating stack with size of 8388608 bytes D0713 00:07:57.450795 786755 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.452441 786755 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.452472 786755 usertrap_amd64.go:106] [ 646: 646] Map a usertrap vma at 65000 D0713 00:07:57.452561 786755 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00158f470 1 D0713 00:07:57.452599 786755 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:07:57.453408 786755 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.453425 786755 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00158f470 2 D0713 00:07:57.453438 786755 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:07:57.454169 786755 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.454323 786755 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00158f470 3 D0713 00:07:57.454386 786755 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:07:57.465828 786755 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.465866 786755 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00158f470 4 D0713 00:07:57.465883 786755 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:07:57.467243 786755 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.467270 786755 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00158f470 5 D0713 00:07:57.467284 786755 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:07:57.467338 786755 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.467345 786755 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00158f470 6 D0713 00:07:57.467350 786755 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:07:57.467674 786755 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.467689 786755 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00158f470 7 D0713 00:07:57.467699 786755 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:07:57.467960 786755 usertrap_amd64.go:212] [ 646: 647] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.467982 786755 usertrap_amd64.go:122] [ 646: 647] Allocate a new trap: 0xc00158f470 8 D0713 00:07:57.467991 786755 usertrap_amd64.go:225] [ 646: 647] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:07:57.468310 786755 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.468334 786755 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00158f470 9 D0713 00:07:57.468345 786755 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:07:57.468643 786755 usertrap_amd64.go:212] [ 646: 647] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.468662 786755 usertrap_amd64.go:122] [ 646: 647] Allocate a new trap: 0xc00158f470 10 D0713 00:07:57.468673 786755 usertrap_amd64.go:225] [ 646: 647] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:07:57.480415 786755 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.480449 786755 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00158f470 11 D0713 00:07:57.480462 786755 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:07:57.481045 786755 usertrap_amd64.go:212] [ 646: 647] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.481073 786755 usertrap_amd64.go:122] [ 646: 647] Allocate a new trap: 0xc00158f470 12 D0713 00:07:57.481086 786755 usertrap_amd64.go:225] [ 646: 647] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:07:57.481109 786755 usertrap_amd64.go:212] [ 646: 647] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.481115 786755 usertrap_amd64.go:122] [ 646: 647] Allocate a new trap: 0xc00158f470 13 D0713 00:07:57.481122 786755 usertrap_amd64.go:225] [ 646: 647] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:07:57.481138 786755 task_signals.go:470] [ 646: 646] Notified of signal 23 D0713 00:07:57.481209 786755 task_signals.go:220] [ 646: 646] Signal 23: delivering to handler I0713 00:07:57.492196 786755 compat.go:120] Unsupported syscall sys_445(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_445 for more information. D0713 00:07:57.492270 786755 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.492290 786755 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc00158f470 14 D0713 00:07:57.492302 786755 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:07:57.492364 786755 task_exit.go:204] [ 646: 646] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.492536 786755 task_signals.go:481] [ 646: 646] No task notified of signal 23 D0713 00:07:57.492666 786755 task_exit.go:204] [ 646: 646] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.492693 786755 task_signals.go:204] [ 646: 648] Signal 646, PID: 648, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.492723 786755 task_exit.go:204] [ 646: 648] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.492734 786755 task_signals.go:204] [ 646: 649] Signal 646, PID: 649, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.492748 786755 task_signals.go:204] [ 646: 647] Signal 646, PID: 647, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.492763 786755 task_exit.go:204] [ 646: 648] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.492779 786755 task_exit.go:204] [ 646: 648] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.492796 786755 task_signals.go:204] [ 646: 650] Signal 646, PID: 650, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.492809 786755 task_exit.go:204] [ 646: 649] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.492842 786755 task_exit.go:204] [ 646: 649] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.492858 786755 task_exit.go:204] [ 646: 649] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.492874 786755 task_exit.go:204] [ 646: 647] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.492882 786755 task_exit.go:204] [ 646: 647] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.492889 786755 task_exit.go:204] [ 646: 647] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.492898 786755 task_exit.go:204] [ 646: 650] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.494388 786755 task_exit.go:204] [ 646: 650] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.494415 786755 task_exit.go:204] [ 646: 650] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.494430 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.494509 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.494543 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.494659 786755 task_exit.go:204] [ 646: 646] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.495385 786755 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.497447 786755 syscalls.go:262] [ 651: 651] Allocating stack with size of 8388608 bytes D0713 00:07:57.497564 786755 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.499070 786755 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.499107 786755 usertrap_amd64.go:106] [ 651: 651] Map a usertrap vma at 69000 D0713 00:07:57.499168 786755 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc001281bf0 1 D0713 00:07:57.499191 786755 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:07:57.499557 786755 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.499586 786755 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc001281bf0 2 D0713 00:07:57.499597 786755 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:07:57.500990 786755 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.501017 786755 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc001281bf0 3 D0713 00:07:57.501030 786755 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:07:57.506963 786755 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.506996 786755 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc001281bf0 4 D0713 00:07:57.507008 786755 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:07:57.508123 786755 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.508151 786755 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc001281bf0 5 D0713 00:07:57.508160 786755 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:07:57.508272 786755 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.508281 786755 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc001281bf0 6 D0713 00:07:57.508289 786755 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:07:57.508454 786755 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.508463 786755 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc001281bf0 7 D0713 00:07:57.508474 786755 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:07:57.508597 786755 usertrap_amd64.go:212] [ 651: 652] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.508620 786755 usertrap_amd64.go:122] [ 651: 652] Allocate a new trap: 0xc001281bf0 8 D0713 00:07:57.508630 786755 usertrap_amd64.go:225] [ 651: 652] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:07:57.508783 786755 usertrap_amd64.go:212] [ 651: 652] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.508807 786755 usertrap_amd64.go:122] [ 651: 652] Allocate a new trap: 0xc001281bf0 9 D0713 00:07:57.508819 786755 usertrap_amd64.go:225] [ 651: 652] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:07:57.508902 786755 usertrap_amd64.go:212] [ 651: 654] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.508922 786755 usertrap_amd64.go:122] [ 651: 654] Allocate a new trap: 0xc001281bf0 10 D0713 00:07:57.508932 786755 usertrap_amd64.go:225] [ 651: 654] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:07:57.516654 786755 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.516681 786755 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc001281bf0 11 D0713 00:07:57.516694 786755 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:07:57.519427 786755 usertrap_amd64.go:212] [ 651: 652] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.519449 786755 usertrap_amd64.go:122] [ 651: 652] Allocate a new trap: 0xc001281bf0 12 D0713 00:07:57.519459 786755 usertrap_amd64.go:225] [ 651: 652] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:07:57.519489 786755 usertrap_amd64.go:212] [ 651: 652] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.519498 786755 usertrap_amd64.go:122] [ 651: 652] Allocate a new trap: 0xc001281bf0 13 D0713 00:07:57.519506 786755 usertrap_amd64.go:225] [ 651: 652] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:07:57.519556 786755 task_signals.go:470] [ 651: 651] Notified of signal 23 D0713 00:07:57.519619 786755 task_signals.go:220] [ 651: 651] Signal 23: delivering to handler I0713 00:07:57.527735 786755 compat.go:120] Unsupported syscall sys_444(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_444 for more information. D0713 00:07:57.527802 786755 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.527811 786755 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc001281bf0 14 D0713 00:07:57.527818 786755 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:07:57.527871 786755 task_exit.go:204] [ 651: 651] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.527893 786755 task_exit.go:204] [ 651: 651] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.527906 786755 task_signals.go:204] [ 651: 652] Signal 651, PID: 652, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.527914 786755 task_signals.go:204] [ 651: 654] Signal 651, PID: 654, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.527928 786755 task_signals.go:204] [ 651: 655] Signal 651, PID: 655, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.527944 786755 task_exit.go:204] [ 651: 652] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.527955 786755 task_signals.go:204] [ 651: 653] Signal 651, PID: 653, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.527982 786755 task_signals.go:204] [ 651: 656] Signal 651, PID: 656, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.528005 786755 task_exit.go:204] [ 651: 652] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.528015 786755 task_exit.go:204] [ 651: 652] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.528026 786755 task_exit.go:204] [ 651: 654] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.528042 786755 task_exit.go:204] [ 651: 654] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.528048 786755 task_exit.go:204] [ 651: 654] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.528057 786755 task_exit.go:204] [ 651: 655] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.528064 786755 task_exit.go:204] [ 651: 655] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.528075 786755 task_exit.go:204] [ 651: 655] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.528091 786755 task_exit.go:204] [ 651: 653] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.528095 786755 task_exit.go:204] [ 651: 653] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.528099 786755 task_exit.go:204] [ 651: 653] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.528104 786755 task_exit.go:204] [ 651: 656] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.529531 786755 task_exit.go:204] [ 651: 656] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.529564 786755 task_exit.go:204] [ 651: 656] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.529584 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.529656 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.529683 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.530011 786755 task_exit.go:204] [ 651: 651] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.530145 786755 task_signals.go:470] [ 6: 9] Notified of signal 23 D0713 00:07:57.530188 786755 task_signals.go:176] [ 6: 9] Not restarting syscall 35 after errno &{516 %!d(string=interrupted by signal)}: interrupted by signal 23 D0713 00:07:57.530208 786755 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:07:57.530624 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.532068 786755 syscalls.go:262] [ 657: 657] Allocating stack with size of 8388608 bytes D0713 00:07:57.532189 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.534001 786755 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.534034 786755 usertrap_amd64.go:106] [ 657: 657] Map a usertrap vma at 60000 D0713 00:07:57.534084 786755 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001a43bc0 1 D0713 00:07:57.534112 786755 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:07:57.534463 786755 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.534485 786755 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001a43bc0 2 D0713 00:07:57.534495 786755 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:07:57.535157 786755 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.535180 786755 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001a43bc0 3 D0713 00:07:57.535190 786755 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:07:57.541835 786755 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.541885 786755 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001a43bc0 4 D0713 00:07:57.541905 786755 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:07:57.543486 786755 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.543511 786755 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001a43bc0 5 D0713 00:07:57.543524 786755 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:07:57.544342 786755 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.544418 786755 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001a43bc0 6 D0713 00:07:57.544452 786755 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:07:57.545407 786755 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.545432 786755 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001a43bc0 7 D0713 00:07:57.545444 786755 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:07:57.545691 786755 usertrap_amd64.go:212] [ 657: 658] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.545714 786755 usertrap_amd64.go:122] [ 657: 658] Allocate a new trap: 0xc001a43bc0 8 D0713 00:07:57.545725 786755 usertrap_amd64.go:225] [ 657: 658] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:07:57.546062 786755 usertrap_amd64.go:212] [ 657: 658] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.546082 786755 usertrap_amd64.go:122] [ 657: 658] Allocate a new trap: 0xc001a43bc0 9 D0713 00:07:57.546090 786755 usertrap_amd64.go:225] [ 657: 658] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:07:57.546112 786755 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.546133 786755 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001a43bc0 10 D0713 00:07:57.546141 786755 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:07:57.554146 786755 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.554174 786755 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001a43bc0 11 D0713 00:07:57.554184 786755 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:07:57.557838 786755 usertrap_amd64.go:212] [ 657: 658] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.557871 786755 usertrap_amd64.go:122] [ 657: 658] Allocate a new trap: 0xc001a43bc0 12 D0713 00:07:57.557885 786755 usertrap_amd64.go:225] [ 657: 658] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:07:57.557955 786755 usertrap_amd64.go:212] [ 657: 658] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.557984 786755 usertrap_amd64.go:122] [ 657: 658] Allocate a new trap: 0xc001a43bc0 13 D0713 00:07:57.557994 786755 usertrap_amd64.go:225] [ 657: 658] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:07:57.558043 786755 task_signals.go:470] [ 657: 657] Notified of signal 23 D0713 00:07:57.558127 786755 task_signals.go:220] [ 657: 657] Signal 23: delivering to handler I0713 00:07:57.564846 786755 compat.go:120] Unsupported syscall sys_446(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_446 for more information. D0713 00:07:57.565002 786755 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.565025 786755 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001a43bc0 14 D0713 00:07:57.565034 786755 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:07:57.565117 786755 task_exit.go:204] [ 657: 657] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.565176 786755 task_exit.go:204] [ 657: 657] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.565242 786755 task_signals.go:204] [ 657: 659] Signal 657, PID: 659, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.565282 786755 task_exit.go:204] [ 657: 659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.565300 786755 task_exit.go:204] [ 657: 659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.565305 786755 task_exit.go:204] [ 657: 659] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.565263 786755 task_signals.go:204] [ 657: 658] Signal 657, PID: 658, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.565318 786755 task_exit.go:204] [ 657: 658] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.565322 786755 task_exit.go:204] [ 657: 658] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.565325 786755 task_exit.go:204] [ 657: 658] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.565278 786755 task_signals.go:204] [ 657: 660] Signal 657, PID: 660, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.565332 786755 task_exit.go:204] [ 657: 660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.565335 786755 task_exit.go:204] [ 657: 660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.565338 786755 task_exit.go:204] [ 657: 660] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.565176 786755 task_signals.go:204] [ 657: 661] Signal 657, PID: 661, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.565346 786755 task_exit.go:204] [ 657: 661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.568825 786755 task_exit.go:204] [ 657: 661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.568857 786755 task_exit.go:204] [ 657: 661] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.568878 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.569013 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.569037 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.569322 786755 task_exit.go:204] [ 657: 657] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.570694 786755 task_signals.go:470] [ 6: 23] Notified of signal 23 D0713 00:07:57.570799 786755 task_signals.go:220] [ 6: 23] Signal 23: delivering to handler D0713 00:07:57.571643 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.573107 786755 syscalls.go:262] [ 662: 662] Allocating stack with size of 8388608 bytes D0713 00:07:57.573231 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.573984 786755 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.574028 786755 usertrap_amd64.go:106] [ 662: 662] Map a usertrap vma at 61000 D0713 00:07:57.574098 786755 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00158f830 1 D0713 00:07:57.574122 786755 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:07:57.574450 786755 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.574480 786755 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00158f830 2 D0713 00:07:57.574493 786755 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:07:57.574962 786755 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.574989 786755 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00158f830 3 D0713 00:07:57.574999 786755 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:07:57.580817 786755 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.580838 786755 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00158f830 4 D0713 00:07:57.580847 786755 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:07:57.583048 786755 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.583073 786755 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00158f830 5 D0713 00:07:57.583083 786755 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:07:57.583181 786755 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.583206 786755 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00158f830 6 D0713 00:07:57.583220 786755 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:07:57.584376 786755 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.584406 786755 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00158f830 7 D0713 00:07:57.584419 786755 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:07:57.584669 786755 usertrap_amd64.go:212] [ 662: 663] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.584998 786755 usertrap_amd64.go:122] [ 662: 663] Allocate a new trap: 0xc00158f830 8 D0713 00:07:57.585030 786755 usertrap_amd64.go:225] [ 662: 663] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:07:57.585114 786755 usertrap_amd64.go:212] [ 662: 663] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.585159 786755 usertrap_amd64.go:122] [ 662: 663] Allocate a new trap: 0xc00158f830 9 D0713 00:07:57.585683 786755 usertrap_amd64.go:225] [ 662: 663] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:07:57.585708 786755 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.585714 786755 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00158f830 10 D0713 00:07:57.585721 786755 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:07:57.593401 786755 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.593429 786755 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00158f830 11 D0713 00:07:57.593441 786755 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:07:57.596997 786755 usertrap_amd64.go:212] [ 662: 663] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.597055 786755 usertrap_amd64.go:122] [ 662: 663] Allocate a new trap: 0xc00158f830 12 D0713 00:07:57.597070 786755 usertrap_amd64.go:225] [ 662: 663] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:07:57.597113 786755 usertrap_amd64.go:212] [ 662: 663] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.597122 786755 usertrap_amd64.go:122] [ 662: 663] Allocate a new trap: 0xc00158f830 13 D0713 00:07:57.597130 786755 usertrap_amd64.go:225] [ 662: 663] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:07:57.597149 786755 task_signals.go:470] [ 662: 662] Notified of signal 23 D0713 00:07:57.597227 786755 task_signals.go:220] [ 662: 662] Signal 23: delivering to handler D0713 00:07:57.603957 786755 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.604057 786755 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00158f830 14 D0713 00:07:57.604126 786755 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:07:57.604669 786755 task_exit.go:204] [ 662: 662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.604700 786755 task_exit.go:204] [ 662: 662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.604753 786755 task_signals.go:204] [ 662: 663] Signal 662, PID: 663, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.604761 786755 task_signals.go:204] [ 662: 665] Signal 662, PID: 665, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.604776 786755 task_exit.go:204] [ 662: 663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.604787 786755 task_exit.go:204] [ 662: 665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.604804 786755 task_signals.go:204] [ 662: 664] Signal 662, PID: 664, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.604863 786755 task_signals.go:204] [ 662: 666] Signal 662, PID: 666, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.604879 786755 task_exit.go:204] [ 662: 665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.604920 786755 task_exit.go:204] [ 662: 665] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.604967 786755 task_exit.go:204] [ 662: 663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.605003 786755 task_exit.go:204] [ 662: 663] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.605013 786755 task_exit.go:204] [ 662: 664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.605022 786755 task_exit.go:204] [ 662: 664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.605028 786755 task_exit.go:204] [ 662: 664] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.605038 786755 task_exit.go:204] [ 662: 666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.606517 786755 task_exit.go:204] [ 662: 666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.606542 786755 task_exit.go:204] [ 662: 666] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.606602 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.607049 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.607085 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.607177 786755 task_exit.go:204] [ 662: 662] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.607926 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.609417 786755 syscalls.go:262] [ 667: 667] Allocating stack with size of 8388608 bytes D0713 00:07:57.609547 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.610468 786755 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.610553 786755 usertrap_amd64.go:106] [ 667: 667] Map a usertrap vma at 67000 D0713 00:07:57.610703 786755 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001281ec0 1 D0713 00:07:57.610750 786755 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:07:57.611110 786755 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.611136 786755 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001281ec0 2 D0713 00:07:57.611148 786755 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:07:57.611728 786755 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.611775 786755 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001281ec0 3 D0713 00:07:57.611789 786755 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:07:57.620104 786755 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.620154 786755 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001281ec0 4 D0713 00:07:57.620171 786755 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:07:57.621425 786755 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.621464 786755 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001281ec0 5 D0713 00:07:57.621495 786755 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:07:57.621569 786755 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.621589 786755 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001281ec0 6 D0713 00:07:57.621597 786755 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:07:57.622222 786755 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.622255 786755 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001281ec0 7 D0713 00:07:57.622266 786755 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:07:57.622640 786755 usertrap_amd64.go:212] [ 667: 668] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.623783 786755 usertrap_amd64.go:122] [ 667: 668] Allocate a new trap: 0xc001281ec0 8 D0713 00:07:57.623875 786755 usertrap_amd64.go:225] [ 667: 668] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:07:57.623968 786755 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.624055 786755 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001281ec0 9 D0713 00:07:57.624084 786755 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:07:57.624104 786755 usertrap_amd64.go:212] [ 667: 668] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.624111 786755 usertrap_amd64.go:122] [ 667: 668] Allocate a new trap: 0xc001281ec0 10 D0713 00:07:57.624216 786755 usertrap_amd64.go:225] [ 667: 668] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:07:57.633701 786755 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.633741 786755 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001281ec0 11 D0713 00:07:57.633757 786755 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:07:57.634618 786755 usertrap_amd64.go:212] [ 667: 668] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.634668 786755 usertrap_amd64.go:122] [ 667: 668] Allocate a new trap: 0xc001281ec0 12 D0713 00:07:57.634797 786755 usertrap_amd64.go:225] [ 667: 668] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:07:57.636424 786755 usertrap_amd64.go:212] [ 667: 668] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.636483 786755 usertrap_amd64.go:122] [ 667: 668] Allocate a new trap: 0xc001281ec0 13 D0713 00:07:57.636502 786755 usertrap_amd64.go:225] [ 667: 668] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:07:57.636555 786755 task_signals.go:470] [ 667: 667] Notified of signal 23 D0713 00:07:57.636799 786755 task_signals.go:220] [ 667: 667] Signal 23: delivering to handler D0713 00:07:57.637030 786755 task_signals.go:481] [ 667: 667] No task notified of signal 23 D0713 00:07:57.637074 786755 task_signals.go:220] [ 667: 667] Signal 23: delivering to handler D0713 00:07:57.645914 786755 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.645964 786755 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001281ec0 14 D0713 00:07:57.645982 786755 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:07:57.646068 786755 task_exit.go:204] [ 667: 667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.646102 786755 task_exit.go:204] [ 667: 667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.646143 786755 task_signals.go:204] [ 667: 668] Signal 667, PID: 668, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.646170 786755 task_exit.go:204] [ 667: 668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.646179 786755 task_exit.go:204] [ 667: 668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.646184 786755 task_exit.go:204] [ 667: 668] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.646206 786755 task_signals.go:204] [ 667: 669] Signal 667, PID: 669, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.646218 786755 task_exit.go:204] [ 667: 669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.646222 786755 task_exit.go:204] [ 667: 669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.646226 786755 task_exit.go:204] [ 667: 669] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.646241 786755 task_signals.go:204] [ 667: 670] Signal 667, PID: 670, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.646247 786755 task_exit.go:204] [ 667: 670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.646252 786755 task_exit.go:204] [ 667: 670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.646255 786755 task_exit.go:204] [ 667: 670] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.646268 786755 task_signals.go:204] [ 667: 671] Signal 667, PID: 671, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.646279 786755 task_exit.go:204] [ 667: 671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.646286 786755 task_exit.go:204] [ 667: 671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.646292 786755 task_exit.go:204] [ 667: 671] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.646307 786755 task_signals.go:204] [ 667: 672] Signal 667, PID: 672, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.646330 786755 task_exit.go:204] [ 667: 672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.648119 786755 task_exit.go:204] [ 667: 672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.648176 786755 task_exit.go:204] [ 667: 672] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.648199 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.649333 786755 task_exit.go:204] [ 667: 667] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.649340 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.649393 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.650180 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.652002 786755 syscalls.go:262] [ 673: 673] Allocating stack with size of 8388608 bytes D0713 00:07:57.652132 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.654911 786755 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.654961 786755 usertrap_amd64.go:106] [ 673: 673] Map a usertrap vma at 65000 D0713 00:07:57.655366 786755 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc000a43320 1 D0713 00:07:57.655419 786755 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:07:57.661436 786755 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.661471 786755 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc000a43320 2 D0713 00:07:57.661489 786755 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:07:57.662148 786755 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.662177 786755 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc000a43320 3 D0713 00:07:57.662191 786755 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:07:57.668476 786755 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.668533 786755 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc000a43320 4 D0713 00:07:57.668549 786755 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:07:57.669613 786755 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.669640 786755 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc000a43320 5 D0713 00:07:57.669650 786755 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:07:57.669708 786755 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.669716 786755 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc000a43320 6 D0713 00:07:57.669725 786755 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:07:57.670063 786755 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.670084 786755 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc000a43320 7 D0713 00:07:57.670095 786755 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:07:57.670370 786755 usertrap_amd64.go:212] [ 673: 674] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.670413 786755 usertrap_amd64.go:122] [ 673: 674] Allocate a new trap: 0xc000a43320 8 D0713 00:07:57.670431 786755 usertrap_amd64.go:225] [ 673: 674] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:07:57.670702 786755 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.670741 786755 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc000a43320 9 D0713 00:07:57.670756 786755 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:07:57.670772 786755 usertrap_amd64.go:212] [ 673: 674] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.670780 786755 usertrap_amd64.go:122] [ 673: 674] Allocate a new trap: 0xc000a43320 10 D0713 00:07:57.670861 786755 usertrap_amd64.go:225] [ 673: 674] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:07:57.679099 786755 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.679134 786755 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc000a43320 11 D0713 00:07:57.679145 786755 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:07:57.683749 786755 usertrap_amd64.go:212] [ 673: 674] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.683828 786755 usertrap_amd64.go:122] [ 673: 674] Allocate a new trap: 0xc000a43320 12 D0713 00:07:57.683851 786755 usertrap_amd64.go:225] [ 673: 674] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:07:57.683919 786755 usertrap_amd64.go:212] [ 673: 674] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.683947 786755 usertrap_amd64.go:122] [ 673: 674] Allocate a new trap: 0xc000a43320 13 D0713 00:07:57.683976 786755 usertrap_amd64.go:225] [ 673: 674] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:07:57.684046 786755 task_signals.go:470] [ 673: 673] Notified of signal 23 D0713 00:07:57.684150 786755 task_signals.go:220] [ 673: 673] Signal 23: delivering to handler D0713 00:07:57.690926 786755 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.690967 786755 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc000a43320 14 D0713 00:07:57.690985 786755 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:07:57.691067 786755 task_exit.go:204] [ 673: 673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.691102 786755 task_exit.go:204] [ 673: 673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.691135 786755 task_signals.go:204] [ 673: 678] Signal 673, PID: 678, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.691138 786755 task_signals.go:204] [ 673: 677] Signal 673, PID: 677, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.691125 786755 task_signals.go:204] [ 673: 674] Signal 673, PID: 674, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.691161 786755 task_exit.go:204] [ 673: 678] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.691191 786755 task_exit.go:204] [ 673: 678] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.691209 786755 task_exit.go:204] [ 673: 678] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.691152 786755 task_signals.go:204] [ 673: 675] Signal 673, PID: 675, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.691231 786755 task_exit.go:204] [ 673: 675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.691237 786755 task_exit.go:204] [ 673: 675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.691242 786755 task_exit.go:204] [ 673: 675] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.691269 786755 task_signals.go:204] [ 673: 676] Signal 673, PID: 676, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.691294 786755 task_exit.go:204] [ 673: 676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.691304 786755 task_exit.go:204] [ 673: 676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.691311 786755 task_exit.go:204] [ 673: 676] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.691327 786755 task_exit.go:204] [ 673: 677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.691337 786755 task_exit.go:204] [ 673: 677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.691345 786755 task_exit.go:204] [ 673: 677] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.691357 786755 task_exit.go:204] [ 673: 674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.693035 786755 task_exit.go:204] [ 673: 674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.693072 786755 task_exit.go:204] [ 673: 674] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.693086 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.693124 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:57.693135 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.693355 786755 task_exit.go:204] [ 673: 673] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.694173 786755 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.695616 786755 syscalls.go:262] [ 679: 679] Allocating stack with size of 8388608 bytes D0713 00:07:57.695721 786755 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.697001 786755 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.697042 786755 usertrap_amd64.go:106] [ 679: 679] Map a usertrap vma at 60000 D0713 00:07:57.697153 786755 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc00158fb30 1 D0713 00:07:57.697179 786755 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:07:57.697568 786755 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.697589 786755 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc00158fb30 2 D0713 00:07:57.697599 786755 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:07:57.698396 786755 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.698420 786755 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc00158fb30 3 D0713 00:07:57.698429 786755 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:07:57.705267 786755 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.705314 786755 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc00158fb30 4 D0713 00:07:57.705331 786755 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:07:57.706523 786755 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.706601 786755 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc00158fb30 5 D0713 00:07:57.706678 786755 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:07:57.706787 786755 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.706808 786755 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc00158fb30 6 D0713 00:07:57.706824 786755 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:07:57.707081 786755 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.707107 786755 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc00158fb30 7 D0713 00:07:57.707118 786755 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:07:57.707324 786755 usertrap_amd64.go:212] [ 679: 680] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.707352 786755 usertrap_amd64.go:122] [ 679: 680] Allocate a new trap: 0xc00158fb30 8 D0713 00:07:57.707364 786755 usertrap_amd64.go:225] [ 679: 680] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:07:57.707569 786755 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.707591 786755 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc00158fb30 9 D0713 00:07:57.707602 786755 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:07:57.707654 786755 usertrap_amd64.go:212] [ 679: 680] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.707673 786755 usertrap_amd64.go:122] [ 679: 680] Allocate a new trap: 0xc00158fb30 10 D0713 00:07:57.707714 786755 usertrap_amd64.go:225] [ 679: 680] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:07:57.715811 786755 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.715838 786755 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc00158fb30 11 D0713 00:07:57.715847 786755 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:07:57.718285 786755 usertrap_amd64.go:212] [ 679: 680] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.718310 786755 usertrap_amd64.go:122] [ 679: 680] Allocate a new trap: 0xc00158fb30 12 D0713 00:07:57.718322 786755 usertrap_amd64.go:225] [ 679: 680] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:07:57.718355 786755 usertrap_amd64.go:212] [ 679: 680] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.718363 786755 usertrap_amd64.go:122] [ 679: 680] Allocate a new trap: 0xc00158fb30 13 D0713 00:07:57.718371 786755 usertrap_amd64.go:225] [ 679: 680] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:07:57.718396 786755 task_signals.go:470] [ 679: 679] Notified of signal 23 D0713 00:07:57.718496 786755 task_signals.go:220] [ 679: 679] Signal 23: delivering to handler D0713 00:07:57.725937 786755 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.725989 786755 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc00158fb30 14 D0713 00:07:57.726000 786755 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:07:57.726061 786755 task_exit.go:204] [ 679: 679] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.726102 786755 task_exit.go:204] [ 679: 679] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.726134 786755 task_signals.go:204] [ 679: 680] Signal 679, PID: 680, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.726156 786755 task_exit.go:204] [ 679: 680] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.726175 786755 task_exit.go:204] [ 679: 680] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.726194 786755 task_exit.go:204] [ 679: 680] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.726213 786755 task_signals.go:204] [ 679: 681] Signal 679, PID: 681, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.726281 786755 task_exit.go:204] [ 679: 681] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.726306 786755 task_exit.go:204] [ 679: 681] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.726313 786755 task_exit.go:204] [ 679: 681] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.726338 786755 task_signals.go:204] [ 679: 682] Signal 679, PID: 682, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.726350 786755 task_signals.go:204] [ 679: 683] Signal 679, PID: 683, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.726365 786755 task_exit.go:204] [ 679: 682] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.726397 786755 task_signals.go:204] [ 679: 684] Signal 679, PID: 684, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.726417 786755 task_exit.go:204] [ 679: 682] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.726428 786755 task_exit.go:204] [ 679: 682] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.726438 786755 task_exit.go:204] [ 679: 683] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.726443 786755 task_exit.go:204] [ 679: 683] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.726446 786755 task_exit.go:204] [ 679: 683] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.726452 786755 task_exit.go:204] [ 679: 684] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.727918 786755 task_exit.go:204] [ 679: 684] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.727949 786755 task_exit.go:204] [ 679: 684] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.727963 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.728013 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.728072 786755 task_exit.go:204] [ 679: 679] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.728157 786755 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:07:57.728188 786755 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:07:57.728732 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.730343 786755 syscalls.go:262] [ 685: 685] Allocating stack with size of 8388608 bytes D0713 00:07:57.730470 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.732307 786755 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.732349 786755 usertrap_amd64.go:106] [ 685: 685] Map a usertrap vma at 60000 D0713 00:07:57.732447 786755 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc000ac6180 1 D0713 00:07:57.732476 786755 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:07:57.732780 786755 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.732802 786755 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc000ac6180 2 D0713 00:07:57.732812 786755 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:07:57.733445 786755 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.733472 786755 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc000ac6180 3 D0713 00:07:57.733483 786755 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:07:57.738576 786755 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.738607 786755 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc000ac6180 4 D0713 00:07:57.738622 786755 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:07:57.739630 786755 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.739658 786755 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc000ac6180 5 D0713 00:07:57.739669 786755 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:07:57.739812 786755 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.739831 786755 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc000ac6180 6 D0713 00:07:57.739843 786755 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:07:57.740229 786755 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.740254 786755 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc000ac6180 7 D0713 00:07:57.740265 786755 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:07:57.740420 786755 usertrap_amd64.go:212] [ 685: 686] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.740454 786755 usertrap_amd64.go:122] [ 685: 686] Allocate a new trap: 0xc000ac6180 8 D0713 00:07:57.740472 786755 usertrap_amd64.go:225] [ 685: 686] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:07:57.740584 786755 usertrap_amd64.go:212] [ 685: 686] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.740604 786755 usertrap_amd64.go:122] [ 685: 686] Allocate a new trap: 0xc000ac6180 9 D0713 00:07:57.740612 786755 usertrap_amd64.go:225] [ 685: 686] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:07:57.740731 786755 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.740755 786755 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc000ac6180 10 D0713 00:07:57.740764 786755 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:07:57.740849 786755 usertrap_amd64.go:212] [ 685: 688] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:57.740872 786755 usertrap_amd64.go:122] [ 685: 688] Allocate a new trap: 0xc000ac6180 11 D0713 00:07:57.740881 786755 usertrap_amd64.go:225] [ 685: 688] Apply the binary patch addr 46b6e0 trap addr 60370 ([184 24 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:07:57.741007 786755 usertrap_amd64.go:212] [ 685: 686] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.741027 786755 usertrap_amd64.go:122] [ 685: 686] Allocate a new trap: 0xc000ac6180 12 D0713 00:07:57.741037 786755 usertrap_amd64.go:225] [ 685: 686] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:07:57.741053 786755 usertrap_amd64.go:212] [ 685: 686] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.741060 786755 usertrap_amd64.go:122] [ 685: 686] Allocate a new trap: 0xc000ac6180 13 D0713 00:07:57.741068 786755 usertrap_amd64.go:225] [ 685: 686] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:07:57.741082 786755 task_signals.go:470] [ 685: 687] Notified of signal 23 D0713 00:07:57.741118 786755 task_signals.go:179] [ 685: 687] Restarting syscall 202: interrupted by signal 23 D0713 00:07:57.741140 786755 task_signals.go:220] [ 685: 687] Signal 23: delivering to handler D0713 00:07:57.748051 786755 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.748080 786755 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc000ac6180 14 D0713 00:07:57.748090 786755 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46af29 trap addr 60460 ([184 37 1 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:07:57.750916 786755 task_signals.go:470] [ 685: 685] Notified of signal 23 D0713 00:07:57.751002 786755 task_signals.go:220] [ 685: 685] Signal 23: delivering to handler D0713 00:07:57.758572 786755 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.758623 786755 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc000ac6180 15 D0713 00:07:57.758639 786755 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0713 00:07:57.758727 786755 task_exit.go:204] [ 685: 685] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.758757 786755 task_exit.go:204] [ 685: 685] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.758811 786755 task_signals.go:204] [ 685: 689] Signal 685, PID: 689, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.758832 786755 task_exit.go:204] [ 685: 689] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.758830 786755 task_signals.go:204] [ 685: 688] Signal 685, PID: 688, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.758842 786755 task_exit.go:204] [ 685: 689] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.758853 786755 task_exit.go:204] [ 685: 689] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.758811 786755 task_signals.go:204] [ 685: 687] Signal 685, PID: 687, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.758875 786755 task_exit.go:204] [ 685: 687] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.758882 786755 task_signals.go:204] [ 685: 686] Signal 685, PID: 686, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.758899 786755 task_exit.go:204] [ 685: 687] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.758907 786755 task_exit.go:204] [ 685: 687] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.758925 786755 task_exit.go:204] [ 685: 688] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.758936 786755 task_exit.go:204] [ 685: 688] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.758943 786755 task_exit.go:204] [ 685: 688] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.758955 786755 task_exit.go:204] [ 685: 686] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.760449 786755 task_exit.go:204] [ 685: 686] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.760483 786755 task_exit.go:204] [ 685: 686] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.760506 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.760540 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:57.760569 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.760769 786755 task_exit.go:204] [ 685: 685] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.761503 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.763150 786755 syscalls.go:262] [ 690: 690] Allocating stack with size of 8388608 bytes D0713 00:07:57.763254 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.765137 786755 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.765235 786755 usertrap_amd64.go:106] [ 690: 690] Map a usertrap vma at 69000 D0713 00:07:57.765515 786755 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a43bf0 1 D0713 00:07:57.765583 786755 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:07:57.766338 786755 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.766376 786755 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a43bf0 2 D0713 00:07:57.766388 786755 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:07:57.767281 786755 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.767309 786755 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a43bf0 3 D0713 00:07:57.767319 786755 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:07:57.773765 786755 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.773814 786755 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a43bf0 4 D0713 00:07:57.773832 786755 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:07:57.774890 786755 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.774922 786755 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a43bf0 5 D0713 00:07:57.774937 786755 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:07:57.774995 786755 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.775009 786755 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a43bf0 6 D0713 00:07:57.775014 786755 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:07:57.775345 786755 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.775363 786755 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a43bf0 7 D0713 00:07:57.775370 786755 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:07:57.775594 786755 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.775623 786755 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc000a43bf0 8 D0713 00:07:57.775640 786755 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:07:57.775993 786755 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.776019 786755 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a43bf0 9 D0713 00:07:57.776031 786755 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:07:57.776116 786755 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.776133 786755 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc000a43bf0 10 D0713 00:07:57.776146 786755 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:07:57.776167 786755 usertrap_amd64.go:212] [ 690: 693] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:57.776189 786755 usertrap_amd64.go:122] [ 690: 693] Allocate a new trap: 0xc000a43bf0 11 D0713 00:07:57.776203 786755 usertrap_amd64.go:225] [ 690: 693] Apply the binary patch addr 46b6e0 trap addr 69370 ([184 24 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:07:57.786160 786755 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.786205 786755 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a43bf0 12 D0713 00:07:57.786220 786755 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46af29 trap addr 693c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:07:57.789105 786755 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.789142 786755 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc000a43bf0 13 D0713 00:07:57.789157 786755 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46b020 trap addr 69410 ([184 39 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:07:57.789253 786755 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.789300 786755 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc000a43bf0 14 D0713 00:07:57.789316 786755 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46b04f trap addr 69460 ([184 234 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:07:57.789388 786755 task_signals.go:470] [ 690: 690] Notified of signal 23 D0713 00:07:57.789535 786755 task_signals.go:220] [ 690: 690] Signal 23: delivering to handler D0713 00:07:57.798490 786755 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.798518 786755 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a43bf0 15 D0713 00:07:57.798531 786755 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0713 00:07:57.798599 786755 task_exit.go:204] [ 690: 690] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.798626 786755 task_exit.go:204] [ 690: 690] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.798651 786755 task_signals.go:204] [ 690: 695] Signal 690, PID: 695, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.798669 786755 task_exit.go:204] [ 690: 695] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.798659 786755 task_signals.go:204] [ 690: 694] Signal 690, PID: 694, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.798647 786755 task_signals.go:204] [ 690: 691] Signal 690, PID: 691, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.798678 786755 task_signals.go:204] [ 690: 692] Signal 690, PID: 692, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.798715 786755 task_signals.go:204] [ 690: 693] Signal 690, PID: 693, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.798725 786755 task_exit.go:204] [ 690: 691] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.798734 786755 task_exit.go:204] [ 690: 691] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.798753 786755 task_exit.go:204] [ 690: 691] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.798774 786755 task_exit.go:204] [ 690: 694] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.798782 786755 task_exit.go:204] [ 690: 694] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.798786 786755 task_exit.go:204] [ 690: 694] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.798795 786755 task_exit.go:204] [ 690: 692] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.798802 786755 task_exit.go:204] [ 690: 692] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.798818 786755 task_exit.go:204] [ 690: 692] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.798831 786755 task_exit.go:204] [ 690: 695] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.798835 786755 task_exit.go:204] [ 690: 695] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.798845 786755 task_exit.go:204] [ 690: 693] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.800216 786755 task_exit.go:204] [ 690: 693] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.800245 786755 task_exit.go:204] [ 690: 693] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.800269 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.800307 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:57.800328 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.800458 786755 task_exit.go:204] [ 690: 690] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.801153 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.802499 786755 syscalls.go:262] [ 696: 696] Allocating stack with size of 8388608 bytes D0713 00:07:57.802607 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.804371 786755 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.804414 786755 usertrap_amd64.go:106] [ 696: 696] Map a usertrap vma at 6a000 D0713 00:07:57.804517 786755 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc0003c1ad0 1 D0713 00:07:57.804554 786755 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:07:57.804876 786755 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.804900 786755 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc0003c1ad0 2 D0713 00:07:57.804909 786755 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:07:57.805716 786755 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.805742 786755 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc0003c1ad0 3 D0713 00:07:57.805755 786755 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:07:57.812289 786755 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.812317 786755 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc0003c1ad0 4 D0713 00:07:57.812327 786755 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:07:57.813610 786755 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.813643 786755 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc0003c1ad0 5 D0713 00:07:57.813659 786755 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:07:57.813892 786755 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.813917 786755 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc0003c1ad0 6 D0713 00:07:57.813928 786755 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:07:57.814229 786755 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.814260 786755 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc0003c1ad0 7 D0713 00:07:57.814270 786755 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:07:57.814458 786755 usertrap_amd64.go:212] [ 696: 697] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.814489 786755 usertrap_amd64.go:122] [ 696: 697] Allocate a new trap: 0xc0003c1ad0 8 D0713 00:07:57.814504 786755 usertrap_amd64.go:225] [ 696: 697] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:07:57.814775 786755 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.814801 786755 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc0003c1ad0 9 D0713 00:07:57.814809 786755 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:07:57.814833 786755 usertrap_amd64.go:212] [ 696: 697] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.814840 786755 usertrap_amd64.go:122] [ 696: 697] Allocate a new trap: 0xc0003c1ad0 10 D0713 00:07:57.814846 786755 usertrap_amd64.go:225] [ 696: 697] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:07:57.823795 786755 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.823835 786755 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc0003c1ad0 11 D0713 00:07:57.823856 786755 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:07:57.826570 786755 usertrap_amd64.go:212] [ 696: 697] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.826672 786755 usertrap_amd64.go:122] [ 696: 697] Allocate a new trap: 0xc0003c1ad0 12 D0713 00:07:57.826703 786755 usertrap_amd64.go:225] [ 696: 697] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:07:57.828063 786755 usertrap_amd64.go:212] [ 696: 697] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.828107 786755 usertrap_amd64.go:122] [ 696: 697] Allocate a new trap: 0xc0003c1ad0 13 D0713 00:07:57.828132 786755 usertrap_amd64.go:225] [ 696: 697] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:07:57.828252 786755 task_signals.go:470] [ 696: 696] Notified of signal 23 D0713 00:07:57.828370 786755 task_signals.go:220] [ 696: 696] Signal 23: delivering to handler D0713 00:07:57.836591 786755 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.836621 786755 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc0003c1ad0 14 D0713 00:07:57.836635 786755 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:07:57.836713 786755 task_exit.go:204] [ 696: 696] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.836773 786755 task_signals.go:204] [ 696: 698] Signal 696, PID: 698, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.836808 786755 task_signals.go:204] [ 696: 697] Signal 696, PID: 697, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.836815 786755 task_signals.go:204] [ 696: 699] Signal 696, PID: 699, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.836844 786755 task_exit.go:204] [ 696: 696] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.836858 786755 task_signals.go:204] [ 696: 700] Signal 696, PID: 700, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.836863 786755 task_exit.go:204] [ 696: 698] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.836889 786755 task_exit.go:204] [ 696: 698] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.836900 786755 task_exit.go:204] [ 696: 698] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.836921 786755 task_exit.go:204] [ 696: 700] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.837025 786755 task_exit.go:204] [ 696: 700] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.837035 786755 task_exit.go:204] [ 696: 700] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.837053 786755 task_exit.go:204] [ 696: 697] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.837068 786755 task_exit.go:204] [ 696: 697] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.837074 786755 task_exit.go:204] [ 696: 697] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.837084 786755 task_exit.go:204] [ 696: 699] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.838475 786755 task_exit.go:204] [ 696: 699] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.838515 786755 task_exit.go:204] [ 696: 699] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.838538 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.838574 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:57.838585 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.838708 786755 task_exit.go:204] [ 696: 696] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.838821 786755 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:07:57.838984 786755 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:07:57.839527 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.841087 786755 syscalls.go:262] [ 701: 701] Allocating stack with size of 8388608 bytes D0713 00:07:57.841224 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.842664 786755 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.842708 786755 usertrap_amd64.go:106] [ 701: 701] Map a usertrap vma at 6a000 D0713 00:07:57.842834 786755 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc001642f30 1 D0713 00:07:57.842871 786755 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:07:57.843225 786755 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.843259 786755 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc001642f30 2 D0713 00:07:57.843273 786755 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:07:57.844168 786755 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.844193 786755 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc001642f30 3 D0713 00:07:57.844206 786755 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:07:57.851458 786755 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.851492 786755 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc001642f30 4 D0713 00:07:57.851507 786755 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:07:57.852617 786755 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.852644 786755 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc001642f30 5 D0713 00:07:57.852654 786755 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:07:57.852717 786755 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.852730 786755 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc001642f30 6 D0713 00:07:57.852737 786755 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:07:57.853235 786755 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.853269 786755 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc001642f30 7 D0713 00:07:57.853278 786755 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:07:57.853603 786755 usertrap_amd64.go:212] [ 701: 702] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.853644 786755 usertrap_amd64.go:122] [ 701: 702] Allocate a new trap: 0xc001642f30 8 D0713 00:07:57.853663 786755 usertrap_amd64.go:225] [ 701: 702] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:07:57.853930 786755 usertrap_amd64.go:212] [ 701: 702] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.853960 786755 usertrap_amd64.go:122] [ 701: 702] Allocate a new trap: 0xc001642f30 9 D0713 00:07:57.853975 786755 usertrap_amd64.go:225] [ 701: 702] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:07:57.854124 786755 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.854157 786755 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc001642f30 10 D0713 00:07:57.854171 786755 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:07:57.862520 786755 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.862566 786755 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc001642f30 11 D0713 00:07:57.862581 786755 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:07:57.865438 786755 usertrap_amd64.go:212] [ 701: 702] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.865472 786755 usertrap_amd64.go:122] [ 701: 702] Allocate a new trap: 0xc001642f30 12 D0713 00:07:57.865486 786755 usertrap_amd64.go:225] [ 701: 702] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:07:57.865582 786755 usertrap_amd64.go:212] [ 701: 702] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.865592 786755 usertrap_amd64.go:122] [ 701: 702] Allocate a new trap: 0xc001642f30 13 D0713 00:07:57.865602 786755 usertrap_amd64.go:225] [ 701: 702] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:07:57.865638 786755 task_signals.go:470] [ 701: 701] Notified of signal 23 D0713 00:07:57.865734 786755 task_signals.go:220] [ 701: 701] Signal 23: delivering to handler I0713 00:07:57.874143 786755 compat.go:120] Unsupported syscall lookup_dcookie(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/lookup_dcookie for more information. D0713 00:07:57.874250 786755 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.874267 786755 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc001642f30 14 D0713 00:07:57.874281 786755 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:07:57.874339 786755 task_exit.go:204] [ 701: 701] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.874378 786755 task_exit.go:204] [ 701: 701] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.874397 786755 task_signals.go:204] [ 701: 702] Signal 701, PID: 702, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.874421 786755 task_signals.go:204] [ 701: 704] Signal 701, PID: 704, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.874463 786755 task_exit.go:204] [ 701: 702] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.874499 786755 task_signals.go:204] [ 701: 703] Signal 701, PID: 703, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.874532 786755 task_exit.go:204] [ 701: 703] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.874414 786755 task_signals.go:204] [ 701: 705] Signal 701, PID: 705, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.874549 786755 task_exit.go:204] [ 701: 705] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.874568 786755 task_exit.go:204] [ 701: 705] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.874645 786755 task_exit.go:204] [ 701: 705] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.874699 786755 task_exit.go:204] [ 701: 703] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.874708 786755 task_exit.go:204] [ 701: 703] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.874720 786755 task_exit.go:204] [ 701: 704] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.874798 786755 task_exit.go:204] [ 701: 702] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.874828 786755 task_exit.go:204] [ 701: 702] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.876252 786755 task_exit.go:204] [ 701: 704] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.876292 786755 task_exit.go:204] [ 701: 704] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.876310 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.876356 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:57.876376 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.876824 786755 task_exit.go:204] [ 701: 701] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.877910 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.879396 786755 syscalls.go:262] [ 706: 706] Allocating stack with size of 8388608 bytes D0713 00:07:57.879523 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.880370 786755 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.880418 786755 usertrap_amd64.go:106] [ 706: 706] Map a usertrap vma at 60000 D0713 00:07:57.880567 786755 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc000ac63f0 1 D0713 00:07:57.880616 786755 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:07:57.881070 786755 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.881091 786755 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc000ac63f0 2 D0713 00:07:57.881103 786755 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:07:57.881713 786755 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.881731 786755 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc000ac63f0 3 D0713 00:07:57.881741 786755 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:07:57.889360 786755 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.889398 786755 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc000ac63f0 4 D0713 00:07:57.889413 786755 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:07:57.890654 786755 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.890684 786755 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc000ac63f0 5 D0713 00:07:57.890695 786755 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:07:57.890759 786755 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.890766 786755 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc000ac63f0 6 D0713 00:07:57.890772 786755 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:07:57.891217 786755 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.891265 786755 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc000ac63f0 7 D0713 00:07:57.891281 786755 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:07:57.891477 786755 usertrap_amd64.go:212] [ 706: 707] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.891488 786755 usertrap_amd64.go:122] [ 706: 707] Allocate a new trap: 0xc000ac63f0 8 D0713 00:07:57.891499 786755 usertrap_amd64.go:225] [ 706: 707] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:07:57.891770 786755 usertrap_amd64.go:212] [ 706: 707] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:57.891788 786755 usertrap_amd64.go:122] [ 706: 707] Allocate a new trap: 0xc000ac63f0 9 D0713 00:07:57.891802 786755 usertrap_amd64.go:225] [ 706: 707] Apply the binary patch addr 46b6e0 trap addr 602d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:07:57.891906 786755 usertrap_amd64.go:212] [ 706: 707] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.891916 786755 usertrap_amd64.go:122] [ 706: 707] Allocate a new trap: 0xc000ac63f0 10 D0713 00:07:57.891924 786755 usertrap_amd64.go:225] [ 706: 707] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:07:57.892014 786755 usertrap_amd64.go:212] [ 706: 707] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.892040 786755 usertrap_amd64.go:122] [ 706: 707] Allocate a new trap: 0xc000ac63f0 11 D0713 00:07:57.892051 786755 usertrap_amd64.go:225] [ 706: 707] Apply the binary patch addr 46af76 trap addr 60370 ([184 35 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:07:57.893347 786755 sampler.go:191] Time: Adjusting syscall overhead down to 588 D0713 00:07:57.902920 786755 usertrap_amd64.go:212] [ 706: 707] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.902984 786755 usertrap_amd64.go:122] [ 706: 707] Allocate a new trap: 0xc000ac63f0 12 D0713 00:07:57.903054 786755 usertrap_amd64.go:225] [ 706: 707] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:07:57.903166 786755 usertrap_amd64.go:212] [ 706: 707] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.903190 786755 usertrap_amd64.go:122] [ 706: 707] Allocate a new trap: 0xc000ac63f0 13 D0713 00:07:57.903201 786755 usertrap_amd64.go:225] [ 706: 707] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:07:57.903320 786755 task_signals.go:470] [ 706: 706] Notified of signal 23 D0713 00:07:57.905033 786755 task_signals.go:220] [ 706: 706] Signal 23: delivering to handler D0713 00:07:57.905194 786755 task_signals.go:481] [ 706: 706] No task notified of signal 23 D0713 00:07:57.905232 786755 task_signals.go:220] [ 706: 706] Signal 23: delivering to handler D0713 00:07:57.906211 786755 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.906240 786755 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc000ac63f0 14 D0713 00:07:57.906252 786755 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46af29 trap addr 60460 ([184 37 1 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:07:57.915934 786755 task_signals.go:470] [ 706: 706] Notified of signal 23 D0713 00:07:57.917695 786755 task_signals.go:220] [ 706: 706] Signal 23: delivering to handler D0713 00:07:57.918172 786755 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.918209 786755 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc000ac63f0 15 D0713 00:07:57.918231 786755 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0713 00:07:57.918301 786755 task_exit.go:204] [ 706: 706] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.918353 786755 task_signals.go:204] [ 706: 709] Signal 706, PID: 709, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.918354 786755 task_signals.go:204] [ 706: 708] Signal 706, PID: 708, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.918377 786755 task_signals.go:204] [ 706: 710] Signal 706, PID: 710, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.918379 786755 task_signals.go:204] [ 706: 707] Signal 706, PID: 707, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.918401 786755 task_exit.go:204] [ 706: 706] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.918436 786755 task_exit.go:204] [ 706: 709] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.918483 786755 task_exit.go:204] [ 706: 709] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.918530 786755 task_exit.go:204] [ 706: 709] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.918559 786755 task_exit.go:204] [ 706: 708] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.918570 786755 task_exit.go:204] [ 706: 708] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.918578 786755 task_exit.go:204] [ 706: 708] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.918592 786755 task_exit.go:204] [ 706: 710] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.918602 786755 task_exit.go:204] [ 706: 710] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.918608 786755 task_exit.go:204] [ 706: 710] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.918619 786755 task_exit.go:204] [ 706: 707] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.920196 786755 task_exit.go:204] [ 706: 707] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.920251 786755 task_exit.go:204] [ 706: 707] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.920280 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.920315 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:57.920338 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.920548 786755 task_exit.go:204] [ 706: 706] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.921540 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.923514 786755 syscalls.go:262] [ 711: 711] Allocating stack with size of 8388608 bytes D0713 00:07:57.923771 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.925379 786755 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.925422 786755 usertrap_amd64.go:106] [ 711: 711] Map a usertrap vma at 6a000 D0713 00:07:57.925642 786755 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc0008b5c80 1 D0713 00:07:57.925687 786755 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:07:57.926447 786755 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.926480 786755 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc0008b5c80 2 D0713 00:07:57.926526 786755 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:07:57.927663 786755 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.927685 786755 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc0008b5c80 3 D0713 00:07:57.927695 786755 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:07:57.935599 786755 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.935617 786755 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc0008b5c80 4 D0713 00:07:57.935627 786755 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:07:57.936724 786755 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.936747 786755 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc0008b5c80 5 D0713 00:07:57.936759 786755 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:07:57.936813 786755 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.936822 786755 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc0008b5c80 6 D0713 00:07:57.936827 786755 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:07:57.937077 786755 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.937096 786755 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc0008b5c80 7 D0713 00:07:57.937105 786755 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:07:57.937369 786755 usertrap_amd64.go:212] [ 711: 712] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.937384 786755 usertrap_amd64.go:122] [ 711: 712] Allocate a new trap: 0xc0008b5c80 8 D0713 00:07:57.937396 786755 usertrap_amd64.go:225] [ 711: 712] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:07:57.937616 786755 usertrap_amd64.go:212] [ 711: 712] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.937636 786755 usertrap_amd64.go:122] [ 711: 712] Allocate a new trap: 0xc0008b5c80 9 D0713 00:07:57.937645 786755 usertrap_amd64.go:225] [ 711: 712] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:07:57.937809 786755 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.937834 786755 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc0008b5c80 10 D0713 00:07:57.937845 786755 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:07:57.945679 786755 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.945711 786755 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc0008b5c80 11 D0713 00:07:57.945722 786755 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:07:57.948355 786755 usertrap_amd64.go:212] [ 711: 712] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.948460 786755 usertrap_amd64.go:122] [ 711: 712] Allocate a new trap: 0xc0008b5c80 12 D0713 00:07:57.948480 786755 usertrap_amd64.go:225] [ 711: 712] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:07:57.948646 786755 usertrap_amd64.go:212] [ 711: 712] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.948707 786755 usertrap_amd64.go:122] [ 711: 712] Allocate a new trap: 0xc0008b5c80 13 D0713 00:07:57.948721 786755 usertrap_amd64.go:225] [ 711: 712] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:07:57.948774 786755 task_signals.go:470] [ 711: 711] Notified of signal 23 D0713 00:07:57.948865 786755 task_signals.go:220] [ 711: 711] Signal 23: delivering to handler D0713 00:07:57.957507 786755 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.957545 786755 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc0008b5c80 14 D0713 00:07:57.957560 786755 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:07:57.957623 786755 task_exit.go:204] [ 711: 711] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.957666 786755 task_signals.go:204] [ 711: 712] Signal 711, PID: 712, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.957685 786755 task_exit.go:204] [ 711: 711] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.957817 786755 task_signals.go:204] [ 711: 714] Signal 711, PID: 714, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.957855 786755 task_signals.go:204] [ 711: 715] Signal 711, PID: 715, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.957867 786755 task_exit.go:204] [ 711: 714] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.957879 786755 task_signals.go:204] [ 711: 713] Signal 711, PID: 713, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.957898 786755 task_exit.go:204] [ 711: 714] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.957905 786755 task_exit.go:204] [ 711: 714] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.957920 786755 task_exit.go:204] [ 711: 712] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.957998 786755 task_exit.go:204] [ 711: 712] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.958013 786755 task_exit.go:204] [ 711: 712] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.958023 786755 task_exit.go:204] [ 711: 715] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.958027 786755 task_exit.go:204] [ 711: 715] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.958031 786755 task_exit.go:204] [ 711: 715] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.958038 786755 task_exit.go:204] [ 711: 713] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.959640 786755 task_exit.go:204] [ 711: 713] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.959670 786755 task_exit.go:204] [ 711: 713] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.959687 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.959737 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:57.959753 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.959843 786755 task_exit.go:204] [ 711: 711] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.959973 786755 task_signals.go:470] [ 6: 18] Notified of signal 23 D0713 00:07:57.960002 786755 task_signals.go:220] [ 6: 18] Signal 23: delivering to handler D0713 00:07:57.960764 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.962037 786755 syscalls.go:262] [ 716: 716] Allocating stack with size of 8388608 bytes D0713 00:07:57.962190 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.962977 786755 usertrap_amd64.go:212] [ 716: 716] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:57.963017 786755 usertrap_amd64.go:106] [ 716: 716] Map a usertrap vma at 60000 D0713 00:07:57.964520 786755 usertrap_amd64.go:122] [ 716: 716] Allocate a new trap: 0xc00020e540 1 D0713 00:07:57.964552 786755 usertrap_amd64.go:225] [ 716: 716] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:07:57.964932 786755 usertrap_amd64.go:212] [ 716: 716] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:57.965164 786755 usertrap_amd64.go:122] [ 716: 716] Allocate a new trap: 0xc00020e540 2 D0713 00:07:57.965256 786755 usertrap_amd64.go:225] [ 716: 716] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:07:57.966151 786755 usertrap_amd64.go:212] [ 716: 716] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:57.966188 786755 usertrap_amd64.go:122] [ 716: 716] Allocate a new trap: 0xc00020e540 3 D0713 00:07:57.966203 786755 usertrap_amd64.go:225] [ 716: 716] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:07:57.973280 786755 usertrap_amd64.go:212] [ 716: 716] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:57.973311 786755 usertrap_amd64.go:122] [ 716: 716] Allocate a new trap: 0xc00020e540 4 D0713 00:07:57.973324 786755 usertrap_amd64.go:225] [ 716: 716] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:07:57.975001 786755 usertrap_amd64.go:212] [ 716: 716] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:57.975096 786755 usertrap_amd64.go:122] [ 716: 716] Allocate a new trap: 0xc00020e540 5 D0713 00:07:57.975131 786755 usertrap_amd64.go:225] [ 716: 716] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:07:57.975204 786755 usertrap_amd64.go:212] [ 716: 716] Found the pattern at ip 46b214:sysno 13 D0713 00:07:57.975234 786755 usertrap_amd64.go:122] [ 716: 716] Allocate a new trap: 0xc00020e540 6 D0713 00:07:57.975253 786755 usertrap_amd64.go:225] [ 716: 716] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:07:57.975703 786755 usertrap_amd64.go:212] [ 716: 716] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:57.975741 786755 usertrap_amd64.go:122] [ 716: 716] Allocate a new trap: 0xc00020e540 7 D0713 00:07:57.975754 786755 usertrap_amd64.go:225] [ 716: 716] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:07:57.976020 786755 usertrap_amd64.go:212] [ 716: 717] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:57.976049 786755 usertrap_amd64.go:122] [ 716: 717] Allocate a new trap: 0xc00020e540 8 D0713 00:07:57.976063 786755 usertrap_amd64.go:225] [ 716: 717] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:07:57.976239 786755 usertrap_amd64.go:212] [ 716: 717] Found the pattern at ip 46af76:sysno 35 D0713 00:07:57.976268 786755 usertrap_amd64.go:122] [ 716: 717] Allocate a new trap: 0xc00020e540 9 D0713 00:07:57.976282 786755 usertrap_amd64.go:225] [ 716: 717] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:07:57.976351 786755 usertrap_amd64.go:212] [ 716: 716] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:57.976368 786755 usertrap_amd64.go:122] [ 716: 716] Allocate a new trap: 0xc00020e540 10 D0713 00:07:57.976379 786755 usertrap_amd64.go:225] [ 716: 716] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:07:57.976407 786755 usertrap_amd64.go:212] [ 716: 717] Found the pattern at ip 46b020:sysno 39 D0713 00:07:57.976419 786755 usertrap_amd64.go:122] [ 716: 717] Allocate a new trap: 0xc00020e540 11 D0713 00:07:57.976432 786755 usertrap_amd64.go:225] [ 716: 717] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:07:57.976628 786755 usertrap_amd64.go:212] [ 716: 717] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:57.976669 786755 usertrap_amd64.go:122] [ 716: 717] Allocate a new trap: 0xc00020e540 12 D0713 00:07:57.976681 786755 usertrap_amd64.go:225] [ 716: 717] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:07:57.976795 786755 task_signals.go:470] [ 716: 719] Notified of signal 23 D0713 00:07:57.976891 786755 task_signals.go:179] [ 716: 719] Restarting syscall 202: interrupted by signal 23 D0713 00:07:57.976916 786755 task_signals.go:220] [ 716: 719] Signal 23: delivering to handler D0713 00:07:57.984652 786755 usertrap_amd64.go:212] [ 716: 716] Found the pattern at ip 46af29:sysno 293 D0713 00:07:57.984674 786755 usertrap_amd64.go:122] [ 716: 716] Allocate a new trap: 0xc00020e540 13 D0713 00:07:57.984683 786755 usertrap_amd64.go:225] [ 716: 716] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:07:57.987567 786755 task_signals.go:470] [ 716: 716] Notified of signal 23 D0713 00:07:57.987658 786755 task_signals.go:220] [ 716: 716] Signal 23: delivering to handler D0713 00:07:57.995174 786755 usertrap_amd64.go:212] [ 716: 716] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:57.995204 786755 usertrap_amd64.go:122] [ 716: 716] Allocate a new trap: 0xc00020e540 14 D0713 00:07:57.995221 786755 usertrap_amd64.go:225] [ 716: 716] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:07:57.995258 786755 task_exit.go:204] [ 716: 716] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.995296 786755 task_exit.go:204] [ 716: 716] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.995342 786755 task_signals.go:204] [ 716: 720] Signal 716, PID: 720, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.995355 786755 task_signals.go:204] [ 716: 717] Signal 716, PID: 717, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.995374 786755 task_exit.go:204] [ 716: 720] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.995386 786755 task_exit.go:204] [ 716: 720] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.995393 786755 task_exit.go:204] [ 716: 720] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.995412 786755 task_exit.go:204] [ 716: 717] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.995443 786755 task_exit.go:204] [ 716: 717] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.995450 786755 task_exit.go:204] [ 716: 717] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.995468 786755 task_signals.go:204] [ 716: 719] Signal 716, PID: 719, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.995486 786755 task_exit.go:204] [ 716: 719] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.995495 786755 task_exit.go:204] [ 716: 719] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.995500 786755 task_exit.go:204] [ 716: 719] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.995515 786755 task_signals.go:204] [ 716: 718] Signal 716, PID: 718, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:57.995537 786755 task_exit.go:204] [ 716: 718] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:57.997125 786755 task_exit.go:204] [ 716: 718] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:57.997167 786755 task_exit.go:204] [ 716: 718] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.997198 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:57.997246 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:57.997369 786755 task_exit.go:204] [ 716: 716] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:57.997949 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:57.999197 786755 syscalls.go:262] [ 721: 721] Allocating stack with size of 8388608 bytes D0713 00:07:57.999402 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.000301 786755 usertrap_amd64.go:212] [ 721: 721] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.000353 786755 usertrap_amd64.go:106] [ 721: 721] Map a usertrap vma at 64000 D0713 00:07:58.000449 786755 usertrap_amd64.go:122] [ 721: 721] Allocate a new trap: 0xc0019e7590 1 D0713 00:07:58.000483 786755 usertrap_amd64.go:225] [ 721: 721] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:07:58.000742 786755 usertrap_amd64.go:212] [ 721: 721] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.000770 786755 usertrap_amd64.go:122] [ 721: 721] Allocate a new trap: 0xc0019e7590 2 D0713 00:07:58.000782 786755 usertrap_amd64.go:225] [ 721: 721] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:07:58.001613 786755 usertrap_amd64.go:212] [ 721: 721] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.001697 786755 usertrap_amd64.go:122] [ 721: 721] Allocate a new trap: 0xc0019e7590 3 D0713 00:07:58.001721 786755 usertrap_amd64.go:225] [ 721: 721] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:07:58.007504 786755 usertrap_amd64.go:212] [ 721: 721] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.007526 786755 usertrap_amd64.go:122] [ 721: 721] Allocate a new trap: 0xc0019e7590 4 D0713 00:07:58.007539 786755 usertrap_amd64.go:225] [ 721: 721] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:07:58.008580 786755 usertrap_amd64.go:212] [ 721: 721] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.008602 786755 usertrap_amd64.go:122] [ 721: 721] Allocate a new trap: 0xc0019e7590 5 D0713 00:07:58.008617 786755 usertrap_amd64.go:225] [ 721: 721] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:07:58.008667 786755 usertrap_amd64.go:212] [ 721: 721] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.008676 786755 usertrap_amd64.go:122] [ 721: 721] Allocate a new trap: 0xc0019e7590 6 D0713 00:07:58.008710 786755 usertrap_amd64.go:225] [ 721: 721] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:07:58.009091 786755 usertrap_amd64.go:212] [ 721: 721] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.009114 786755 usertrap_amd64.go:122] [ 721: 721] Allocate a new trap: 0xc0019e7590 7 D0713 00:07:58.009126 786755 usertrap_amd64.go:225] [ 721: 721] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:07:58.009213 786755 usertrap_amd64.go:212] [ 721: 722] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.009233 786755 usertrap_amd64.go:122] [ 721: 722] Allocate a new trap: 0xc0019e7590 8 D0713 00:07:58.009239 786755 usertrap_amd64.go:225] [ 721: 722] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:07:58.009353 786755 usertrap_amd64.go:212] [ 721: 722] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.009372 786755 usertrap_amd64.go:122] [ 721: 722] Allocate a new trap: 0xc0019e7590 9 D0713 00:07:58.009379 786755 usertrap_amd64.go:225] [ 721: 722] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:07:58.009690 786755 usertrap_amd64.go:212] [ 721: 721] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.009714 786755 usertrap_amd64.go:122] [ 721: 721] Allocate a new trap: 0xc0019e7590 10 D0713 00:07:58.009720 786755 usertrap_amd64.go:225] [ 721: 721] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:07:58.010175 786755 usertrap_amd64.go:212] [ 721: 722] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.010189 786755 usertrap_amd64.go:122] [ 721: 722] Allocate a new trap: 0xc0019e7590 11 D0713 00:07:58.010198 786755 usertrap_amd64.go:225] [ 721: 722] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:07:58.010384 786755 usertrap_amd64.go:212] [ 721: 722] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.010433 786755 usertrap_amd64.go:122] [ 721: 722] Allocate a new trap: 0xc0019e7590 12 D0713 00:07:58.010471 786755 usertrap_amd64.go:225] [ 721: 722] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:07:58.010503 786755 task_signals.go:470] [ 721: 721] Notified of signal 23 D0713 00:07:58.010545 786755 task_signals.go:220] [ 721: 721] Signal 23: delivering to handler D0713 00:07:58.017354 786755 usertrap_amd64.go:212] [ 721: 721] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.017379 786755 usertrap_amd64.go:122] [ 721: 721] Allocate a new trap: 0xc0019e7590 13 D0713 00:07:58.017388 786755 usertrap_amd64.go:225] [ 721: 721] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:07:58.021041 786755 task_signals.go:470] [ 721: 721] Notified of signal 23 D0713 00:07:58.021099 786755 task_signals.go:220] [ 721: 721] Signal 23: delivering to handler D0713 00:07:58.028427 786755 usertrap_amd64.go:212] [ 721: 721] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.028468 786755 usertrap_amd64.go:122] [ 721: 721] Allocate a new trap: 0xc0019e7590 14 D0713 00:07:58.028483 786755 usertrap_amd64.go:225] [ 721: 721] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:07:58.028577 786755 task_exit.go:204] [ 721: 721] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.028622 786755 task_exit.go:204] [ 721: 721] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.028656 786755 task_signals.go:204] [ 721: 724] Signal 721, PID: 724, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.028683 786755 task_exit.go:204] [ 721: 724] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.028693 786755 task_exit.go:204] [ 721: 724] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.028693 786755 task_signals.go:204] [ 721: 723] Signal 721, PID: 723, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.028699 786755 task_exit.go:204] [ 721: 724] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.028680 786755 task_signals.go:204] [ 721: 725] Signal 721, PID: 725, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.028731 786755 task_exit.go:204] [ 721: 725] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.028744 786755 task_exit.go:204] [ 721: 725] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.028752 786755 task_exit.go:204] [ 721: 725] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.028658 786755 task_signals.go:204] [ 721: 722] Signal 721, PID: 722, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.028767 786755 task_exit.go:204] [ 721: 722] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.028778 786755 task_exit.go:204] [ 721: 722] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.028818 786755 task_exit.go:204] [ 721: 722] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.028829 786755 task_exit.go:204] [ 721: 723] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.030223 786755 task_exit.go:204] [ 721: 723] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.030251 786755 task_exit.go:204] [ 721: 723] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.030266 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.030293 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.030610 786755 task_exit.go:204] [ 721: 721] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.031244 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.032498 786755 syscalls.go:262] [ 726: 726] Allocating stack with size of 8388608 bytes D0713 00:07:58.032654 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.035214 786755 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.035253 786755 usertrap_amd64.go:106] [ 726: 726] Map a usertrap vma at 66000 D0713 00:07:58.035324 786755 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc0019e7620 1 D0713 00:07:58.035356 786755 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:07:58.035614 786755 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.035643 786755 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc0019e7620 2 D0713 00:07:58.035686 786755 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:07:58.036240 786755 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.036270 786755 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc0019e7620 3 D0713 00:07:58.036281 786755 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:07:58.043588 786755 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.043613 786755 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc0019e7620 4 D0713 00:07:58.043625 786755 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:07:58.045064 786755 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.045090 786755 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc0019e7620 5 D0713 00:07:58.045102 786755 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:07:58.045139 786755 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.045145 786755 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc0019e7620 6 D0713 00:07:58.045152 786755 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:07:58.045313 786755 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.045328 786755 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc0019e7620 7 D0713 00:07:58.045334 786755 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:07:58.045454 786755 usertrap_amd64.go:212] [ 726: 727] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.045487 786755 usertrap_amd64.go:122] [ 726: 727] Allocate a new trap: 0xc0019e7620 8 D0713 00:07:58.045498 786755 usertrap_amd64.go:225] [ 726: 727] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:07:58.045622 786755 usertrap_amd64.go:212] [ 726: 727] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:58.045645 786755 usertrap_amd64.go:122] [ 726: 727] Allocate a new trap: 0xc0019e7620 9 D0713 00:07:58.045655 786755 usertrap_amd64.go:225] [ 726: 727] Apply the binary patch addr 46b6e0 trap addr 662d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:07:58.045669 786755 usertrap_amd64.go:212] [ 726: 727] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.045675 786755 usertrap_amd64.go:122] [ 726: 727] Allocate a new trap: 0xc0019e7620 10 D0713 00:07:58.045681 786755 usertrap_amd64.go:225] [ 726: 727] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:07:58.045742 786755 usertrap_amd64.go:212] [ 726: 727] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.045766 786755 usertrap_amd64.go:122] [ 726: 727] Allocate a new trap: 0xc0019e7620 11 D0713 00:07:58.045783 786755 usertrap_amd64.go:225] [ 726: 727] Apply the binary patch addr 46af76 trap addr 66370 ([184 35 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:07:58.052931 786755 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.053004 786755 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc0019e7620 12 D0713 00:07:58.053015 786755 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:07:58.056672 786755 usertrap_amd64.go:212] [ 726: 727] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.056702 786755 usertrap_amd64.go:122] [ 726: 727] Allocate a new trap: 0xc0019e7620 13 D0713 00:07:58.056715 786755 usertrap_amd64.go:225] [ 726: 727] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:07:58.056764 786755 usertrap_amd64.go:212] [ 726: 727] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.056774 786755 usertrap_amd64.go:122] [ 726: 727] Allocate a new trap: 0xc0019e7620 14 D0713 00:07:58.056783 786755 usertrap_amd64.go:225] [ 726: 727] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:07:58.056807 786755 task_signals.go:470] [ 726: 726] Notified of signal 23 D0713 00:07:58.056862 786755 task_signals.go:220] [ 726: 726] Signal 23: delivering to handler D0713 00:07:58.063474 786755 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.063539 786755 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc0019e7620 15 D0713 00:07:58.063561 786755 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 00:07:58.063686 786755 task_exit.go:204] [ 726: 726] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.063736 786755 task_exit.go:204] [ 726: 726] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.063737 786755 task_signals.go:204] [ 726: 729] Signal 726, PID: 729, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.063766 786755 task_exit.go:204] [ 726: 729] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.063768 786755 task_signals.go:204] [ 726: 728] Signal 726, PID: 728, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.063791 786755 task_exit.go:204] [ 726: 729] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.063842 786755 task_exit.go:204] [ 726: 729] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.063766 786755 task_signals.go:204] [ 726: 727] Signal 726, PID: 727, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.063883 786755 task_exit.go:204] [ 726: 727] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.063895 786755 task_exit.go:204] [ 726: 727] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.063900 786755 task_exit.go:204] [ 726: 727] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.063912 786755 task_exit.go:204] [ 726: 728] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.063923 786755 task_exit.go:204] [ 726: 728] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.063928 786755 task_exit.go:204] [ 726: 728] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.064015 786755 task_signals.go:204] [ 726: 730] Signal 726, PID: 730, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.064043 786755 task_exit.go:204] [ 726: 730] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.065509 786755 task_exit.go:204] [ 726: 730] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.065547 786755 task_exit.go:204] [ 726: 730] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.065561 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.065586 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.065599 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.065798 786755 task_exit.go:204] [ 726: 726] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.066598 786755 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.068251 786755 syscalls.go:262] [ 731: 731] Allocating stack with size of 8388608 bytes D0713 00:07:58.068379 786755 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.069177 786755 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.069220 786755 usertrap_amd64.go:106] [ 731: 731] Map a usertrap vma at 6a000 D0713 00:07:58.069428 786755 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc000ac6b40 1 D0713 00:07:58.069475 786755 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:07:58.069826 786755 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.069852 786755 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc000ac6b40 2 D0713 00:07:58.069865 786755 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:07:58.070748 786755 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.070776 786755 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc000ac6b40 3 D0713 00:07:58.070794 786755 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:07:58.076763 786755 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.076777 786755 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc000ac6b40 4 D0713 00:07:58.076789 786755 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:07:58.078303 786755 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.078332 786755 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc000ac6b40 5 D0713 00:07:58.078340 786755 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:07:58.078565 786755 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.078584 786755 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc000ac6b40 6 D0713 00:07:58.078591 786755 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:07:58.078752 786755 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.078767 786755 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc000ac6b40 7 D0713 00:07:58.078772 786755 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:07:58.078911 786755 usertrap_amd64.go:212] [ 731: 732] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.078938 786755 usertrap_amd64.go:122] [ 731: 732] Allocate a new trap: 0xc000ac6b40 8 D0713 00:07:58.078946 786755 usertrap_amd64.go:225] [ 731: 732] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:07:58.079136 786755 usertrap_amd64.go:212] [ 731: 732] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.079223 786755 usertrap_amd64.go:122] [ 731: 732] Allocate a new trap: 0xc000ac6b40 9 D0713 00:07:58.079295 786755 usertrap_amd64.go:225] [ 731: 732] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:07:58.079342 786755 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.079471 786755 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc000ac6b40 10 D0713 00:07:58.079484 786755 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:07:58.087196 786755 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.087232 786755 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc000ac6b40 11 D0713 00:07:58.087247 786755 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:07:58.089770 786755 usertrap_amd64.go:212] [ 731: 732] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.089797 786755 usertrap_amd64.go:122] [ 731: 732] Allocate a new trap: 0xc000ac6b40 12 D0713 00:07:58.089805 786755 usertrap_amd64.go:225] [ 731: 732] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:07:58.089856 786755 usertrap_amd64.go:212] [ 731: 732] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.089884 786755 usertrap_amd64.go:122] [ 731: 732] Allocate a new trap: 0xc000ac6b40 13 D0713 00:07:58.089896 786755 usertrap_amd64.go:225] [ 731: 732] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:07:58.089944 786755 task_signals.go:470] [ 731: 731] Notified of signal 23 D0713 00:07:58.090019 786755 task_signals.go:220] [ 731: 731] Signal 23: delivering to handler I0713 00:07:58.098383 786755 compat.go:120] Unsupported syscall sys_451(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_451 for more information. D0713 00:07:58.098624 786755 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.098650 786755 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc000ac6b40 14 D0713 00:07:58.098660 786755 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:07:58.098721 786755 task_exit.go:204] [ 731: 731] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.098748 786755 task_exit.go:204] [ 731: 731] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.098778 786755 task_signals.go:204] [ 731: 732] Signal 731, PID: 732, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.098796 786755 task_exit.go:204] [ 731: 732] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.098806 786755 task_exit.go:204] [ 731: 732] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.098811 786755 task_exit.go:204] [ 731: 732] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.098832 786755 task_signals.go:204] [ 731: 735] Signal 731, PID: 735, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.098834 786755 task_signals.go:204] [ 731: 734] Signal 731, PID: 734, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.098846 786755 task_exit.go:204] [ 731: 735] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.098863 786755 task_signals.go:204] [ 731: 736] Signal 731, PID: 736, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.098868 786755 task_exit.go:204] [ 731: 735] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.098881 786755 task_exit.go:204] [ 731: 735] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.098890 786755 task_exit.go:204] [ 731: 736] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.098889 786755 task_signals.go:204] [ 731: 733] Signal 731, PID: 733, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.098897 786755 task_exit.go:204] [ 731: 736] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.098900 786755 task_exit.go:204] [ 731: 736] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.098905 786755 task_exit.go:204] [ 731: 734] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.098911 786755 task_exit.go:204] [ 731: 734] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.098928 786755 task_exit.go:204] [ 731: 734] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.098938 786755 task_exit.go:204] [ 731: 733] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.100336 786755 task_exit.go:204] [ 731: 733] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.100368 786755 task_exit.go:204] [ 731: 733] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.100381 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.100488 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.100522 786755 task_exit.go:204] [ 731: 731] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.101404 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.103149 786755 syscalls.go:262] [ 737: 737] Allocating stack with size of 8388608 bytes D0713 00:07:58.103329 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.104780 786755 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.104830 786755 usertrap_amd64.go:106] [ 737: 737] Map a usertrap vma at 68000 D0713 00:07:58.104921 786755 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc000e1e270 1 D0713 00:07:58.105016 786755 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:07:58.105449 786755 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.105481 786755 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc000e1e270 2 D0713 00:07:58.105495 786755 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:07:58.106241 786755 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.106270 786755 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc000e1e270 3 D0713 00:07:58.106280 786755 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:07:58.112626 786755 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.112687 786755 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc000e1e270 4 D0713 00:07:58.112702 786755 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:07:58.113996 786755 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.114015 786755 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc000e1e270 5 D0713 00:07:58.114029 786755 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:07:58.114096 786755 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.114116 786755 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc000e1e270 6 D0713 00:07:58.114126 786755 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:07:58.114537 786755 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.114559 786755 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc000e1e270 7 D0713 00:07:58.114567 786755 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:07:58.114728 786755 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.114760 786755 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc000e1e270 8 D0713 00:07:58.114773 786755 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:07:58.115093 786755 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.115108 786755 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc000e1e270 9 D0713 00:07:58.115118 786755 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:07:58.115171 786755 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.115196 786755 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc000e1e270 10 D0713 00:07:58.115209 786755 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:07:58.115387 786755 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.115413 786755 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc000e1e270 11 D0713 00:07:58.115423 786755 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:07:58.115474 786755 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.115482 786755 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc000e1e270 12 D0713 00:07:58.115491 786755 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:07:58.115552 786755 task_signals.go:470] [ 737: 740] Notified of signal 23 D0713 00:07:58.115601 786755 task_signals.go:220] [ 737: 740] Signal 23: delivering to handler D0713 00:07:58.123670 786755 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.123703 786755 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc000e1e270 13 D0713 00:07:58.123715 786755 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:07:58.126620 786755 task_signals.go:470] [ 737: 737] Notified of signal 23 D0713 00:07:58.126663 786755 task_signals.go:220] [ 737: 737] Signal 23: delivering to handler D0713 00:07:58.135228 786755 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.135280 786755 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc000e1e270 14 D0713 00:07:58.135307 786755 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:07:58.135396 786755 task_exit.go:204] [ 737: 737] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.135427 786755 task_exit.go:204] [ 737: 737] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.135463 786755 task_signals.go:204] [ 737: 738] Signal 737, PID: 738, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.135491 786755 task_signals.go:204] [ 737: 740] Signal 737, PID: 740, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.135500 786755 task_exit.go:204] [ 737: 738] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.135517 786755 task_signals.go:204] [ 737: 741] Signal 737, PID: 741, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.135536 786755 task_exit.go:204] [ 737: 738] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.135558 786755 task_exit.go:204] [ 737: 738] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.135577 786755 task_signals.go:204] [ 737: 739] Signal 737, PID: 739, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.135592 786755 task_exit.go:204] [ 737: 739] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.135601 786755 task_exit.go:204] [ 737: 739] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.135608 786755 task_exit.go:204] [ 737: 739] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.135617 786755 task_exit.go:204] [ 737: 740] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.135640 786755 task_exit.go:204] [ 737: 740] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.135648 786755 task_exit.go:204] [ 737: 740] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.135661 786755 task_exit.go:204] [ 737: 741] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.137227 786755 task_exit.go:204] [ 737: 741] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.137264 786755 task_exit.go:204] [ 737: 741] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.137280 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.137315 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.137331 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.137593 786755 task_exit.go:204] [ 737: 737] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.138277 786755 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.139768 786755 syscalls.go:262] [ 742: 742] Allocating stack with size of 8388608 bytes D0713 00:07:58.139858 786755 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.141379 786755 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.141428 786755 usertrap_amd64.go:106] [ 742: 742] Map a usertrap vma at 67000 D0713 00:07:58.141520 786755 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc0003c1c20 1 D0713 00:07:58.141603 786755 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:07:58.141989 786755 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.142018 786755 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc0003c1c20 2 D0713 00:07:58.142031 786755 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:07:58.142652 786755 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.142685 786755 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc0003c1c20 3 D0713 00:07:58.142700 786755 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:07:58.149867 786755 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.149899 786755 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc0003c1c20 4 D0713 00:07:58.149921 786755 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:07:58.151280 786755 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.151311 786755 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc0003c1c20 5 D0713 00:07:58.151326 786755 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:07:58.151375 786755 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.151383 786755 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc0003c1c20 6 D0713 00:07:58.151392 786755 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:07:58.151636 786755 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.151660 786755 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc0003c1c20 7 D0713 00:07:58.151673 786755 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:07:58.151854 786755 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.151885 786755 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc0003c1c20 8 D0713 00:07:58.151898 786755 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:07:58.152211 786755 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.152236 786755 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc0003c1c20 9 D0713 00:07:58.152249 786755 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:07:58.152519 786755 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.152543 786755 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc0003c1c20 10 D0713 00:07:58.152557 786755 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:07:58.161161 786755 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.161178 786755 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc0003c1c20 11 D0713 00:07:58.161247 786755 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:07:58.163245 786755 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.163324 786755 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc0003c1c20 12 D0713 00:07:58.163343 786755 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:07:58.165200 786755 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.165231 786755 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc0003c1c20 13 D0713 00:07:58.165244 786755 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:07:58.165341 786755 task_signals.go:470] [ 742: 742] Notified of signal 23 D0713 00:07:58.165474 786755 task_signals.go:220] [ 742: 742] Signal 23: delivering to handler I0713 00:07:58.174002 786755 compat.go:120] Unsupported syscall membarrier(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/membarrier for more information. D0713 00:07:58.174078 786755 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.174092 786755 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc0003c1c20 14 D0713 00:07:58.174104 786755 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:07:58.174294 786755 task_exit.go:204] [ 742: 742] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.174405 786755 task_exit.go:204] [ 742: 742] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.174468 786755 task_signals.go:204] [ 742: 743] Signal 742, PID: 743, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.174494 786755 task_exit.go:204] [ 742: 743] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.174506 786755 task_exit.go:204] [ 742: 743] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.174513 786755 task_exit.go:204] [ 742: 743] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.174532 786755 task_signals.go:204] [ 742: 744] Signal 742, PID: 744, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.174554 786755 task_exit.go:204] [ 742: 744] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.174562 786755 task_exit.go:204] [ 742: 744] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.174569 786755 task_exit.go:204] [ 742: 744] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.174593 786755 task_signals.go:204] [ 742: 745] Signal 742, PID: 745, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.174606 786755 task_exit.go:204] [ 742: 745] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.174614 786755 task_exit.go:204] [ 742: 745] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.174620 786755 task_exit.go:204] [ 742: 745] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.174636 786755 task_signals.go:204] [ 742: 746] Signal 742, PID: 746, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.174647 786755 task_exit.go:204] [ 742: 746] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.176102 786755 task_exit.go:204] [ 742: 746] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.176141 786755 task_exit.go:204] [ 742: 746] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.176156 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.176187 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.176294 786755 task_exit.go:204] [ 742: 742] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.177161 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.178885 786755 syscalls.go:262] [ 747: 747] Allocating stack with size of 8388608 bytes D0713 00:07:58.179014 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.180137 786755 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.180173 786755 usertrap_amd64.go:106] [ 747: 747] Map a usertrap vma at 64000 D0713 00:07:58.180267 786755 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc000ac75c0 1 D0713 00:07:58.180295 786755 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:07:58.180487 786755 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.180508 786755 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc000ac75c0 2 D0713 00:07:58.180517 786755 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:07:58.181124 786755 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.181151 786755 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc000ac75c0 3 D0713 00:07:58.181162 786755 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:07:58.187650 786755 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.187673 786755 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc000ac75c0 4 D0713 00:07:58.187686 786755 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:07:58.189352 786755 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.189431 786755 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc000ac75c0 5 D0713 00:07:58.189448 786755 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:07:58.189511 786755 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.189547 786755 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc000ac75c0 6 D0713 00:07:58.189560 786755 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:07:58.189930 786755 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.189952 786755 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc000ac75c0 7 D0713 00:07:58.189962 786755 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:07:58.190098 786755 usertrap_amd64.go:212] [ 747: 748] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.190115 786755 usertrap_amd64.go:122] [ 747: 748] Allocate a new trap: 0xc000ac75c0 8 D0713 00:07:58.190124 786755 usertrap_amd64.go:225] [ 747: 748] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:07:58.190321 786755 usertrap_amd64.go:212] [ 747: 748] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.190346 786755 usertrap_amd64.go:122] [ 747: 748] Allocate a new trap: 0xc000ac75c0 9 D0713 00:07:58.190360 786755 usertrap_amd64.go:225] [ 747: 748] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:07:58.190550 786755 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.190579 786755 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc000ac75c0 10 D0713 00:07:58.190588 786755 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:07:58.199031 786755 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.199059 786755 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc000ac75c0 11 D0713 00:07:58.199069 786755 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:07:58.201935 786755 usertrap_amd64.go:212] [ 747: 748] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.201994 786755 usertrap_amd64.go:122] [ 747: 748] Allocate a new trap: 0xc000ac75c0 12 D0713 00:07:58.202017 786755 usertrap_amd64.go:225] [ 747: 748] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:07:58.202088 786755 usertrap_amd64.go:212] [ 747: 748] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.202096 786755 usertrap_amd64.go:122] [ 747: 748] Allocate a new trap: 0xc000ac75c0 13 D0713 00:07:58.202103 786755 usertrap_amd64.go:225] [ 747: 748] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:07:58.202124 786755 task_signals.go:470] [ 747: 747] Notified of signal 23 D0713 00:07:58.202152 786755 task_signals.go:220] [ 747: 747] Signal 23: delivering to handler D0713 00:07:58.210591 786755 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.210612 786755 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc000ac75c0 14 D0713 00:07:58.210626 786755 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:07:58.210680 786755 task_exit.go:204] [ 747: 747] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.210735 786755 task_exit.go:204] [ 747: 747] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.210737 786755 task_signals.go:204] [ 747: 751] Signal 747, PID: 751, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.210750 786755 task_signals.go:204] [ 747: 750] Signal 747, PID: 750, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.210760 786755 task_signals.go:204] [ 747: 749] Signal 747, PID: 749, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.210762 786755 task_exit.go:204] [ 747: 751] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.210781 786755 task_exit.go:204] [ 747: 751] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.210801 786755 task_exit.go:204] [ 747: 751] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.210821 786755 task_signals.go:204] [ 747: 748] Signal 747, PID: 748, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.210844 786755 task_exit.go:204] [ 747: 748] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.210853 786755 task_exit.go:204] [ 747: 748] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.210859 786755 task_exit.go:204] [ 747: 748] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.210869 786755 task_exit.go:204] [ 747: 750] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.210876 786755 task_exit.go:204] [ 747: 750] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.210882 786755 task_exit.go:204] [ 747: 750] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.210930 786755 task_exit.go:204] [ 747: 749] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.212354 786755 task_exit.go:204] [ 747: 749] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.212381 786755 task_exit.go:204] [ 747: 749] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.212398 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.212451 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.212473 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.212605 786755 task_exit.go:204] [ 747: 747] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.213376 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.214803 786755 syscalls.go:262] [ 752: 752] Allocating stack with size of 8388608 bytes D0713 00:07:58.214901 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.215807 786755 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.215884 786755 usertrap_amd64.go:106] [ 752: 752] Map a usertrap vma at 60000 D0713 00:07:58.216179 786755 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc0006050b0 1 D0713 00:07:58.216216 786755 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:07:58.216688 786755 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.216711 786755 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc0006050b0 2 D0713 00:07:58.216726 786755 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:07:58.217555 786755 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.217607 786755 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc0006050b0 3 D0713 00:07:58.217620 786755 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:07:58.224283 786755 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.224315 786755 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc0006050b0 4 D0713 00:07:58.224328 786755 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:07:58.225620 786755 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.225648 786755 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc0006050b0 5 D0713 00:07:58.225658 786755 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:07:58.225720 786755 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.225730 786755 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc0006050b0 6 D0713 00:07:58.225737 786755 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:07:58.225998 786755 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.226021 786755 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc0006050b0 7 D0713 00:07:58.226031 786755 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:07:58.226184 786755 usertrap_amd64.go:212] [ 752: 753] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.226214 786755 usertrap_amd64.go:122] [ 752: 753] Allocate a new trap: 0xc0006050b0 8 D0713 00:07:58.226231 786755 usertrap_amd64.go:225] [ 752: 753] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:07:58.226467 786755 usertrap_amd64.go:212] [ 752: 753] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.226496 786755 usertrap_amd64.go:122] [ 752: 753] Allocate a new trap: 0xc0006050b0 9 D0713 00:07:58.226508 786755 usertrap_amd64.go:225] [ 752: 753] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:07:58.226594 786755 usertrap_amd64.go:212] [ 752: 754] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:58.226609 786755 usertrap_amd64.go:122] [ 752: 754] Allocate a new trap: 0xc0006050b0 10 D0713 00:07:58.226617 786755 usertrap_amd64.go:225] [ 752: 754] Apply the binary patch addr 46b6e0 trap addr 60320 ([184 24 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:07:58.226646 786755 usertrap_amd64.go:212] [ 752: 754] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.226654 786755 usertrap_amd64.go:122] [ 752: 754] Allocate a new trap: 0xc0006050b0 11 D0713 00:07:58.226662 786755 usertrap_amd64.go:225] [ 752: 754] Apply the binary patch addr 46b57c trap addr 60370 ([184 202 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:07:58.234876 786755 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.234909 786755 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc0006050b0 12 D0713 00:07:58.234918 786755 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46af29 trap addr 603c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:07:58.237789 786755 usertrap_amd64.go:212] [ 752: 753] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.237847 786755 usertrap_amd64.go:122] [ 752: 753] Allocate a new trap: 0xc0006050b0 13 D0713 00:07:58.237863 786755 usertrap_amd64.go:225] [ 752: 753] Apply the binary patch addr 46b020 trap addr 60410 ([184 39 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:07:58.237928 786755 usertrap_amd64.go:212] [ 752: 753] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.237937 786755 usertrap_amd64.go:122] [ 752: 753] Allocate a new trap: 0xc0006050b0 14 D0713 00:07:58.237945 786755 usertrap_amd64.go:225] [ 752: 753] Apply the binary patch addr 46b04f trap addr 60460 ([184 234 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:07:58.238009 786755 task_signals.go:470] [ 752: 752] Notified of signal 23 D0713 00:07:58.238080 786755 task_signals.go:220] [ 752: 752] Signal 23: delivering to handler I0713 00:07:58.245853 786755 compat.go:120] Unsupported syscall sys_447(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_447 for more information. D0713 00:07:58.245949 786755 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.245966 786755 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc0006050b0 15 D0713 00:07:58.245979 786755 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0713 00:07:58.246043 786755 task_exit.go:204] [ 752: 752] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.246089 786755 task_exit.go:204] [ 752: 752] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.246109 786755 task_signals.go:204] [ 752: 754] Signal 752, PID: 754, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.246106 786755 task_signals.go:204] [ 752: 756] Signal 752, PID: 756, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.246124 786755 task_signals.go:204] [ 752: 753] Signal 752, PID: 753, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.246143 786755 task_exit.go:204] [ 752: 754] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.246155 786755 task_signals.go:204] [ 752: 755] Signal 752, PID: 755, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.246179 786755 task_exit.go:204] [ 752: 754] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.246190 786755 task_exit.go:204] [ 752: 754] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.246203 786755 task_exit.go:204] [ 752: 756] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.246211 786755 task_exit.go:204] [ 752: 756] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.246216 786755 task_exit.go:204] [ 752: 756] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.246226 786755 task_exit.go:204] [ 752: 753] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.246269 786755 task_exit.go:204] [ 752: 753] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.246282 786755 task_exit.go:204] [ 752: 753] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.246294 786755 task_exit.go:204] [ 752: 755] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.247768 786755 task_exit.go:204] [ 752: 755] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.247790 786755 task_exit.go:204] [ 752: 755] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.247808 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.247844 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.247865 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.248012 786755 task_exit.go:204] [ 752: 752] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.248365 786755 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:07:58.248511 786755 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:07:58.248863 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.250559 786755 syscalls.go:262] [ 757: 757] Allocating stack with size of 8388608 bytes D0713 00:07:58.250659 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.252551 786755 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.252588 786755 usertrap_amd64.go:106] [ 757: 757] Map a usertrap vma at 65000 D0713 00:07:58.252701 786755 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc000bdbb90 1 D0713 00:07:58.252737 786755 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:07:58.253220 786755 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.253241 786755 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc000bdbb90 2 D0713 00:07:58.253248 786755 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:07:58.253775 786755 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.253797 786755 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc000bdbb90 3 D0713 00:07:58.253806 786755 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:07:58.260233 786755 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.260273 786755 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc000bdbb90 4 D0713 00:07:58.260289 786755 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:07:58.261670 786755 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.261687 786755 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc000bdbb90 5 D0713 00:07:58.261700 786755 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:07:58.261735 786755 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.261740 786755 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc000bdbb90 6 D0713 00:07:58.261745 786755 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:07:58.261992 786755 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.262036 786755 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc000bdbb90 7 D0713 00:07:58.262050 786755 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:07:58.262228 786755 usertrap_amd64.go:212] [ 757: 758] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.262248 786755 usertrap_amd64.go:122] [ 757: 758] Allocate a new trap: 0xc000bdbb90 8 D0713 00:07:58.262254 786755 usertrap_amd64.go:225] [ 757: 758] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:07:58.262388 786755 usertrap_amd64.go:212] [ 757: 758] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.262410 786755 usertrap_amd64.go:122] [ 757: 758] Allocate a new trap: 0xc000bdbb90 9 D0713 00:07:58.262419 786755 usertrap_amd64.go:225] [ 757: 758] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:07:58.262623 786755 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.262653 786755 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc000bdbb90 10 D0713 00:07:58.262666 786755 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:07:58.271070 786755 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.271101 786755 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc000bdbb90 11 D0713 00:07:58.271113 786755 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:07:58.275465 786755 usertrap_amd64.go:212] [ 757: 758] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.275482 786755 usertrap_amd64.go:122] [ 757: 758] Allocate a new trap: 0xc000bdbb90 12 D0713 00:07:58.275494 786755 usertrap_amd64.go:225] [ 757: 758] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:07:58.275566 786755 usertrap_amd64.go:212] [ 757: 758] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.275591 786755 usertrap_amd64.go:122] [ 757: 758] Allocate a new trap: 0xc000bdbb90 13 D0713 00:07:58.275603 786755 usertrap_amd64.go:225] [ 757: 758] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:07:58.275631 786755 task_signals.go:470] [ 757: 757] Notified of signal 23 D0713 00:07:58.275720 786755 task_signals.go:220] [ 757: 757] Signal 23: delivering to handler I0713 00:07:58.282238 786755 compat.go:120] Unsupported syscall migrate_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/migrate_pages for more information. D0713 00:07:58.282308 786755 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.282320 786755 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc000bdbb90 14 D0713 00:07:58.282332 786755 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:07:58.282378 786755 task_exit.go:204] [ 757: 757] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.282415 786755 task_exit.go:204] [ 757: 757] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.282438 786755 task_signals.go:204] [ 757: 760] Signal 757, PID: 760, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.282456 786755 task_exit.go:204] [ 757: 760] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.282455 786755 task_signals.go:204] [ 757: 758] Signal 757, PID: 758, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.282465 786755 task_exit.go:204] [ 757: 760] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.282534 786755 task_exit.go:204] [ 757: 760] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.282438 786755 task_signals.go:204] [ 757: 759] Signal 757, PID: 759, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.282556 786755 task_signals.go:204] [ 757: 761] Signal 757, PID: 761, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.282567 786755 task_exit.go:204] [ 757: 758] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.282587 786755 task_exit.go:204] [ 757: 758] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.282601 786755 task_exit.go:204] [ 757: 758] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.282614 786755 task_exit.go:204] [ 757: 759] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.282622 786755 task_exit.go:204] [ 757: 759] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.282629 786755 task_exit.go:204] [ 757: 759] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.282638 786755 task_exit.go:204] [ 757: 761] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.284149 786755 task_exit.go:204] [ 757: 761] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.284173 786755 task_exit.go:204] [ 757: 761] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.284194 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.284218 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.284225 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.284367 786755 task_exit.go:204] [ 757: 757] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.285054 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.286747 786755 syscalls.go:262] [ 762: 762] Allocating stack with size of 8388608 bytes D0713 00:07:58.286959 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.288181 786755 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.288226 786755 usertrap_amd64.go:106] [ 762: 762] Map a usertrap vma at 64000 D0713 00:07:58.288317 786755 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc000605200 1 D0713 00:07:58.288337 786755 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:07:58.288642 786755 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.288674 786755 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc000605200 2 D0713 00:07:58.288687 786755 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:07:58.289438 786755 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.289467 786755 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc000605200 3 D0713 00:07:58.289478 786755 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:07:58.295954 786755 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.295977 786755 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc000605200 4 D0713 00:07:58.295991 786755 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:07:58.297289 786755 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.297320 786755 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc000605200 5 D0713 00:07:58.297333 786755 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:07:58.297374 786755 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.297382 786755 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc000605200 6 D0713 00:07:58.297389 786755 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:07:58.297601 786755 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.297621 786755 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc000605200 7 D0713 00:07:58.297629 786755 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:07:58.297773 786755 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.297791 786755 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc000605200 8 D0713 00:07:58.297801 786755 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:07:58.298124 786755 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.298146 786755 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc000605200 9 D0713 00:07:58.298159 786755 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:07:58.298194 786755 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.298267 786755 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc000605200 10 D0713 00:07:58.298294 786755 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:07:58.298932 786755 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.298962 786755 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc000605200 11 D0713 00:07:58.298976 786755 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:07:58.299065 786755 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.299085 786755 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc000605200 12 D0713 00:07:58.299095 786755 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:07:58.299121 786755 task_signals.go:470] [ 762: 762] Notified of signal 23 D0713 00:07:58.299142 786755 task_signals.go:220] [ 762: 762] Signal 23: delivering to handler D0713 00:07:58.305962 786755 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.305993 786755 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc000605200 13 D0713 00:07:58.306002 786755 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:07:58.309807 786755 task_signals.go:470] [ 762: 762] Notified of signal 23 D0713 00:07:58.309930 786755 task_signals.go:220] [ 762: 762] Signal 23: delivering to handler D0713 00:07:58.316802 786755 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.316822 786755 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc000605200 14 D0713 00:07:58.316835 786755 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:07:58.316895 786755 task_exit.go:204] [ 762: 762] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.316931 786755 task_signals.go:204] [ 762: 764] Signal 762, PID: 764, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.316934 786755 task_signals.go:204] [ 762: 765] Signal 762, PID: 765, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.317011 786755 task_signals.go:204] [ 762: 763] Signal 762, PID: 763, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.317027 786755 task_exit.go:204] [ 762: 762] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.317052 786755 task_exit.go:204] [ 762: 764] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.317062 786755 task_exit.go:204] [ 762: 764] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.317067 786755 task_exit.go:204] [ 762: 764] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.317087 786755 task_exit.go:204] [ 762: 765] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.317106 786755 task_exit.go:204] [ 762: 765] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.317112 786755 task_exit.go:204] [ 762: 765] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.317066 786755 task_signals.go:204] [ 762: 766] Signal 762, PID: 766, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.317126 786755 task_exit.go:204] [ 762: 766] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.317143 786755 task_exit.go:204] [ 762: 763] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.317266 786755 task_exit.go:204] [ 762: 766] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.317303 786755 task_exit.go:204] [ 762: 766] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.318602 786755 task_exit.go:204] [ 762: 763] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.318635 786755 task_exit.go:204] [ 762: 763] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.318655 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.318683 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.318690 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.318811 786755 task_exit.go:204] [ 762: 762] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.319594 786755 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.320840 786755 syscalls.go:262] [ 767: 767] Allocating stack with size of 8388608 bytes D0713 00:07:58.321014 786755 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.322336 786755 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.322375 786755 usertrap_amd64.go:106] [ 767: 767] Map a usertrap vma at 6a000 D0713 00:07:58.322583 786755 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc000e1f650 1 D0713 00:07:58.322627 786755 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:07:58.322947 786755 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.322973 786755 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc000e1f650 2 D0713 00:07:58.322980 786755 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:07:58.323526 786755 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.323551 786755 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc000e1f650 3 D0713 00:07:58.323559 786755 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:07:58.330535 786755 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.330572 786755 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc000e1f650 4 D0713 00:07:58.330587 786755 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:07:58.331725 786755 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.331754 786755 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc000e1f650 5 D0713 00:07:58.331765 786755 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:07:58.331817 786755 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.331841 786755 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc000e1f650 6 D0713 00:07:58.331849 786755 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:07:58.332476 786755 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.332526 786755 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc000e1f650 7 D0713 00:07:58.332554 786755 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:07:58.332752 786755 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.332775 786755 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc000e1f650 8 D0713 00:07:58.332787 786755 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:07:58.333014 786755 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.333032 786755 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc000e1f650 9 D0713 00:07:58.333044 786755 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:07:58.333199 786755 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.333210 786755 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc000e1f650 10 D0713 00:07:58.333218 786755 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:07:58.342348 786755 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.342445 786755 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc000e1f650 11 D0713 00:07:58.342523 786755 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:07:58.345394 786755 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.345415 786755 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc000e1f650 12 D0713 00:07:58.345427 786755 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:07:58.345586 786755 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.345611 786755 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc000e1f650 13 D0713 00:07:58.345621 786755 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:07:58.345695 786755 task_signals.go:470] [ 767: 767] Notified of signal 23 D0713 00:07:58.345814 786755 task_signals.go:220] [ 767: 767] Signal 23: delivering to handler D0713 00:07:58.356837 786755 task_signals.go:470] [ 767: 767] Notified of signal 23 D0713 00:07:58.361039 786755 task_signals.go:220] [ 767: 767] Signal 23: delivering to handler D0713 00:07:58.361287 786755 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:58.361317 786755 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc000e1f650 14 D0713 00:07:58.361332 786755 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b6e0 trap addr 6a460 ([184 24 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:07:58.361408 786755 task_signals.go:470] [ 767: 769] Notified of signal 23 D0713 00:07:58.361511 786755 task_signals.go:179] [ 767: 769] Restarting syscall 202: interrupted by signal 23 D0713 00:07:58.361540 786755 task_signals.go:220] [ 767: 769] Signal 23: delivering to handler D0713 00:07:58.367396 786755 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.367425 786755 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc000e1f650 15 D0713 00:07:58.367440 786755 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 00:07:58.367492 786755 task_exit.go:204] [ 767: 767] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.367529 786755 task_exit.go:204] [ 767: 767] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.367543 786755 task_signals.go:204] [ 767: 768] Signal 767, PID: 768, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.367562 786755 task_signals.go:204] [ 767: 770] Signal 767, PID: 770, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.367577 786755 task_exit.go:204] [ 767: 768] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.367561 786755 task_signals.go:204] [ 767: 769] Signal 767, PID: 769, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.367589 786755 task_exit.go:204] [ 767: 768] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.367550 786755 task_signals.go:204] [ 767: 771] Signal 767, PID: 771, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.367595 786755 task_exit.go:204] [ 767: 768] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.367581 786755 task_signals.go:204] [ 767: 772] Signal 767, PID: 772, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.367616 786755 task_exit.go:204] [ 767: 771] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.367662 786755 task_exit.go:204] [ 767: 771] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.367682 786755 task_exit.go:204] [ 767: 771] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.367745 786755 task_exit.go:204] [ 767: 769] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.367803 786755 task_exit.go:204] [ 767: 769] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.367812 786755 task_exit.go:204] [ 767: 769] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.367828 786755 task_exit.go:204] [ 767: 772] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.367840 786755 task_exit.go:204] [ 767: 772] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.367845 786755 task_exit.go:204] [ 767: 772] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.367858 786755 task_exit.go:204] [ 767: 770] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.369372 786755 task_exit.go:204] [ 767: 770] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.369400 786755 task_exit.go:204] [ 767: 770] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.369415 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.370248 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.370870 786755 task_exit.go:204] [ 767: 767] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.371585 786755 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.373182 786755 syscalls.go:262] [ 773: 773] Allocating stack with size of 8388608 bytes D0713 00:07:58.373308 786755 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.374704 786755 usertrap_amd64.go:212] [ 773: 773] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.374742 786755 usertrap_amd64.go:106] [ 773: 773] Map a usertrap vma at 69000 D0713 00:07:58.374815 786755 usertrap_amd64.go:122] [ 773: 773] Allocate a new trap: 0xc0013801b0 1 D0713 00:07:58.374838 786755 usertrap_amd64.go:225] [ 773: 773] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:07:58.375229 786755 usertrap_amd64.go:212] [ 773: 773] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.375257 786755 usertrap_amd64.go:122] [ 773: 773] Allocate a new trap: 0xc0013801b0 2 D0713 00:07:58.375273 786755 usertrap_amd64.go:225] [ 773: 773] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:07:58.375925 786755 usertrap_amd64.go:212] [ 773: 773] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.375949 786755 usertrap_amd64.go:122] [ 773: 773] Allocate a new trap: 0xc0013801b0 3 D0713 00:07:58.375962 786755 usertrap_amd64.go:225] [ 773: 773] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:07:58.382644 786755 usertrap_amd64.go:212] [ 773: 773] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.382678 786755 usertrap_amd64.go:122] [ 773: 773] Allocate a new trap: 0xc0013801b0 4 D0713 00:07:58.382692 786755 usertrap_amd64.go:225] [ 773: 773] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:07:58.383946 786755 usertrap_amd64.go:212] [ 773: 773] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.383979 786755 usertrap_amd64.go:122] [ 773: 773] Allocate a new trap: 0xc0013801b0 5 D0713 00:07:58.383994 786755 usertrap_amd64.go:225] [ 773: 773] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:07:58.384065 786755 usertrap_amd64.go:212] [ 773: 773] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.384090 786755 usertrap_amd64.go:122] [ 773: 773] Allocate a new trap: 0xc0013801b0 6 D0713 00:07:58.384105 786755 usertrap_amd64.go:225] [ 773: 773] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:07:58.384726 786755 usertrap_amd64.go:212] [ 773: 773] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.384757 786755 usertrap_amd64.go:122] [ 773: 773] Allocate a new trap: 0xc0013801b0 7 D0713 00:07:58.384768 786755 usertrap_amd64.go:225] [ 773: 773] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:07:58.385054 786755 usertrap_amd64.go:212] [ 773: 774] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.385082 786755 usertrap_amd64.go:122] [ 773: 774] Allocate a new trap: 0xc0013801b0 8 D0713 00:07:58.385095 786755 usertrap_amd64.go:225] [ 773: 774] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:07:58.385304 786755 usertrap_amd64.go:212] [ 773: 773] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.385328 786755 usertrap_amd64.go:122] [ 773: 773] Allocate a new trap: 0xc0013801b0 9 D0713 00:07:58.385339 786755 usertrap_amd64.go:225] [ 773: 773] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:07:58.385375 786755 usertrap_amd64.go:212] [ 773: 774] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.385392 786755 usertrap_amd64.go:122] [ 773: 774] Allocate a new trap: 0xc0013801b0 10 D0713 00:07:58.385405 786755 usertrap_amd64.go:225] [ 773: 774] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:07:58.396364 786755 usertrap_amd64.go:212] [ 773: 773] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.396393 786755 usertrap_amd64.go:122] [ 773: 773] Allocate a new trap: 0xc0013801b0 11 D0713 00:07:58.396402 786755 usertrap_amd64.go:225] [ 773: 773] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:07:58.407089 786755 usertrap_amd64.go:212] [ 773: 774] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.407128 786755 usertrap_amd64.go:122] [ 773: 774] Allocate a new trap: 0xc0013801b0 12 D0713 00:07:58.407146 786755 usertrap_amd64.go:225] [ 773: 774] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:07:58.407239 786755 usertrap_amd64.go:212] [ 773: 774] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.407279 786755 usertrap_amd64.go:122] [ 773: 774] Allocate a new trap: 0xc0013801b0 13 D0713 00:07:58.407292 786755 usertrap_amd64.go:225] [ 773: 774] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:07:58.407338 786755 task_signals.go:470] [ 773: 773] Notified of signal 23 D0713 00:07:58.407415 786755 task_signals.go:220] [ 773: 773] Signal 23: delivering to handler D0713 00:07:58.407749 786755 usertrap_amd64.go:212] [ 773: 773] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.407769 786755 usertrap_amd64.go:122] [ 773: 773] Allocate a new trap: 0xc0013801b0 14 D0713 00:07:58.407777 786755 usertrap_amd64.go:225] [ 773: 773] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:07:58.407841 786755 task_exit.go:204] [ 773: 773] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.407866 786755 task_exit.go:204] [ 773: 773] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.407894 786755 task_signals.go:204] [ 773: 777] Signal 773, PID: 777, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.407895 786755 task_signals.go:204] [ 773: 775] Signal 773, PID: 775, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.407918 786755 task_exit.go:204] [ 773: 777] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.407929 786755 task_exit.go:204] [ 773: 777] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.407935 786755 task_exit.go:204] [ 773: 777] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.407956 786755 task_signals.go:204] [ 773: 776] Signal 773, PID: 776, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.407980 786755 task_exit.go:204] [ 773: 776] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.407991 786755 task_signals.go:204] [ 773: 774] Signal 773, PID: 774, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.408022 786755 task_exit.go:204] [ 773: 775] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.408033 786755 task_exit.go:204] [ 773: 775] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.408041 786755 task_exit.go:204] [ 773: 775] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.408056 786755 task_exit.go:204] [ 773: 776] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.408062 786755 task_exit.go:204] [ 773: 776] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.408074 786755 task_exit.go:204] [ 773: 774] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.409631 786755 task_exit.go:204] [ 773: 774] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.409660 786755 task_exit.go:204] [ 773: 774] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.409683 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.409728 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.409881 786755 task_exit.go:204] [ 773: 773] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.410510 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.411840 786755 syscalls.go:262] [ 778: 778] Allocating stack with size of 8388608 bytes D0713 00:07:58.411939 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.413641 786755 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.413682 786755 usertrap_amd64.go:106] [ 778: 778] Map a usertrap vma at 67000 D0713 00:07:58.413821 786755 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc001380510 1 D0713 00:07:58.413863 786755 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:07:58.414363 786755 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.414427 786755 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc001380510 2 D0713 00:07:58.414439 786755 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:07:58.415290 786755 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.415330 786755 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc001380510 3 D0713 00:07:58.415344 786755 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:07:58.426975 786755 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.427011 786755 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc001380510 4 D0713 00:07:58.427022 786755 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:07:58.428276 786755 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.428318 786755 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc001380510 5 D0713 00:07:58.428331 786755 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:07:58.428395 786755 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.428424 786755 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc001380510 6 D0713 00:07:58.428435 786755 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:07:58.428727 786755 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.428758 786755 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc001380510 7 D0713 00:07:58.428767 786755 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:07:58.429006 786755 usertrap_amd64.go:212] [ 778: 779] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.429035 786755 usertrap_amd64.go:122] [ 778: 779] Allocate a new trap: 0xc001380510 8 D0713 00:07:58.429043 786755 usertrap_amd64.go:225] [ 778: 779] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:07:58.429304 786755 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.429331 786755 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc001380510 9 D0713 00:07:58.429345 786755 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:07:58.429362 786755 usertrap_amd64.go:212] [ 778: 779] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.429369 786755 usertrap_amd64.go:122] [ 778: 779] Allocate a new trap: 0xc001380510 10 D0713 00:07:58.429377 786755 usertrap_amd64.go:225] [ 778: 779] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:07:58.430279 786755 usertrap_amd64.go:212] [ 778: 779] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.430306 786755 usertrap_amd64.go:122] [ 778: 779] Allocate a new trap: 0xc001380510 11 D0713 00:07:58.430320 786755 usertrap_amd64.go:225] [ 778: 779] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:07:58.430361 786755 usertrap_amd64.go:212] [ 778: 779] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.430380 786755 usertrap_amd64.go:122] [ 778: 779] Allocate a new trap: 0xc001380510 12 D0713 00:07:58.430396 786755 usertrap_amd64.go:225] [ 778: 779] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:07:58.430428 786755 task_signals.go:470] [ 778: 778] Notified of signal 23 D0713 00:07:58.430578 786755 task_signals.go:220] [ 778: 778] Signal 23: delivering to handler D0713 00:07:58.438054 786755 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.438180 786755 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc001380510 13 D0713 00:07:58.438252 786755 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:07:58.441080 786755 task_signals.go:470] [ 778: 778] Notified of signal 23 D0713 00:07:58.441383 786755 task_signals.go:220] [ 778: 778] Signal 23: delivering to handler D0713 00:07:58.449766 786755 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.449803 786755 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc001380510 14 D0713 00:07:58.449819 786755 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:07:58.449862 786755 task_exit.go:204] [ 778: 778] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.449893 786755 task_exit.go:204] [ 778: 778] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.449927 786755 task_signals.go:204] [ 778: 781] Signal 778, PID: 781, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.449927 786755 task_signals.go:204] [ 778: 780] Signal 778, PID: 780, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.449943 786755 task_exit.go:204] [ 778: 781] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.449954 786755 task_exit.go:204] [ 778: 781] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.449961 786755 task_exit.go:204] [ 778: 781] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.449992 786755 task_signals.go:204] [ 778: 782] Signal 778, PID: 782, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.450019 786755 task_exit.go:204] [ 778: 780] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.450053 786755 task_signals.go:204] [ 778: 779] Signal 778, PID: 779, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.450097 786755 task_exit.go:204] [ 778: 780] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.450107 786755 task_exit.go:204] [ 778: 780] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.450135 786755 task_exit.go:204] [ 778: 782] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.450160 786755 task_exit.go:204] [ 778: 782] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.450169 786755 task_exit.go:204] [ 778: 782] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.450185 786755 task_exit.go:204] [ 778: 779] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.451655 786755 task_exit.go:204] [ 778: 779] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.451688 786755 task_exit.go:204] [ 778: 779] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.451710 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.451764 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.451775 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.452035 786755 task_exit.go:204] [ 778: 778] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.452639 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.454239 786755 syscalls.go:262] [ 783: 783] Allocating stack with size of 8388608 bytes D0713 00:07:58.454351 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.455486 786755 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.455521 786755 usertrap_amd64.go:106] [ 783: 783] Map a usertrap vma at 64000 D0713 00:07:58.455598 786755 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000605980 1 D0713 00:07:58.455637 786755 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:07:58.455908 786755 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.455931 786755 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000605980 2 D0713 00:07:58.455942 786755 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:07:58.456506 786755 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.456530 786755 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000605980 3 D0713 00:07:58.456540 786755 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:07:58.462202 786755 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.462229 786755 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000605980 4 D0713 00:07:58.462242 786755 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:07:58.463344 786755 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.463367 786755 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000605980 5 D0713 00:07:58.463379 786755 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:07:58.463430 786755 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.463438 786755 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000605980 6 D0713 00:07:58.463460 786755 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:07:58.463914 786755 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.463937 786755 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000605980 7 D0713 00:07:58.463946 786755 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:07:58.464111 786755 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.464132 786755 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc000605980 8 D0713 00:07:58.464142 786755 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:07:58.464264 786755 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.464284 786755 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000605980 9 D0713 00:07:58.464291 786755 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:07:58.464335 786755 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.464351 786755 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc000605980 10 D0713 00:07:58.464357 786755 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:07:58.465102 786755 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.465126 786755 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc000605980 11 D0713 00:07:58.465137 786755 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:07:58.465207 786755 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.465226 786755 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc000605980 12 D0713 00:07:58.465235 786755 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:07:58.465272 786755 task_signals.go:470] [ 783: 783] Notified of signal 23 D0713 00:07:58.465779 786755 task_signals.go:220] [ 783: 783] Signal 23: delivering to handler D0713 00:07:58.473640 786755 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.473665 786755 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000605980 13 D0713 00:07:58.473677 786755 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:07:58.476929 786755 task_signals.go:470] [ 783: 783] Notified of signal 23 D0713 00:07:58.477064 786755 task_signals.go:220] [ 783: 783] Signal 23: delivering to handler D0713 00:07:58.485159 786755 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.485222 786755 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000605980 14 D0713 00:07:58.485238 786755 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:07:58.485297 786755 task_exit.go:204] [ 783: 783] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.485324 786755 task_exit.go:204] [ 783: 783] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.485347 786755 task_signals.go:204] [ 783: 784] Signal 783, PID: 784, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.485362 786755 task_exit.go:204] [ 783: 784] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.485370 786755 task_exit.go:204] [ 783: 784] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.485376 786755 task_exit.go:204] [ 783: 784] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.485393 786755 task_signals.go:204] [ 783: 785] Signal 783, PID: 785, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.485413 786755 task_exit.go:204] [ 783: 785] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.485420 786755 task_exit.go:204] [ 783: 785] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.485425 786755 task_exit.go:204] [ 783: 785] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.485438 786755 task_signals.go:204] [ 783: 786] Signal 783, PID: 786, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.485447 786755 task_exit.go:204] [ 783: 786] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.485454 786755 task_exit.go:204] [ 783: 786] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.485459 786755 task_exit.go:204] [ 783: 786] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.485484 786755 task_signals.go:204] [ 783: 787] Signal 783, PID: 787, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.485503 786755 task_exit.go:204] [ 783: 787] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.486768 786755 task_exit.go:204] [ 783: 787] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.486791 786755 task_exit.go:204] [ 783: 787] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.486810 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.486836 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:58.486842 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.486961 786755 task_exit.go:204] [ 783: 783] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.487082 786755 task_signals.go:470] [ 6: 9] Notified of signal 23 D0713 00:07:58.487159 786755 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:07:58.487905 786755 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.489334 786755 syscalls.go:262] [ 788: 788] Allocating stack with size of 8388608 bytes D0713 00:07:58.489460 786755 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.491357 786755 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.491391 786755 usertrap_amd64.go:106] [ 788: 788] Map a usertrap vma at 61000 D0713 00:07:58.491478 786755 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc000605a10 1 D0713 00:07:58.491506 786755 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:07:58.491725 786755 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.491747 786755 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc000605a10 2 D0713 00:07:58.491757 786755 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:07:58.492186 786755 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.492235 786755 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc000605a10 3 D0713 00:07:58.492260 786755 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:07:58.498138 786755 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.498216 786755 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc000605a10 4 D0713 00:07:58.498242 786755 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:07:58.501077 786755 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.501101 786755 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc000605a10 5 D0713 00:07:58.501113 786755 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:07:58.501167 786755 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.501183 786755 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc000605a10 6 D0713 00:07:58.501190 786755 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:07:58.501447 786755 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.501462 786755 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc000605a10 7 D0713 00:07:58.501472 786755 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:07:58.501708 786755 usertrap_amd64.go:212] [ 788: 790] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.501735 786755 usertrap_amd64.go:122] [ 788: 790] Allocate a new trap: 0xc000605a10 8 D0713 00:07:58.501747 786755 usertrap_amd64.go:225] [ 788: 790] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:07:58.501857 786755 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.501880 786755 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc000605a10 9 D0713 00:07:58.501890 786755 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:07:58.502029 786755 usertrap_amd64.go:212] [ 788: 789] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.502071 786755 usertrap_amd64.go:122] [ 788: 789] Allocate a new trap: 0xc000605a10 10 D0713 00:07:58.502095 786755 usertrap_amd64.go:225] [ 788: 789] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:07:58.502622 786755 usertrap_amd64.go:212] [ 788: 789] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.502647 786755 usertrap_amd64.go:122] [ 788: 789] Allocate a new trap: 0xc000605a10 11 D0713 00:07:58.502659 786755 usertrap_amd64.go:225] [ 788: 789] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:07:58.504222 786755 usertrap_amd64.go:212] [ 788: 789] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.504287 786755 usertrap_amd64.go:122] [ 788: 789] Allocate a new trap: 0xc000605a10 12 D0713 00:07:58.504301 786755 usertrap_amd64.go:225] [ 788: 789] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:07:58.504332 786755 task_signals.go:470] [ 788: 788] Notified of signal 23 D0713 00:07:58.504402 786755 task_signals.go:220] [ 788: 788] Signal 23: delivering to handler D0713 00:07:58.511710 786755 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.511795 786755 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc000605a10 13 D0713 00:07:58.511815 786755 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:07:58.515611 786755 task_signals.go:470] [ 788: 788] Notified of signal 23 D0713 00:07:58.515651 786755 task_signals.go:220] [ 788: 788] Signal 23: delivering to handler executing program D0713 00:07:58.522271 786755 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.522307 786755 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc000605a10 14 D0713 00:07:58.522323 786755 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:07:58.522410 786755 task_exit.go:204] [ 788: 788] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.522449 786755 task_exit.go:204] [ 788: 788] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.522483 786755 task_signals.go:204] [ 788: 791] Signal 788, PID: 791, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.522505 786755 task_signals.go:204] [ 788: 789] Signal 788, PID: 789, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.522502 786755 task_signals.go:204] [ 788: 793] Signal 788, PID: 793, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.522517 786755 task_exit.go:204] [ 788: 791] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.522543 786755 task_signals.go:204] [ 788: 790] Signal 788, PID: 790, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.522563 786755 task_exit.go:204] [ 788: 791] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.522577 786755 task_exit.go:204] [ 788: 791] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.522594 786755 task_exit.go:204] [ 788: 789] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.522603 786755 task_exit.go:204] [ 788: 789] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.522610 786755 task_exit.go:204] [ 788: 789] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.522636 786755 task_signals.go:204] [ 788: 792] Signal 788, PID: 792, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.522640 786755 task_exit.go:204] [ 788: 790] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.522665 786755 task_exit.go:204] [ 788: 790] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.522673 786755 task_exit.go:204] [ 788: 790] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.522701 786755 task_exit.go:204] [ 788: 793] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.522734 786755 task_exit.go:204] [ 788: 793] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.522741 786755 task_exit.go:204] [ 788: 793] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.522761 786755 task_exit.go:204] [ 788: 792] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.524313 786755 task_exit.go:204] [ 788: 792] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.524362 786755 task_exit.go:204] [ 788: 792] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.524382 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.524422 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:58.524442 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.524540 786755 task_exit.go:204] [ 788: 788] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.525018 786755 task_signals.go:470] [ 6: 9] Notified of signal 23 D0713 00:07:58.525084 786755 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:07:58.525496 786755 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.527106 786755 syscalls.go:262] [ 794: 794] Allocating stack with size of 8388608 bytes D0713 00:07:58.527327 786755 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.528758 786755 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.528796 786755 usertrap_amd64.go:106] [ 794: 794] Map a usertrap vma at 61000 D0713 00:07:58.528901 786755 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc000873770 1 D0713 00:07:58.528973 786755 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:07:58.529822 786755 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.529900 786755 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc000873770 2 D0713 00:07:58.529923 786755 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:07:58.530831 786755 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.530928 786755 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc000873770 3 D0713 00:07:58.530976 786755 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:07:58.539649 786755 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.539689 786755 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc000873770 4 D0713 00:07:58.539709 786755 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:07:58.541060 786755 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.541103 786755 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc000873770 5 D0713 00:07:58.541119 786755 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:07:58.541190 786755 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.541213 786755 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc000873770 6 D0713 00:07:58.541236 786755 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:07:58.541566 786755 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.541590 786755 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc000873770 7 D0713 00:07:58.541604 786755 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:07:58.541990 786755 usertrap_amd64.go:212] [ 794: 795] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.542010 786755 usertrap_amd64.go:122] [ 794: 795] Allocate a new trap: 0xc000873770 8 D0713 00:07:58.542021 786755 usertrap_amd64.go:225] [ 794: 795] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:07:58.542448 786755 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.542467 786755 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc000873770 9 D0713 00:07:58.542507 786755 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:07:58.542604 786755 usertrap_amd64.go:212] [ 794: 795] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.542620 786755 usertrap_amd64.go:122] [ 794: 795] Allocate a new trap: 0xc000873770 10 D0713 00:07:58.542630 786755 usertrap_amd64.go:225] [ 794: 795] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:07:58.550934 786755 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.550964 786755 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc000873770 11 D0713 00:07:58.550976 786755 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:07:58.553490 786755 usertrap_amd64.go:212] [ 794: 795] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.553511 786755 usertrap_amd64.go:122] [ 794: 795] Allocate a new trap: 0xc000873770 12 D0713 00:07:58.553523 786755 usertrap_amd64.go:225] [ 794: 795] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:07:58.553574 786755 usertrap_amd64.go:212] [ 794: 795] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.553585 786755 usertrap_amd64.go:122] [ 794: 795] Allocate a new trap: 0xc000873770 13 D0713 00:07:58.553594 786755 usertrap_amd64.go:225] [ 794: 795] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:07:58.553645 786755 task_signals.go:470] [ 794: 794] Notified of signal 23 D0713 00:07:58.553691 786755 task_signals.go:220] [ 794: 794] Signal 23: delivering to handler D0713 00:07:58.561688 786755 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.561730 786755 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc000873770 14 D0713 00:07:58.561745 786755 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:07:58.561798 786755 task_exit.go:204] [ 794: 794] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.561823 786755 task_exit.go:204] [ 794: 794] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.561859 786755 task_signals.go:204] [ 794: 795] Signal 794, PID: 795, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.561882 786755 task_exit.go:204] [ 794: 795] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.561878 786755 task_signals.go:204] [ 794: 797] Signal 794, PID: 797, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.561915 786755 task_exit.go:204] [ 794: 795] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.561940 786755 task_exit.go:204] [ 794: 795] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.561971 786755 task_signals.go:204] [ 794: 798] Signal 794, PID: 798, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.561979 786755 task_signals.go:204] [ 794: 796] Signal 794, PID: 796, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.561992 786755 task_exit.go:204] [ 794: 798] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.562003 786755 task_exit.go:204] [ 794: 796] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.562022 786755 task_exit.go:204] [ 794: 796] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.562028 786755 task_exit.go:204] [ 794: 796] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.562046 786755 task_exit.go:204] [ 794: 797] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.562118 786755 task_exit.go:204] [ 794: 798] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.562141 786755 task_exit.go:204] [ 794: 798] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.563488 786755 task_exit.go:204] [ 794: 797] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.563527 786755 task_exit.go:204] [ 794: 797] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.563552 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.563580 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:58.563603 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.563745 786755 task_exit.go:204] [ 794: 794] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.565739 786755 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.567441 786755 syscalls.go:262] [ 799: 799] Allocating stack with size of 8388608 bytes D0713 00:07:58.567582 786755 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.581878 786755 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.581955 786755 usertrap_amd64.go:106] [ 799: 799] Map a usertrap vma at 61000 D0713 00:07:58.582072 786755 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc0009a2db0 1 D0713 00:07:58.582141 786755 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:07:58.582674 786755 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.582706 786755 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc0009a2db0 2 D0713 00:07:58.582721 786755 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:07:58.583408 786755 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.583448 786755 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc0009a2db0 3 D0713 00:07:58.583464 786755 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:07:58.589853 786755 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.589892 786755 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc0009a2db0 4 D0713 00:07:58.589921 786755 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:07:58.591150 786755 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.591185 786755 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc0009a2db0 5 D0713 00:07:58.591197 786755 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:07:58.591264 786755 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.591275 786755 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc0009a2db0 6 D0713 00:07:58.591283 786755 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:07:58.591644 786755 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.591673 786755 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc0009a2db0 7 D0713 00:07:58.591689 786755 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:07:58.591931 786755 usertrap_amd64.go:212] [ 799: 800] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.591977 786755 usertrap_amd64.go:122] [ 799: 800] Allocate a new trap: 0xc0009a2db0 8 D0713 00:07:58.591995 786755 usertrap_amd64.go:225] [ 799: 800] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:07:58.592377 786755 usertrap_amd64.go:212] [ 799: 800] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.592401 786755 usertrap_amd64.go:122] [ 799: 800] Allocate a new trap: 0xc0009a2db0 9 D0713 00:07:58.592413 786755 usertrap_amd64.go:225] [ 799: 800] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:07:58.592434 786755 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.592453 786755 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc0009a2db0 10 D0713 00:07:58.592460 786755 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:07:58.593101 786755 usertrap_amd64.go:212] [ 799: 800] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.593166 786755 usertrap_amd64.go:122] [ 799: 800] Allocate a new trap: 0xc0009a2db0 11 D0713 00:07:58.593216 786755 usertrap_amd64.go:225] [ 799: 800] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:07:58.593313 786755 usertrap_amd64.go:212] [ 799: 800] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.593368 786755 usertrap_amd64.go:122] [ 799: 800] Allocate a new trap: 0xc0009a2db0 12 D0713 00:07:58.593426 786755 usertrap_amd64.go:225] [ 799: 800] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:07:58.593499 786755 task_signals.go:470] [ 799: 799] Notified of signal 23 D0713 00:07:58.593640 786755 task_signals.go:220] [ 799: 799] Signal 23: delivering to handler D0713 00:07:58.601414 786755 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.601442 786755 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc0009a2db0 13 D0713 00:07:58.601451 786755 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:07:58.605892 786755 task_signals.go:470] [ 799: 799] Notified of signal 23 D0713 00:07:58.605948 786755 task_signals.go:220] [ 799: 799] Signal 23: delivering to handler D0713 00:07:58.612373 786755 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.612404 786755 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc0009a2db0 14 D0713 00:07:58.612416 786755 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:07:58.612546 786755 task_exit.go:204] [ 799: 799] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.612606 786755 task_exit.go:204] [ 799: 799] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.612630 786755 task_signals.go:204] [ 799: 802] Signal 799, PID: 802, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.612644 786755 task_exit.go:204] [ 799: 802] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.612686 786755 task_exit.go:204] [ 799: 802] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.612707 786755 task_exit.go:204] [ 799: 802] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.612725 786755 task_signals.go:204] [ 799: 803] Signal 799, PID: 803, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.612737 786755 task_exit.go:204] [ 799: 803] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.612744 786755 task_exit.go:204] [ 799: 803] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.612749 786755 task_exit.go:204] [ 799: 803] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.612769 786755 task_signals.go:204] [ 799: 800] Signal 799, PID: 800, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.612790 786755 task_exit.go:204] [ 799: 800] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.612797 786755 task_exit.go:204] [ 799: 800] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.612802 786755 task_exit.go:204] [ 799: 800] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.612814 786755 task_signals.go:204] [ 799: 801] Signal 799, PID: 801, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.612824 786755 task_exit.go:204] [ 799: 801] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.612831 786755 task_exit.go:204] [ 799: 801] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.612836 786755 task_exit.go:204] [ 799: 801] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.612847 786755 task_signals.go:204] [ 799: 804] Signal 799, PID: 804, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.612860 786755 task_exit.go:204] [ 799: 804] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.614410 786755 task_exit.go:204] [ 799: 804] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.614464 786755 task_exit.go:204] [ 799: 804] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.614513 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.614564 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:58.614585 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.614636 786755 task_exit.go:204] [ 799: 799] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.615077 786755 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.616609 786755 syscalls.go:262] [ 805: 805] Allocating stack with size of 8388608 bytes D0713 00:07:58.616732 786755 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.617895 786755 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.617933 786755 usertrap_amd64.go:106] [ 805: 805] Map a usertrap vma at 61000 D0713 00:07:58.618029 786755 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc0004b8fc0 1 D0713 00:07:58.618088 786755 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:07:58.618409 786755 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.618475 786755 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc0004b8fc0 2 D0713 00:07:58.618492 786755 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:07:58.618914 786755 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.618955 786755 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc0004b8fc0 3 D0713 00:07:58.618972 786755 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:07:58.626474 786755 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.626498 786755 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc0004b8fc0 4 D0713 00:07:58.626508 786755 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:07:58.627747 786755 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.627786 786755 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc0004b8fc0 5 D0713 00:07:58.627801 786755 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:07:58.627897 786755 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.627911 786755 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc0004b8fc0 6 D0713 00:07:58.627920 786755 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:07:58.628404 786755 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.628430 786755 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc0004b8fc0 7 D0713 00:07:58.628441 786755 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:07:58.628708 786755 usertrap_amd64.go:212] [ 805: 806] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.628721 786755 usertrap_amd64.go:122] [ 805: 806] Allocate a new trap: 0xc0004b8fc0 8 D0713 00:07:58.628732 786755 usertrap_amd64.go:225] [ 805: 806] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:07:58.629051 786755 usertrap_amd64.go:212] [ 805: 806] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.629073 786755 usertrap_amd64.go:122] [ 805: 806] Allocate a new trap: 0xc0004b8fc0 9 D0713 00:07:58.629082 786755 usertrap_amd64.go:225] [ 805: 806] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:07:58.629111 786755 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.629119 786755 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc0004b8fc0 10 D0713 00:07:58.629128 786755 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:07:58.637279 786755 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.637314 786755 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc0004b8fc0 11 D0713 00:07:58.637326 786755 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:07:58.640200 786755 usertrap_amd64.go:212] [ 805: 806] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.640223 786755 usertrap_amd64.go:122] [ 805: 806] Allocate a new trap: 0xc0004b8fc0 12 D0713 00:07:58.640239 786755 usertrap_amd64.go:225] [ 805: 806] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:07:58.640363 786755 usertrap_amd64.go:212] [ 805: 806] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.640403 786755 usertrap_amd64.go:122] [ 805: 806] Allocate a new trap: 0xc0004b8fc0 13 D0713 00:07:58.640419 786755 usertrap_amd64.go:225] [ 805: 806] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:07:58.640507 786755 task_signals.go:470] [ 805: 805] Notified of signal 23 D0713 00:07:58.640603 786755 task_signals.go:220] [ 805: 805] Signal 23: delivering to handler D0713 00:07:58.649266 786755 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.649296 786755 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc0004b8fc0 14 D0713 00:07:58.649308 786755 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:07:58.649387 786755 task_exit.go:204] [ 805: 805] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.649425 786755 task_exit.go:204] [ 805: 805] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.649458 786755 task_signals.go:204] [ 805: 809] Signal 805, PID: 809, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.649454 786755 task_signals.go:204] [ 805: 806] Signal 805, PID: 806, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.649467 786755 task_signals.go:204] [ 805: 808] Signal 805, PID: 808, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.649488 786755 task_exit.go:204] [ 805: 809] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.649524 786755 task_signals.go:204] [ 805: 807] Signal 805, PID: 807, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.649560 786755 task_exit.go:204] [ 805: 809] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.649578 786755 task_exit.go:204] [ 805: 809] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.649592 786755 task_exit.go:204] [ 805: 808] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.649615 786755 task_exit.go:204] [ 805: 808] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.649623 786755 task_exit.go:204] [ 805: 808] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.649639 786755 task_exit.go:204] [ 805: 806] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.649658 786755 task_exit.go:204] [ 805: 806] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.649664 786755 task_exit.go:204] [ 805: 806] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.649675 786755 task_exit.go:204] [ 805: 807] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.651323 786755 task_exit.go:204] [ 805: 807] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.651422 786755 task_exit.go:204] [ 805: 807] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.651454 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.651554 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:58.651581 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.651770 786755 task_exit.go:204] [ 805: 805] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.652416 786755 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.653935 786755 syscalls.go:262] [ 810: 810] Allocating stack with size of 8388608 bytes D0713 00:07:58.654070 786755 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.655198 786755 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.655290 786755 usertrap_amd64.go:106] [ 810: 810] Map a usertrap vma at 61000 D0713 00:07:58.655362 786755 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc00099b410 1 D0713 00:07:58.655401 786755 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:07:58.655964 786755 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.656017 786755 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc00099b410 2 D0713 00:07:58.656045 786755 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:07:58.656824 786755 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.656904 786755 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc00099b410 3 D0713 00:07:58.656984 786755 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:07:58.663728 786755 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.663761 786755 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc00099b410 4 D0713 00:07:58.663776 786755 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:07:58.665159 786755 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.665185 786755 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc00099b410 5 D0713 00:07:58.665198 786755 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:07:58.665387 786755 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.665416 786755 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc00099b410 6 D0713 00:07:58.665435 786755 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:07:58.665788 786755 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.665808 786755 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc00099b410 7 D0713 00:07:58.665817 786755 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:07:58.666034 786755 usertrap_amd64.go:212] [ 810: 811] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.666049 786755 usertrap_amd64.go:122] [ 810: 811] Allocate a new trap: 0xc00099b410 8 D0713 00:07:58.666069 786755 usertrap_amd64.go:225] [ 810: 811] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:07:58.666243 786755 usertrap_amd64.go:212] [ 810: 811] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.666261 786755 usertrap_amd64.go:122] [ 810: 811] Allocate a new trap: 0xc00099b410 9 D0713 00:07:58.666269 786755 usertrap_amd64.go:225] [ 810: 811] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:07:58.666309 786755 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.666315 786755 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc00099b410 10 D0713 00:07:58.666331 786755 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:07:58.666971 786755 usertrap_amd64.go:212] [ 810: 811] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.666996 786755 usertrap_amd64.go:122] [ 810: 811] Allocate a new trap: 0xc00099b410 11 D0713 00:07:58.667006 786755 usertrap_amd64.go:225] [ 810: 811] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:07:58.667047 786755 usertrap_amd64.go:212] [ 810: 811] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.667063 786755 usertrap_amd64.go:122] [ 810: 811] Allocate a new trap: 0xc00099b410 12 D0713 00:07:58.667074 786755 usertrap_amd64.go:225] [ 810: 811] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:07:58.667122 786755 task_signals.go:470] [ 810: 810] Notified of signal 23 D0713 00:07:58.667159 786755 task_signals.go:220] [ 810: 810] Signal 23: delivering to handler D0713 00:07:58.674527 786755 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.674549 786755 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc00099b410 13 D0713 00:07:58.674562 786755 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:07:58.677348 786755 task_signals.go:470] [ 810: 810] Notified of signal 23 D0713 00:07:58.677566 786755 task_signals.go:220] [ 810: 810] Signal 23: delivering to handler D0713 00:07:58.687857 786755 task_signals.go:470] [ 810: 810] Notified of signal 23 D0713 00:07:58.688455 786755 task_signals.go:220] [ 810: 810] Signal 23: delivering to handler D0713 00:07:58.688995 786755 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.689030 786755 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc00099b410 14 D0713 00:07:58.689046 786755 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:07:58.689120 786755 task_exit.go:204] [ 810: 810] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.689160 786755 task_exit.go:204] [ 810: 810] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.689164 786755 task_signals.go:204] [ 810: 811] Signal 810, PID: 811, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.689216 786755 task_exit.go:204] [ 810: 811] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.689204 786755 task_signals.go:204] [ 810: 814] Signal 810, PID: 814, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.689248 786755 task_exit.go:204] [ 810: 811] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.689268 786755 task_exit.go:204] [ 810: 811] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.689191 786755 task_signals.go:204] [ 810: 812] Signal 810, PID: 812, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.689287 786755 task_exit.go:204] [ 810: 814] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.689183 786755 task_signals.go:204] [ 810: 813] Signal 810, PID: 813, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.689301 786755 task_exit.go:204] [ 810: 814] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.689309 786755 task_exit.go:204] [ 810: 814] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.689325 786755 task_exit.go:204] [ 810: 812] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.689343 786755 task_exit.go:204] [ 810: 812] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.689351 786755 task_exit.go:204] [ 810: 812] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.689373 786755 task_exit.go:204] [ 810: 813] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.690851 786755 task_exit.go:204] [ 810: 813] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.690872 786755 task_exit.go:204] [ 810: 813] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.690894 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.690923 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:58.690932 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.691042 786755 task_exit.go:204] [ 810: 810] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.691798 786755 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.693207 786755 syscalls.go:262] [ 815: 815] Allocating stack with size of 8388608 bytes D0713 00:07:58.693395 786755 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.696703 786755 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.696742 786755 usertrap_amd64.go:106] [ 815: 815] Map a usertrap vma at 67000 D0713 00:07:58.696842 786755 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc0009a3560 1 D0713 00:07:58.696870 786755 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:07:58.697804 786755 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.697828 786755 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc0009a3560 2 D0713 00:07:58.697838 786755 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:07:58.698618 786755 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.698647 786755 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc0009a3560 3 D0713 00:07:58.698660 786755 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:07:58.707964 786755 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.708011 786755 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc0009a3560 4 D0713 00:07:58.708036 786755 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:07:58.709461 786755 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.709499 786755 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc0009a3560 5 D0713 00:07:58.709514 786755 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:07:58.709579 786755 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.709599 786755 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc0009a3560 6 D0713 00:07:58.709608 786755 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:07:58.709862 786755 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.709889 786755 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc0009a3560 7 D0713 00:07:58.709904 786755 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:07:58.710091 786755 usertrap_amd64.go:212] [ 815: 816] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.710119 786755 usertrap_amd64.go:122] [ 815: 816] Allocate a new trap: 0xc0009a3560 8 D0713 00:07:58.710128 786755 usertrap_amd64.go:225] [ 815: 816] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:07:58.710315 786755 usertrap_amd64.go:212] [ 815: 816] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.710532 786755 usertrap_amd64.go:122] [ 815: 816] Allocate a new trap: 0xc0009a3560 9 D0713 00:07:58.710593 786755 usertrap_amd64.go:225] [ 815: 816] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:07:58.710637 786755 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.710665 786755 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc0009a3560 10 D0713 00:07:58.710695 786755 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:07:58.719139 786755 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.719233 786755 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc0009a3560 11 D0713 00:07:58.719271 786755 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:07:58.722873 786755 usertrap_amd64.go:212] [ 815: 816] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.722906 786755 usertrap_amd64.go:122] [ 815: 816] Allocate a new trap: 0xc0009a3560 12 D0713 00:07:58.722917 786755 usertrap_amd64.go:225] [ 815: 816] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:07:58.722965 786755 usertrap_amd64.go:212] [ 815: 816] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.722985 786755 usertrap_amd64.go:122] [ 815: 816] Allocate a new trap: 0xc0009a3560 13 D0713 00:07:58.722990 786755 usertrap_amd64.go:225] [ 815: 816] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:07:58.723005 786755 task_signals.go:470] [ 815: 815] Notified of signal 23 D0713 00:07:58.723090 786755 task_signals.go:220] [ 815: 815] Signal 23: delivering to handler D0713 00:07:58.731590 786755 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.731630 786755 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc0009a3560 14 D0713 00:07:58.731644 786755 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:07:58.731708 786755 task_exit.go:204] [ 815: 815] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.731741 786755 task_exit.go:204] [ 815: 815] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.731770 786755 task_signals.go:204] [ 815: 818] Signal 815, PID: 818, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.731794 786755 task_signals.go:204] [ 815: 819] Signal 815, PID: 819, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.731815 786755 task_exit.go:204] [ 815: 819] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.731822 786755 task_signals.go:204] [ 815: 816] Signal 815, PID: 816, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.731848 786755 task_signals.go:204] [ 815: 820] Signal 815, PID: 820, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.731872 786755 task_exit.go:204] [ 815: 820] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.731892 786755 task_exit.go:204] [ 815: 820] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.731899 786755 task_exit.go:204] [ 815: 820] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.731918 786755 task_exit.go:204] [ 815: 819] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.731935 786755 task_exit.go:204] [ 815: 819] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.731946 786755 task_exit.go:204] [ 815: 818] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.731954 786755 task_exit.go:204] [ 815: 818] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.731958 786755 task_exit.go:204] [ 815: 818] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.731970 786755 task_exit.go:204] [ 815: 816] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.731993 786755 task_exit.go:204] [ 815: 816] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.731997 786755 task_exit.go:204] [ 815: 816] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.732016 786755 task_signals.go:204] [ 815: 817] Signal 815, PID: 817, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.732049 786755 task_exit.go:204] [ 815: 817] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.733725 786755 task_exit.go:204] [ 815: 817] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.733759 786755 task_exit.go:204] [ 815: 817] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.733776 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.733814 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:58.733824 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.733952 786755 task_exit.go:204] [ 815: 815] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.735715 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.737411 786755 syscalls.go:262] [ 821: 821] Allocating stack with size of 8388608 bytes D0713 00:07:58.737565 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.738428 786755 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.738513 786755 usertrap_amd64.go:106] [ 821: 821] Map a usertrap vma at 62000 D0713 00:07:58.738856 786755 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc00099bbf0 1 D0713 00:07:58.738904 786755 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:07:58.739267 786755 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.739296 786755 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc00099bbf0 2 D0713 00:07:58.739307 786755 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:07:58.739977 786755 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.740071 786755 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc00099bbf0 3 D0713 00:07:58.740121 786755 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:07:58.747405 786755 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.747437 786755 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc00099bbf0 4 D0713 00:07:58.747452 786755 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:07:58.748596 786755 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.748627 786755 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc00099bbf0 5 D0713 00:07:58.748640 786755 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:07:58.748690 786755 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.748712 786755 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc00099bbf0 6 D0713 00:07:58.748721 786755 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:07:58.749169 786755 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.749198 786755 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc00099bbf0 7 D0713 00:07:58.749207 786755 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:07:58.749347 786755 usertrap_amd64.go:212] [ 821: 822] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.749366 786755 usertrap_amd64.go:122] [ 821: 822] Allocate a new trap: 0xc00099bbf0 8 D0713 00:07:58.749386 786755 usertrap_amd64.go:225] [ 821: 822] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:07:58.749673 786755 usertrap_amd64.go:212] [ 821: 822] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.749746 786755 usertrap_amd64.go:122] [ 821: 822] Allocate a new trap: 0xc00099bbf0 9 D0713 00:07:58.749780 786755 usertrap_amd64.go:225] [ 821: 822] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:07:58.749907 786755 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.749945 786755 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc00099bbf0 10 D0713 00:07:58.749958 786755 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:07:58.757908 786755 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.757944 786755 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc00099bbf0 11 D0713 00:07:58.757959 786755 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:07:58.760464 786755 usertrap_amd64.go:212] [ 821: 822] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.760501 786755 usertrap_amd64.go:122] [ 821: 822] Allocate a new trap: 0xc00099bbf0 12 D0713 00:07:58.760542 786755 usertrap_amd64.go:225] [ 821: 822] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:07:58.760585 786755 usertrap_amd64.go:212] [ 821: 822] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.760594 786755 usertrap_amd64.go:122] [ 821: 822] Allocate a new trap: 0xc00099bbf0 13 D0713 00:07:58.760611 786755 usertrap_amd64.go:225] [ 821: 822] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:07:58.760652 786755 task_signals.go:470] [ 821: 821] Notified of signal 23 D0713 00:07:58.761639 786755 task_signals.go:220] [ 821: 821] Signal 23: delivering to handler I0713 00:07:58.769298 786755 compat.go:120] Unsupported syscall sys_442(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_442 for more information. D0713 00:07:58.769564 786755 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.769593 786755 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc00099bbf0 14 D0713 00:07:58.769608 786755 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:07:58.769731 786755 task_exit.go:204] [ 821: 821] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.769766 786755 task_exit.go:204] [ 821: 821] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.769768 786755 task_signals.go:204] [ 821: 823] Signal 821, PID: 823, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.769800 786755 task_signals.go:204] [ 821: 824] Signal 821, PID: 824, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.769807 786755 task_exit.go:204] [ 821: 823] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.769836 786755 task_exit.go:204] [ 821: 823] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.769857 786755 task_exit.go:204] [ 821: 823] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.769884 786755 task_signals.go:204] [ 821: 825] Signal 821, PID: 825, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.769898 786755 task_signals.go:204] [ 821: 822] Signal 821, PID: 822, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.769907 786755 task_exit.go:204] [ 821: 825] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.769920 786755 task_exit.go:204] [ 821: 825] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.769928 786755 task_exit.go:204] [ 821: 825] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.769943 786755 task_exit.go:204] [ 821: 822] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.770028 786755 task_exit.go:204] [ 821: 822] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.770040 786755 task_exit.go:204] [ 821: 822] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.770063 786755 task_exit.go:204] [ 821: 824] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.771566 786755 task_exit.go:204] [ 821: 824] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.771602 786755 task_exit.go:204] [ 821: 824] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.771624 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.771681 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:58.771719 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.771765 786755 task_exit.go:204] [ 821: 821] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.772575 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.774084 786755 syscalls.go:262] [ 826: 826] Allocating stack with size of 8388608 bytes D0713 00:07:58.774250 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.778328 786755 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.778373 786755 usertrap_amd64.go:106] [ 826: 826] Map a usertrap vma at 60000 D0713 00:07:58.778510 786755 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc002012d50 1 D0713 00:07:58.778541 786755 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:07:58.778932 786755 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.778965 786755 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc002012d50 2 D0713 00:07:58.778980 786755 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:07:58.779584 786755 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.779605 786755 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc002012d50 3 D0713 00:07:58.779614 786755 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:07:58.785823 786755 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.785860 786755 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc002012d50 4 D0713 00:07:58.785877 786755 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:07:58.787015 786755 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.787046 786755 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc002012d50 5 D0713 00:07:58.787055 786755 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:07:58.787111 786755 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.787130 786755 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc002012d50 6 D0713 00:07:58.787138 786755 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:07:58.787351 786755 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.787380 786755 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc002012d50 7 D0713 00:07:58.787388 786755 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:07:58.787571 786755 usertrap_amd64.go:212] [ 826: 827] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.787598 786755 usertrap_amd64.go:122] [ 826: 827] Allocate a new trap: 0xc002012d50 8 D0713 00:07:58.787609 786755 usertrap_amd64.go:225] [ 826: 827] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:07:58.787825 786755 usertrap_amd64.go:212] [ 826: 827] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.787838 786755 usertrap_amd64.go:122] [ 826: 827] Allocate a new trap: 0xc002012d50 9 D0713 00:07:58.787847 786755 usertrap_amd64.go:225] [ 826: 827] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:07:58.787903 786755 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.787913 786755 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc002012d50 10 D0713 00:07:58.787925 786755 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:07:58.796379 786755 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.796407 786755 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc002012d50 11 D0713 00:07:58.796416 786755 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:07:58.799140 786755 usertrap_amd64.go:212] [ 826: 827] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.799192 786755 usertrap_amd64.go:122] [ 826: 827] Allocate a new trap: 0xc002012d50 12 D0713 00:07:58.799208 786755 usertrap_amd64.go:225] [ 826: 827] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:07:58.799358 786755 usertrap_amd64.go:212] [ 826: 827] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.799392 786755 usertrap_amd64.go:122] [ 826: 827] Allocate a new trap: 0xc002012d50 13 D0713 00:07:58.799405 786755 usertrap_amd64.go:225] [ 826: 827] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:07:58.799526 786755 task_signals.go:470] [ 826: 826] Notified of signal 23 D0713 00:07:58.799631 786755 task_signals.go:220] [ 826: 826] Signal 23: delivering to handler I0713 00:07:58.808092 786755 compat.go:120] Unsupported syscall move_mount(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_mount for more information. D0713 00:07:58.808199 786755 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.808221 786755 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc002012d50 14 D0713 00:07:58.808241 786755 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:07:58.808339 786755 task_exit.go:204] [ 826: 826] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.808369 786755 task_exit.go:204] [ 826: 826] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.808387 786755 task_signals.go:204] [ 826: 827] Signal 826, PID: 827, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.808404 786755 task_signals.go:204] [ 826: 830] Signal 826, PID: 830, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.808409 786755 task_signals.go:204] [ 826: 829] Signal 826, PID: 829, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.808438 786755 task_exit.go:204] [ 826: 827] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.808491 786755 task_signals.go:204] [ 826: 828] Signal 826, PID: 828, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.808532 786755 task_exit.go:204] [ 826: 827] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.808558 786755 task_exit.go:204] [ 826: 827] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.808576 786755 task_exit.go:204] [ 826: 830] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.808602 786755 task_exit.go:204] [ 826: 830] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.808607 786755 task_exit.go:204] [ 826: 830] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.808623 786755 task_exit.go:204] [ 826: 829] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.808641 786755 task_exit.go:204] [ 826: 829] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.808649 786755 task_exit.go:204] [ 826: 829] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.808662 786755 task_exit.go:204] [ 826: 828] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.810122 786755 task_exit.go:204] [ 826: 828] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.810156 786755 task_exit.go:204] [ 826: 828] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.810177 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.810204 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:58.810215 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.810391 786755 task_signals.go:470] [ 6: 18] Notified of signal 23 D0713 00:07:58.810438 786755 task_exit.go:204] [ 826: 826] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.810490 786755 task_signals.go:220] [ 6: 18] Signal 23: delivering to handler D0713 00:07:58.811293 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.812729 786755 syscalls.go:262] [ 831: 831] Allocating stack with size of 8388608 bytes D0713 00:07:58.812890 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.813858 786755 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.813900 786755 usertrap_amd64.go:106] [ 831: 831] Map a usertrap vma at 6a000 D0713 00:07:58.814026 786755 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc00212e120 1 D0713 00:07:58.814086 786755 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:07:58.814546 786755 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.814569 786755 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc00212e120 2 D0713 00:07:58.814581 786755 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:07:58.815260 786755 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.815287 786755 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc00212e120 3 D0713 00:07:58.815300 786755 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:07:58.822013 786755 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.822040 786755 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc00212e120 4 D0713 00:07:58.822052 786755 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:07:58.823459 786755 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.823488 786755 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc00212e120 5 D0713 00:07:58.823501 786755 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:07:58.823542 786755 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.823557 786755 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc00212e120 6 D0713 00:07:58.823566 786755 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:07:58.823768 786755 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.823781 786755 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc00212e120 7 D0713 00:07:58.823790 786755 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:07:58.823894 786755 usertrap_amd64.go:212] [ 831: 832] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.823953 786755 usertrap_amd64.go:122] [ 831: 832] Allocate a new trap: 0xc00212e120 8 D0713 00:07:58.823986 786755 usertrap_amd64.go:225] [ 831: 832] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:07:58.824223 786755 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.824249 786755 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc00212e120 9 D0713 00:07:58.824298 786755 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:07:58.824422 786755 usertrap_amd64.go:212] [ 831: 832] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.824497 786755 usertrap_amd64.go:122] [ 831: 832] Allocate a new trap: 0xc00212e120 10 D0713 00:07:58.824549 786755 usertrap_amd64.go:225] [ 831: 832] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:07:58.832446 786755 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.832487 786755 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc00212e120 11 D0713 00:07:58.832498 786755 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:07:58.835260 786755 usertrap_amd64.go:212] [ 831: 832] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.835280 786755 usertrap_amd64.go:122] [ 831: 832] Allocate a new trap: 0xc00212e120 12 D0713 00:07:58.835293 786755 usertrap_amd64.go:225] [ 831: 832] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:07:58.835341 786755 usertrap_amd64.go:212] [ 831: 832] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.835356 786755 usertrap_amd64.go:122] [ 831: 832] Allocate a new trap: 0xc00212e120 13 D0713 00:07:58.835364 786755 usertrap_amd64.go:225] [ 831: 832] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:07:58.835417 786755 task_signals.go:470] [ 831: 831] Notified of signal 23 D0713 00:07:58.835512 786755 task_signals.go:220] [ 831: 831] Signal 23: delivering to handler I0713 00:07:58.843936 786755 compat.go:120] Unsupported syscall move_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_pages for more information. D0713 00:07:58.844095 786755 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.844156 786755 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc00212e120 14 D0713 00:07:58.844171 786755 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:07:58.844219 786755 task_exit.go:204] [ 831: 831] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.844253 786755 task_exit.go:204] [ 831: 831] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.844300 786755 task_signals.go:204] [ 831: 832] Signal 831, PID: 832, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.844317 786755 task_exit.go:204] [ 831: 832] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.844326 786755 task_exit.go:204] [ 831: 832] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.844332 786755 task_exit.go:204] [ 831: 832] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.844352 786755 task_signals.go:204] [ 831: 833] Signal 831, PID: 833, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.844363 786755 task_exit.go:204] [ 831: 833] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.844370 786755 task_exit.go:204] [ 831: 833] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.844375 786755 task_exit.go:204] [ 831: 833] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.844388 786755 task_signals.go:204] [ 831: 834] Signal 831, PID: 834, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.844410 786755 task_exit.go:204] [ 831: 834] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.844417 786755 task_exit.go:204] [ 831: 834] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.844423 786755 task_exit.go:204] [ 831: 834] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.844434 786755 task_signals.go:204] [ 831: 835] Signal 831, PID: 835, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.844454 786755 task_exit.go:204] [ 831: 835] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.846253 786755 task_exit.go:204] [ 831: 835] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.846284 786755 task_exit.go:204] [ 831: 835] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.846298 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.846322 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:58.846335 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.846449 786755 task_exit.go:204] [ 831: 831] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.847010 786755 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.848201 786755 syscalls.go:262] [ 836: 836] Allocating stack with size of 8388608 bytes D0713 00:07:58.848277 786755 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.849314 786755 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.849392 786755 usertrap_amd64.go:106] [ 836: 836] Map a usertrap vma at 61000 D0713 00:07:58.849495 786755 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc001d68450 1 D0713 00:07:58.849521 786755 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:07:58.849809 786755 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.849829 786755 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc001d68450 2 D0713 00:07:58.849836 786755 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:07:58.850241 786755 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.850304 786755 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc001d68450 3 D0713 00:07:58.850344 786755 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:07:58.858161 786755 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.858192 786755 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc001d68450 4 D0713 00:07:58.858201 786755 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:07:58.859334 786755 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.859356 786755 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc001d68450 5 D0713 00:07:58.859366 786755 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:07:58.859418 786755 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.859435 786755 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc001d68450 6 D0713 00:07:58.859442 786755 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:07:58.859702 786755 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.859726 786755 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc001d68450 7 D0713 00:07:58.859737 786755 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:07:58.859893 786755 usertrap_amd64.go:212] [ 836: 837] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.859918 786755 usertrap_amd64.go:122] [ 836: 837] Allocate a new trap: 0xc001d68450 8 D0713 00:07:58.859929 786755 usertrap_amd64.go:225] [ 836: 837] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:07:58.860032 786755 usertrap_amd64.go:212] [ 836: 837] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.860042 786755 usertrap_amd64.go:122] [ 836: 837] Allocate a new trap: 0xc001d68450 9 D0713 00:07:58.860050 786755 usertrap_amd64.go:225] [ 836: 837] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:07:58.860061 786755 usertrap_amd64.go:212] [ 836: 838] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:58.860078 786755 usertrap_amd64.go:122] [ 836: 838] Allocate a new trap: 0xc001d68450 10 D0713 00:07:58.860086 786755 usertrap_amd64.go:225] [ 836: 838] Apply the binary patch addr 46b6e0 trap addr 61320 ([184 24 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:07:58.860106 786755 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.860130 786755 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc001d68450 11 D0713 00:07:58.860139 786755 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46b57c trap addr 61370 ([184 202 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:07:58.867216 786755 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.867240 786755 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc001d68450 12 D0713 00:07:58.867252 786755 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:07:58.870807 786755 usertrap_amd64.go:212] [ 836: 837] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.870833 786755 usertrap_amd64.go:122] [ 836: 837] Allocate a new trap: 0xc001d68450 13 D0713 00:07:58.870911 786755 usertrap_amd64.go:225] [ 836: 837] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:07:58.870983 786755 usertrap_amd64.go:212] [ 836: 837] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.870999 786755 usertrap_amd64.go:122] [ 836: 837] Allocate a new trap: 0xc001d68450 14 D0713 00:07:58.871013 786755 usertrap_amd64.go:225] [ 836: 837] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:07:58.871063 786755 task_signals.go:470] [ 836: 836] Notified of signal 23 D0713 00:07:58.871126 786755 task_signals.go:220] [ 836: 836] Signal 23: delivering to handler D0713 00:07:58.877635 786755 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.877662 786755 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc001d68450 15 D0713 00:07:58.877673 786755 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 00:07:58.877751 786755 task_exit.go:204] [ 836: 836] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.877782 786755 task_exit.go:204] [ 836: 836] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.877805 786755 task_signals.go:204] [ 836: 839] Signal 836, PID: 839, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.877840 786755 task_exit.go:204] [ 836: 839] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.877834 786755 task_signals.go:204] [ 836: 840] Signal 836, PID: 840, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.877850 786755 task_exit.go:204] [ 836: 839] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.877782 786755 task_signals.go:204] [ 836: 838] Signal 836, PID: 838, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.877802 786755 task_signals.go:204] [ 836: 837] Signal 836, PID: 837, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.877856 786755 task_exit.go:204] [ 836: 839] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.877874 786755 task_exit.go:204] [ 836: 840] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.877900 786755 task_exit.go:204] [ 836: 840] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.877906 786755 task_exit.go:204] [ 836: 840] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.877915 786755 task_exit.go:204] [ 836: 838] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.877931 786755 task_exit.go:204] [ 836: 838] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.877946 786755 task_exit.go:204] [ 836: 838] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.877956 786755 task_exit.go:204] [ 836: 837] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.879196 786755 task_exit.go:204] [ 836: 837] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.879240 786755 task_exit.go:204] [ 836: 837] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.879255 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.879280 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:58.879305 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.879415 786755 task_exit.go:204] [ 836: 836] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.879499 786755 task_signals.go:470] [ 6: 13] Notified of signal 23 D0713 00:07:58.879540 786755 task_signals.go:220] [ 6: 13] Signal 23: delivering to handler D0713 00:07:58.880040 786755 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.881541 786755 syscalls.go:262] [ 841: 841] Allocating stack with size of 8388608 bytes D0713 00:07:58.881640 786755 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.883091 786755 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.883160 786755 usertrap_amd64.go:106] [ 841: 841] Map a usertrap vma at 62000 D0713 00:07:58.883352 786755 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc0004b9fb0 1 D0713 00:07:58.883392 786755 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:07:58.883867 786755 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.883890 786755 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc0004b9fb0 2 D0713 00:07:58.883903 786755 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:07:58.884425 786755 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.884477 786755 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc0004b9fb0 3 D0713 00:07:58.884490 786755 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:07:58.890982 786755 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.891007 786755 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc0004b9fb0 4 D0713 00:07:58.891025 786755 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:07:58.892158 786755 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.892182 786755 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc0004b9fb0 5 D0713 00:07:58.892194 786755 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:07:58.892234 786755 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.892242 786755 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc0004b9fb0 6 D0713 00:07:58.892252 786755 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:07:58.892476 786755 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.892495 786755 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc0004b9fb0 7 D0713 00:07:58.892505 786755 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:07:58.892721 786755 usertrap_amd64.go:212] [ 841: 842] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.892737 786755 usertrap_amd64.go:122] [ 841: 842] Allocate a new trap: 0xc0004b9fb0 8 D0713 00:07:58.892764 786755 usertrap_amd64.go:225] [ 841: 842] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:07:58.892965 786755 sampler.go:191] Time: Adjusting syscall overhead down to 515 D0713 00:07:58.892978 786755 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.892997 786755 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc0004b9fb0 9 D0713 00:07:58.893007 786755 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:07:58.893018 786755 usertrap_amd64.go:212] [ 841: 842] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.893024 786755 usertrap_amd64.go:122] [ 841: 842] Allocate a new trap: 0xc0004b9fb0 10 D0713 00:07:58.893160 786755 usertrap_amd64.go:225] [ 841: 842] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:07:58.899744 786755 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.899770 786755 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc0004b9fb0 11 D0713 00:07:58.899785 786755 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:07:58.903553 786755 usertrap_amd64.go:212] [ 841: 842] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.903574 786755 usertrap_amd64.go:122] [ 841: 842] Allocate a new trap: 0xc0004b9fb0 12 D0713 00:07:58.903584 786755 usertrap_amd64.go:225] [ 841: 842] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:07:58.903606 786755 usertrap_amd64.go:212] [ 841: 842] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.903613 786755 usertrap_amd64.go:122] [ 841: 842] Allocate a new trap: 0xc0004b9fb0 13 D0713 00:07:58.903621 786755 usertrap_amd64.go:225] [ 841: 842] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:07:58.903638 786755 task_signals.go:470] [ 841: 841] Notified of signal 23 D0713 00:07:58.903699 786755 task_signals.go:220] [ 841: 841] Signal 23: delivering to handler I0713 00:07:58.911022 786755 compat.go:120] Unsupported syscall mq_getsetattr(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_getsetattr for more information. D0713 00:07:58.911084 786755 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.911092 786755 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc0004b9fb0 14 D0713 00:07:58.911099 786755 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:07:58.911127 786755 task_exit.go:204] [ 841: 841] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.911161 786755 task_exit.go:204] [ 841: 841] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.911161 786755 task_signals.go:204] [ 841: 843] Signal 841, PID: 843, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.911180 786755 task_exit.go:204] [ 841: 843] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.911229 786755 task_signals.go:204] [ 841: 845] Signal 841, PID: 845, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.911254 786755 task_signals.go:204] [ 841: 844] Signal 841, PID: 844, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.911250 786755 task_signals.go:204] [ 841: 842] Signal 841, PID: 842, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.911266 786755 task_exit.go:204] [ 841: 843] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.911272 786755 task_exit.go:204] [ 841: 843] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.911286 786755 task_exit.go:204] [ 841: 845] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.911300 786755 task_exit.go:204] [ 841: 845] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.911306 786755 task_exit.go:204] [ 841: 845] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.911315 786755 task_exit.go:204] [ 841: 842] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.911322 786755 task_exit.go:204] [ 841: 842] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.911328 786755 task_exit.go:204] [ 841: 842] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.911340 786755 task_exit.go:204] [ 841: 844] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.912878 786755 task_exit.go:204] [ 841: 844] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.912900 786755 task_exit.go:204] [ 841: 844] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.912914 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.913027 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:58.913050 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.913216 786755 task_exit.go:204] [ 841: 841] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.913904 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.915151 786755 syscalls.go:262] [ 846: 846] Allocating stack with size of 8388608 bytes D0713 00:07:58.915256 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.916393 786755 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.916428 786755 usertrap_amd64.go:106] [ 846: 846] Map a usertrap vma at 63000 D0713 00:07:58.916542 786755 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001381a40 1 D0713 00:07:58.916576 786755 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:07:58.920539 786755 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.920564 786755 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001381a40 2 D0713 00:07:58.920581 786755 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:07:58.921098 786755 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.921119 786755 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001381a40 3 D0713 00:07:58.921129 786755 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:07:58.927705 786755 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.927733 786755 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001381a40 4 D0713 00:07:58.927742 786755 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:07:58.928986 786755 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.929012 786755 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001381a40 5 D0713 00:07:58.929024 786755 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:07:58.929059 786755 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.929074 786755 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001381a40 6 D0713 00:07:58.929083 786755 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:07:58.933393 786755 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.933447 786755 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001381a40 7 D0713 00:07:58.933468 786755 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:07:58.934054 786755 usertrap_amd64.go:212] [ 846: 847] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.934083 786755 usertrap_amd64.go:122] [ 846: 847] Allocate a new trap: 0xc001381a40 8 D0713 00:07:58.934096 786755 usertrap_amd64.go:225] [ 846: 847] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:07:58.934254 786755 usertrap_amd64.go:212] [ 846: 847] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.934285 786755 usertrap_amd64.go:122] [ 846: 847] Allocate a new trap: 0xc001381a40 9 D0713 00:07:58.934297 786755 usertrap_amd64.go:225] [ 846: 847] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:07:58.934311 786755 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.934318 786755 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001381a40 10 D0713 00:07:58.934326 786755 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:07:58.942150 786755 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.942189 786755 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001381a40 11 D0713 00:07:58.942205 786755 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:07:58.945074 786755 usertrap_amd64.go:212] [ 846: 847] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.945127 786755 usertrap_amd64.go:122] [ 846: 847] Allocate a new trap: 0xc001381a40 12 D0713 00:07:58.945143 786755 usertrap_amd64.go:225] [ 846: 847] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:07:58.945196 786755 usertrap_amd64.go:212] [ 846: 847] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.945232 786755 usertrap_amd64.go:122] [ 846: 847] Allocate a new trap: 0xc001381a40 13 D0713 00:07:58.945290 786755 usertrap_amd64.go:225] [ 846: 847] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:07:58.945355 786755 task_signals.go:470] [ 846: 846] Notified of signal 23 D0713 00:07:58.945439 786755 task_signals.go:220] [ 846: 846] Signal 23: delivering to handler I0713 00:07:58.953928 786755 compat.go:120] Unsupported syscall mq_notify(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_notify for more information. D0713 00:07:58.954040 786755 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.954055 786755 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001381a40 14 D0713 00:07:58.954100 786755 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:07:58.954192 786755 task_exit.go:204] [ 846: 846] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.954220 786755 task_exit.go:204] [ 846: 846] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.954285 786755 task_signals.go:204] [ 846: 849] Signal 846, PID: 849, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.954308 786755 task_exit.go:204] [ 846: 849] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.954317 786755 task_exit.go:204] [ 846: 849] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.954324 786755 task_exit.go:204] [ 846: 849] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.954342 786755 task_signals.go:204] [ 846: 848] Signal 846, PID: 848, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.954357 786755 task_exit.go:204] [ 846: 848] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.954364 786755 task_exit.go:204] [ 846: 848] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.954369 786755 task_exit.go:204] [ 846: 848] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.954382 786755 task_signals.go:204] [ 846: 850] Signal 846, PID: 850, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.954392 786755 task_exit.go:204] [ 846: 850] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.954398 786755 task_exit.go:204] [ 846: 850] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.954403 786755 task_exit.go:204] [ 846: 850] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.954239 786755 task_signals.go:204] [ 846: 847] Signal 846, PID: 847, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.954434 786755 task_exit.go:204] [ 846: 847] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.955729 786755 task_exit.go:204] [ 846: 847] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.955765 786755 task_exit.go:204] [ 846: 847] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.955780 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.955811 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:58.955820 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.955905 786755 task_exit.go:204] [ 846: 846] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.956415 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.958184 786755 syscalls.go:262] [ 851: 851] Allocating stack with size of 8388608 bytes D0713 00:07:58.958303 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.959686 786755 usertrap_amd64.go:212] [ 851: 851] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.959726 786755 usertrap_amd64.go:106] [ 851: 851] Map a usertrap vma at 68000 D0713 00:07:58.959828 786755 usertrap_amd64.go:122] [ 851: 851] Allocate a new trap: 0xc002012120 1 D0713 00:07:58.959868 786755 usertrap_amd64.go:225] [ 851: 851] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:07:58.960396 786755 usertrap_amd64.go:212] [ 851: 851] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.960463 786755 usertrap_amd64.go:122] [ 851: 851] Allocate a new trap: 0xc002012120 2 D0713 00:07:58.960483 786755 usertrap_amd64.go:225] [ 851: 851] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:07:58.961515 786755 usertrap_amd64.go:212] [ 851: 851] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.961539 786755 usertrap_amd64.go:122] [ 851: 851] Allocate a new trap: 0xc002012120 3 D0713 00:07:58.961551 786755 usertrap_amd64.go:225] [ 851: 851] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:07:58.967576 786755 usertrap_amd64.go:212] [ 851: 851] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.967593 786755 usertrap_amd64.go:122] [ 851: 851] Allocate a new trap: 0xc002012120 4 D0713 00:07:58.967605 786755 usertrap_amd64.go:225] [ 851: 851] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:07:58.968891 786755 usertrap_amd64.go:212] [ 851: 851] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:58.968929 786755 usertrap_amd64.go:122] [ 851: 851] Allocate a new trap: 0xc002012120 5 D0713 00:07:58.968979 786755 usertrap_amd64.go:225] [ 851: 851] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:07:58.969034 786755 usertrap_amd64.go:212] [ 851: 851] Found the pattern at ip 46b214:sysno 13 D0713 00:07:58.969056 786755 usertrap_amd64.go:122] [ 851: 851] Allocate a new trap: 0xc002012120 6 D0713 00:07:58.969066 786755 usertrap_amd64.go:225] [ 851: 851] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:07:58.969644 786755 usertrap_amd64.go:212] [ 851: 851] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:58.969674 786755 usertrap_amd64.go:122] [ 851: 851] Allocate a new trap: 0xc002012120 7 D0713 00:07:58.969686 786755 usertrap_amd64.go:225] [ 851: 851] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:07:58.969867 786755 usertrap_amd64.go:212] [ 851: 852] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:58.969892 786755 usertrap_amd64.go:122] [ 851: 852] Allocate a new trap: 0xc002012120 8 D0713 00:07:58.969901 786755 usertrap_amd64.go:225] [ 851: 852] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:07:58.970102 786755 usertrap_amd64.go:212] [ 851: 851] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:58.970124 786755 usertrap_amd64.go:122] [ 851: 851] Allocate a new trap: 0xc002012120 9 D0713 00:07:58.970135 786755 usertrap_amd64.go:225] [ 851: 851] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:07:58.970180 786755 usertrap_amd64.go:212] [ 851: 852] Found the pattern at ip 46af76:sysno 35 D0713 00:07:58.970202 786755 usertrap_amd64.go:122] [ 851: 852] Allocate a new trap: 0xc002012120 10 D0713 00:07:58.970215 786755 usertrap_amd64.go:225] [ 851: 852] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:07:58.970377 786755 usertrap_amd64.go:212] [ 851: 852] Found the pattern at ip 46b020:sysno 39 D0713 00:07:58.970405 786755 usertrap_amd64.go:122] [ 851: 852] Allocate a new trap: 0xc002012120 11 D0713 00:07:58.970417 786755 usertrap_amd64.go:225] [ 851: 852] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:07:58.970447 786755 usertrap_amd64.go:212] [ 851: 852] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:58.970520 786755 usertrap_amd64.go:122] [ 851: 852] Allocate a new trap: 0xc002012120 12 D0713 00:07:58.970531 786755 usertrap_amd64.go:225] [ 851: 852] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:07:58.970570 786755 task_signals.go:470] [ 851: 854] Notified of signal 23 D0713 00:07:58.970614 786755 task_signals.go:179] [ 851: 854] Restarting syscall 202: interrupted by signal 23 D0713 00:07:58.970622 786755 task_signals.go:220] [ 851: 854] Signal 23: delivering to handler D0713 00:07:58.977943 786755 usertrap_amd64.go:212] [ 851: 851] Found the pattern at ip 46af29:sysno 293 D0713 00:07:58.977976 786755 usertrap_amd64.go:122] [ 851: 851] Allocate a new trap: 0xc002012120 13 D0713 00:07:58.977987 786755 usertrap_amd64.go:225] [ 851: 851] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:07:58.981788 786755 task_signals.go:470] [ 851: 851] Notified of signal 23 D0713 00:07:58.981834 786755 task_signals.go:220] [ 851: 851] Signal 23: delivering to handler D0713 00:07:58.987624 786755 usertrap_amd64.go:212] [ 851: 851] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:58.987648 786755 usertrap_amd64.go:122] [ 851: 851] Allocate a new trap: 0xc002012120 14 D0713 00:07:58.987657 786755 usertrap_amd64.go:225] [ 851: 851] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:07:58.987694 786755 task_exit.go:204] [ 851: 851] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.987711 786755 task_exit.go:204] [ 851: 851] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.987734 786755 task_signals.go:204] [ 851: 852] Signal 851, PID: 852, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.987763 786755 task_exit.go:204] [ 851: 852] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.987764 786755 task_signals.go:204] [ 851: 854] Signal 851, PID: 854, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.987773 786755 task_exit.go:204] [ 851: 852] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.987788 786755 task_exit.go:204] [ 851: 852] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.987809 786755 task_signals.go:204] [ 851: 855] Signal 851, PID: 855, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.987833 786755 task_exit.go:204] [ 851: 855] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.987842 786755 task_signals.go:204] [ 851: 853] Signal 851, PID: 853, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:58.987856 786755 task_exit.go:204] [ 851: 855] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.987862 786755 task_exit.go:204] [ 851: 855] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.987871 786755 task_exit.go:204] [ 851: 853] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.987887 786755 task_exit.go:204] [ 851: 853] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.987901 786755 task_exit.go:204] [ 851: 853] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.987910 786755 task_exit.go:204] [ 851: 854] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:58.989132 786755 task_exit.go:204] [ 851: 854] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:58.989188 786755 task_exit.go:204] [ 851: 854] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.989204 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:58.989236 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:58.989245 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:58.989432 786755 task_exit.go:204] [ 851: 851] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:58.990126 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.991634 786755 syscalls.go:262] [ 856: 856] Allocating stack with size of 8388608 bytes D0713 00:07:58.991771 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:58.992650 786755 usertrap_amd64.go:212] [ 856: 856] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:58.992730 786755 usertrap_amd64.go:106] [ 856: 856] Map a usertrap vma at 64000 D0713 00:07:58.992813 786755 usertrap_amd64.go:122] [ 856: 856] Allocate a new trap: 0xc001a42690 1 D0713 00:07:58.992835 786755 usertrap_amd64.go:225] [ 856: 856] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:07:58.993120 786755 usertrap_amd64.go:212] [ 856: 856] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:58.993145 786755 usertrap_amd64.go:122] [ 856: 856] Allocate a new trap: 0xc001a42690 2 D0713 00:07:58.993154 786755 usertrap_amd64.go:225] [ 856: 856] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:07:58.993637 786755 usertrap_amd64.go:212] [ 856: 856] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:58.993661 786755 usertrap_amd64.go:122] [ 856: 856] Allocate a new trap: 0xc001a42690 3 D0713 00:07:58.993673 786755 usertrap_amd64.go:225] [ 856: 856] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:07:58.999732 786755 usertrap_amd64.go:212] [ 856: 856] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:58.999797 786755 usertrap_amd64.go:122] [ 856: 856] Allocate a new trap: 0xc001a42690 4 D0713 00:07:58.999818 786755 usertrap_amd64.go:225] [ 856: 856] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:07:59.001188 786755 usertrap_amd64.go:212] [ 856: 856] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.001281 786755 usertrap_amd64.go:122] [ 856: 856] Allocate a new trap: 0xc001a42690 5 D0713 00:07:59.001312 786755 usertrap_amd64.go:225] [ 856: 856] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:07:59.001374 786755 usertrap_amd64.go:212] [ 856: 856] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.001389 786755 usertrap_amd64.go:122] [ 856: 856] Allocate a new trap: 0xc001a42690 6 D0713 00:07:59.001400 786755 usertrap_amd64.go:225] [ 856: 856] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:07:59.001870 786755 usertrap_amd64.go:212] [ 856: 856] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.001897 786755 usertrap_amd64.go:122] [ 856: 856] Allocate a new trap: 0xc001a42690 7 D0713 00:07:59.001910 786755 usertrap_amd64.go:225] [ 856: 856] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:07:59.002244 786755 usertrap_amd64.go:212] [ 856: 857] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.002290 786755 usertrap_amd64.go:122] [ 856: 857] Allocate a new trap: 0xc001a42690 8 D0713 00:07:59.002321 786755 usertrap_amd64.go:225] [ 856: 857] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:07:59.002637 786755 usertrap_amd64.go:212] [ 856: 856] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.002662 786755 usertrap_amd64.go:122] [ 856: 856] Allocate a new trap: 0xc001a42690 9 D0713 00:07:59.002673 786755 usertrap_amd64.go:225] [ 856: 856] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:07:59.002701 786755 usertrap_amd64.go:212] [ 856: 857] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.002708 786755 usertrap_amd64.go:122] [ 856: 857] Allocate a new trap: 0xc001a42690 10 D0713 00:07:59.002716 786755 usertrap_amd64.go:225] [ 856: 857] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:07:59.011343 786755 usertrap_amd64.go:212] [ 856: 856] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.011396 786755 usertrap_amd64.go:122] [ 856: 856] Allocate a new trap: 0xc001a42690 11 D0713 00:07:59.011412 786755 usertrap_amd64.go:225] [ 856: 856] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:07:59.014354 786755 usertrap_amd64.go:212] [ 856: 857] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.014380 786755 usertrap_amd64.go:122] [ 856: 857] Allocate a new trap: 0xc001a42690 12 D0713 00:07:59.014394 786755 usertrap_amd64.go:225] [ 856: 857] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:07:59.014475 786755 usertrap_amd64.go:212] [ 856: 857] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.014499 786755 usertrap_amd64.go:122] [ 856: 857] Allocate a new trap: 0xc001a42690 13 D0713 00:07:59.014514 786755 usertrap_amd64.go:225] [ 856: 857] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:07:59.014571 786755 task_signals.go:470] [ 856: 856] Notified of signal 23 D0713 00:07:59.014710 786755 task_signals.go:220] [ 856: 856] Signal 23: delivering to handler I0713 00:07:59.022257 786755 compat.go:120] Unsupported syscall mq_timedreceive(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedreceive for more information. D0713 00:07:59.022391 786755 usertrap_amd64.go:212] [ 856: 856] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.022411 786755 usertrap_amd64.go:122] [ 856: 856] Allocate a new trap: 0xc001a42690 14 D0713 00:07:59.022427 786755 usertrap_amd64.go:225] [ 856: 856] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:07:59.022517 786755 task_exit.go:204] [ 856: 856] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.022549 786755 task_exit.go:204] [ 856: 856] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.022565 786755 task_signals.go:204] [ 856: 857] Signal 856, PID: 857, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.022578 786755 task_signals.go:204] [ 856: 859] Signal 856, PID: 859, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.022590 786755 task_exit.go:204] [ 856: 857] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.022612 786755 task_signals.go:204] [ 856: 858] Signal 856, PID: 858, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.022632 786755 task_signals.go:204] [ 856: 860] Signal 856, PID: 860, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.022656 786755 task_exit.go:204] [ 856: 859] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.022667 786755 task_exit.go:204] [ 856: 859] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.022672 786755 task_exit.go:204] [ 856: 859] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.022722 786755 task_exit.go:204] [ 856: 858] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.022733 786755 task_exit.go:204] [ 856: 858] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.022740 786755 task_exit.go:204] [ 856: 858] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.022752 786755 task_exit.go:204] [ 856: 857] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.022760 786755 task_exit.go:204] [ 856: 857] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.022773 786755 task_exit.go:204] [ 856: 860] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.024264 786755 task_exit.go:204] [ 856: 860] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.024326 786755 task_exit.go:204] [ 856: 860] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.024343 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.024376 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:59.024397 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.024468 786755 task_exit.go:204] [ 856: 856] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.024750 786755 task_signals.go:470] [ 6: 9] Notified of signal 23 D0713 00:07:59.024808 786755 task_signals.go:179] [ 6: 9] Restarting syscall 202: interrupted by signal 23 D0713 00:07:59.024818 786755 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:07:59.025409 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.027162 786755 syscalls.go:262] [ 861: 861] Allocating stack with size of 8388608 bytes D0713 00:07:59.027326 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.028561 786755 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.028614 786755 usertrap_amd64.go:106] [ 861: 861] Map a usertrap vma at 64000 D0713 00:07:59.028730 786755 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc001a427e0 1 D0713 00:07:59.028782 786755 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:07:59.029334 786755 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.029369 786755 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc001a427e0 2 D0713 00:07:59.029383 786755 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:07:59.030215 786755 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.030262 786755 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc001a427e0 3 D0713 00:07:59.030275 786755 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:07:59.037512 786755 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.037543 786755 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc001a427e0 4 D0713 00:07:59.037557 786755 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:07:59.039021 786755 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.039052 786755 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc001a427e0 5 D0713 00:07:59.039075 786755 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:07:59.039143 786755 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.039149 786755 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc001a427e0 6 D0713 00:07:59.039155 786755 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:07:59.039532 786755 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.039551 786755 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc001a427e0 7 D0713 00:07:59.039557 786755 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:07:59.039680 786755 usertrap_amd64.go:212] [ 861: 862] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.039702 786755 usertrap_amd64.go:122] [ 861: 862] Allocate a new trap: 0xc001a427e0 8 D0713 00:07:59.039708 786755 usertrap_amd64.go:225] [ 861: 862] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:07:59.039809 786755 usertrap_amd64.go:212] [ 861: 862] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.039834 786755 usertrap_amd64.go:122] [ 861: 862] Allocate a new trap: 0xc001a427e0 9 D0713 00:07:59.039844 786755 usertrap_amd64.go:225] [ 861: 862] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:07:59.040089 786755 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.040119 786755 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc001a427e0 10 D0713 00:07:59.040130 786755 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:07:59.049068 786755 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.049110 786755 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc001a427e0 11 D0713 00:07:59.049127 786755 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:07:59.052178 786755 usertrap_amd64.go:212] [ 861: 862] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.052214 786755 usertrap_amd64.go:122] [ 861: 862] Allocate a new trap: 0xc001a427e0 12 D0713 00:07:59.052230 786755 usertrap_amd64.go:225] [ 861: 862] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:07:59.052303 786755 usertrap_amd64.go:212] [ 861: 862] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.052321 786755 usertrap_amd64.go:122] [ 861: 862] Allocate a new trap: 0xc001a427e0 13 D0713 00:07:59.052331 786755 usertrap_amd64.go:225] [ 861: 862] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:07:59.052396 786755 task_signals.go:470] [ 861: 861] Notified of signal 23 D0713 00:07:59.052538 786755 task_signals.go:220] [ 861: 861] Signal 23: delivering to handler D0713 00:07:59.052827 786755 task_signals.go:470] [ 861: 861] Notified of signal 23 D0713 00:07:59.052895 786755 task_signals.go:220] [ 861: 861] Signal 23: delivering to handler I0713 00:07:59.061302 786755 compat.go:120] Unsupported syscall mq_timedsend(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedsend for more information. D0713 00:07:59.061452 786755 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.061484 786755 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc001a427e0 14 D0713 00:07:59.061498 786755 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:07:59.061559 786755 task_exit.go:204] [ 861: 861] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.061577 786755 task_exit.go:204] [ 861: 861] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.061599 786755 task_signals.go:204] [ 861: 862] Signal 861, PID: 862, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.061624 786755 task_exit.go:204] [ 861: 862] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.061634 786755 task_exit.go:204] [ 861: 862] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.061640 786755 task_exit.go:204] [ 861: 862] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.061669 786755 task_signals.go:204] [ 861: 865] Signal 861, PID: 865, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.061663 786755 task_signals.go:204] [ 861: 863] Signal 861, PID: 863, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.061683 786755 task_exit.go:204] [ 861: 865] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.061752 786755 task_signals.go:204] [ 861: 864] Signal 861, PID: 864, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.061772 786755 task_exit.go:204] [ 861: 863] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.061835 786755 task_exit.go:204] [ 861: 863] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.061844 786755 task_exit.go:204] [ 861: 863] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.061875 786755 task_exit.go:204] [ 861: 865] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.061890 786755 task_exit.go:204] [ 861: 865] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.061903 786755 task_exit.go:204] [ 861: 864] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.063587 786755 task_exit.go:204] [ 861: 864] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.063618 786755 task_exit.go:204] [ 861: 864] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.063639 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.063683 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:59.063699 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.063797 786755 task_exit.go:204] [ 861: 861] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.064406 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.066130 786755 syscalls.go:262] [ 866: 866] Allocating stack with size of 8388608 bytes D0713 00:07:59.066364 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.067413 786755 usertrap_amd64.go:212] [ 866: 866] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.067461 786755 usertrap_amd64.go:106] [ 866: 866] Map a usertrap vma at 67000 D0713 00:07:59.067549 786755 usertrap_amd64.go:122] [ 866: 866] Allocate a new trap: 0xc001a42ba0 1 D0713 00:07:59.067592 786755 usertrap_amd64.go:225] [ 866: 866] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:07:59.067929 786755 usertrap_amd64.go:212] [ 866: 866] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.067964 786755 usertrap_amd64.go:122] [ 866: 866] Allocate a new trap: 0xc001a42ba0 2 D0713 00:07:59.067981 786755 usertrap_amd64.go:225] [ 866: 866] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:07:59.069292 786755 usertrap_amd64.go:212] [ 866: 866] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.069320 786755 usertrap_amd64.go:122] [ 866: 866] Allocate a new trap: 0xc001a42ba0 3 D0713 00:07:59.069333 786755 usertrap_amd64.go:225] [ 866: 866] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:07:59.078575 786755 usertrap_amd64.go:212] [ 866: 866] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.078615 786755 usertrap_amd64.go:122] [ 866: 866] Allocate a new trap: 0xc001a42ba0 4 D0713 00:07:59.078629 786755 usertrap_amd64.go:225] [ 866: 866] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:07:59.079832 786755 usertrap_amd64.go:212] [ 866: 866] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.079873 786755 usertrap_amd64.go:122] [ 866: 866] Allocate a new trap: 0xc001a42ba0 5 D0713 00:07:59.079895 786755 usertrap_amd64.go:225] [ 866: 866] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:07:59.079954 786755 usertrap_amd64.go:212] [ 866: 866] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.080009 786755 usertrap_amd64.go:122] [ 866: 866] Allocate a new trap: 0xc001a42ba0 6 D0713 00:07:59.080022 786755 usertrap_amd64.go:225] [ 866: 866] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:07:59.080438 786755 usertrap_amd64.go:212] [ 866: 866] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.080467 786755 usertrap_amd64.go:122] [ 866: 866] Allocate a new trap: 0xc001a42ba0 7 D0713 00:07:59.080477 786755 usertrap_amd64.go:225] [ 866: 866] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:07:59.080637 786755 usertrap_amd64.go:212] [ 866: 867] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.080670 786755 usertrap_amd64.go:122] [ 866: 867] Allocate a new trap: 0xc001a42ba0 8 D0713 00:07:59.080681 786755 usertrap_amd64.go:225] [ 866: 867] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:07:59.081083 786755 usertrap_amd64.go:212] [ 866: 867] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.081112 786755 usertrap_amd64.go:122] [ 866: 867] Allocate a new trap: 0xc001a42ba0 9 D0713 00:07:59.081126 786755 usertrap_amd64.go:225] [ 866: 867] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:07:59.081224 786755 usertrap_amd64.go:212] [ 866: 869] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.081247 786755 usertrap_amd64.go:122] [ 866: 869] Allocate a new trap: 0xc001a42ba0 10 D0713 00:07:59.081259 786755 usertrap_amd64.go:225] [ 866: 869] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:07:59.089764 786755 usertrap_amd64.go:212] [ 866: 866] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.089818 786755 usertrap_amd64.go:122] [ 866: 866] Allocate a new trap: 0xc001a42ba0 11 D0713 00:07:59.089839 786755 usertrap_amd64.go:225] [ 866: 866] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:07:59.092525 786755 usertrap_amd64.go:212] [ 866: 867] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.092573 786755 usertrap_amd64.go:122] [ 866: 867] Allocate a new trap: 0xc001a42ba0 12 D0713 00:07:59.092592 786755 usertrap_amd64.go:225] [ 866: 867] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:07:59.092655 786755 usertrap_amd64.go:212] [ 866: 867] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.092664 786755 usertrap_amd64.go:122] [ 866: 867] Allocate a new trap: 0xc001a42ba0 13 D0713 00:07:59.092673 786755 usertrap_amd64.go:225] [ 866: 867] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:07:59.092702 786755 task_signals.go:470] [ 866: 866] Notified of signal 23 D0713 00:07:59.092883 786755 task_signals.go:220] [ 866: 866] Signal 23: delivering to handler D0713 00:07:59.101884 786755 usertrap_amd64.go:212] [ 866: 866] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.101924 786755 usertrap_amd64.go:122] [ 866: 866] Allocate a new trap: 0xc001a42ba0 14 D0713 00:07:59.101972 786755 usertrap_amd64.go:225] [ 866: 866] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:07:59.102075 786755 task_exit.go:204] [ 866: 866] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.102157 786755 task_exit.go:204] [ 866: 866] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.102187 786755 task_signals.go:204] [ 866: 868] Signal 866, PID: 868, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.102206 786755 task_exit.go:204] [ 866: 868] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.102215 786755 task_exit.go:204] [ 866: 868] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.102221 786755 task_exit.go:204] [ 866: 868] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.102238 786755 task_signals.go:204] [ 866: 867] Signal 866, PID: 867, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.102260 786755 task_exit.go:204] [ 866: 867] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.102269 786755 task_exit.go:204] [ 866: 867] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.102275 786755 task_exit.go:204] [ 866: 867] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.102288 786755 task_signals.go:204] [ 866: 869] Signal 866, PID: 869, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.102299 786755 task_exit.go:204] [ 866: 869] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.102306 786755 task_exit.go:204] [ 866: 869] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.102322 786755 task_exit.go:204] [ 866: 869] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.102335 786755 task_signals.go:204] [ 866: 870] Signal 866, PID: 870, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.102347 786755 task_exit.go:204] [ 866: 870] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.102355 786755 task_exit.go:204] [ 866: 870] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.102366 786755 task_exit.go:204] [ 866: 870] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.102388 786755 task_signals.go:204] [ 866: 871] Signal 866, PID: 871, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.102418 786755 task_exit.go:204] [ 866: 871] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.103981 786755 task_exit.go:204] [ 866: 871] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.104035 786755 task_exit.go:204] [ 866: 871] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.104057 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.104091 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:59.104104 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.104238 786755 task_exit.go:204] [ 866: 866] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.105136 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.106755 786755 syscalls.go:262] [ 872: 872] Allocating stack with size of 8388608 bytes D0713 00:07:59.106901 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.107975 786755 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.108017 786755 usertrap_amd64.go:106] [ 872: 872] Map a usertrap vma at 61000 D0713 00:07:59.108102 786755 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc002012930 1 D0713 00:07:59.108133 786755 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:07:59.111239 786755 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.111260 786755 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc002012930 2 D0713 00:07:59.111274 786755 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:07:59.112094 786755 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.112127 786755 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc002012930 3 D0713 00:07:59.112142 786755 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:07:59.119641 786755 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.119683 786755 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc002012930 4 D0713 00:07:59.119699 786755 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:07:59.120885 786755 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.120928 786755 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc002012930 5 D0713 00:07:59.120985 786755 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:07:59.121145 786755 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.121180 786755 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc002012930 6 D0713 00:07:59.121195 786755 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:07:59.121669 786755 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.121700 786755 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc002012930 7 D0713 00:07:59.121709 786755 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:07:59.122011 786755 usertrap_amd64.go:212] [ 872: 873] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.122040 786755 usertrap_amd64.go:122] [ 872: 873] Allocate a new trap: 0xc002012930 8 D0713 00:07:59.122052 786755 usertrap_amd64.go:225] [ 872: 873] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:07:59.122288 786755 usertrap_amd64.go:212] [ 872: 873] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.122319 786755 usertrap_amd64.go:122] [ 872: 873] Allocate a new trap: 0xc002012930 9 D0713 00:07:59.122334 786755 usertrap_amd64.go:225] [ 872: 873] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:07:59.122378 786755 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.122394 786755 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc002012930 10 D0713 00:07:59.122408 786755 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:07:59.131009 786755 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.131049 786755 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc002012930 11 D0713 00:07:59.131063 786755 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:07:59.133619 786755 usertrap_amd64.go:212] [ 872: 873] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.133656 786755 usertrap_amd64.go:122] [ 872: 873] Allocate a new trap: 0xc002012930 12 D0713 00:07:59.133669 786755 usertrap_amd64.go:225] [ 872: 873] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:07:59.133719 786755 usertrap_amd64.go:212] [ 872: 873] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.133729 786755 usertrap_amd64.go:122] [ 872: 873] Allocate a new trap: 0xc002012930 13 D0713 00:07:59.133739 786755 usertrap_amd64.go:225] [ 872: 873] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:07:59.133771 786755 task_signals.go:470] [ 872: 872] Notified of signal 23 D0713 00:07:59.133858 786755 task_signals.go:220] [ 872: 872] Signal 23: delivering to handler D0713 00:07:59.143034 786755 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.143073 786755 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc002012930 14 D0713 00:07:59.143099 786755 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:07:59.143167 786755 task_exit.go:204] [ 872: 872] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.143338 786755 task_exit.go:204] [ 872: 872] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.143402 786755 task_signals.go:204] [ 872: 874] Signal 872, PID: 874, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.143408 786755 task_signals.go:204] [ 872: 873] Signal 872, PID: 873, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.143457 786755 task_exit.go:204] [ 872: 874] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.143431 786755 task_signals.go:204] [ 872: 875] Signal 872, PID: 875, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.143498 786755 task_signals.go:204] [ 872: 876] Signal 872, PID: 876, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.143528 786755 task_exit.go:204] [ 872: 874] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.143545 786755 task_exit.go:204] [ 872: 874] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.143562 786755 task_exit.go:204] [ 872: 873] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.143582 786755 task_exit.go:204] [ 872: 873] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.143588 786755 task_exit.go:204] [ 872: 873] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.143597 786755 task_exit.go:204] [ 872: 875] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.143605 786755 task_exit.go:204] [ 872: 875] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.143622 786755 task_exit.go:204] [ 872: 875] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.143642 786755 task_exit.go:204] [ 872: 876] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.145100 786755 task_exit.go:204] [ 872: 876] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.145135 786755 task_exit.go:204] [ 872: 876] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.145153 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.148780 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:59.148810 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.149060 786755 task_exit.go:204] [ 872: 872] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.149336 786755 task_signals.go:470] [ 6: 23] Notified of signal 23 D0713 00:07:59.149458 786755 task_signals.go:220] [ 6: 23] Signal 23: delivering to handler D0713 00:07:59.150295 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.151702 786755 syscalls.go:262] [ 877: 877] Allocating stack with size of 8388608 bytes D0713 00:07:59.151836 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.153107 786755 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.153147 786755 usertrap_amd64.go:106] [ 877: 877] Map a usertrap vma at 64000 D0713 00:07:59.153256 786755 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc001aba8a0 1 D0713 00:07:59.153292 786755 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:07:59.153778 786755 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.153794 786755 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc001aba8a0 2 D0713 00:07:59.153806 786755 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:07:59.154291 786755 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.154305 786755 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc001aba8a0 3 D0713 00:07:59.154319 786755 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:07:59.160377 786755 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.160411 786755 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc001aba8a0 4 D0713 00:07:59.160424 786755 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:07:59.161594 786755 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.161619 786755 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc001aba8a0 5 D0713 00:07:59.161644 786755 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:07:59.161685 786755 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.161694 786755 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc001aba8a0 6 D0713 00:07:59.161699 786755 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:07:59.161860 786755 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.161872 786755 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc001aba8a0 7 D0713 00:07:59.161878 786755 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:07:59.161994 786755 usertrap_amd64.go:212] [ 877: 878] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.162010 786755 usertrap_amd64.go:122] [ 877: 878] Allocate a new trap: 0xc001aba8a0 8 D0713 00:07:59.162020 786755 usertrap_amd64.go:225] [ 877: 878] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:07:59.162200 786755 usertrap_amd64.go:212] [ 877: 878] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.162224 786755 usertrap_amd64.go:122] [ 877: 878] Allocate a new trap: 0xc001aba8a0 9 D0713 00:07:59.162234 786755 usertrap_amd64.go:225] [ 877: 878] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:07:59.162279 786755 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.162293 786755 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc001aba8a0 10 D0713 00:07:59.162301 786755 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:07:59.170106 786755 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.170144 786755 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc001aba8a0 11 D0713 00:07:59.170155 786755 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:07:59.173681 786755 usertrap_amd64.go:212] [ 877: 878] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.173716 786755 usertrap_amd64.go:122] [ 877: 878] Allocate a new trap: 0xc001aba8a0 12 D0713 00:07:59.173734 786755 usertrap_amd64.go:225] [ 877: 878] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:07:59.173831 786755 usertrap_amd64.go:212] [ 877: 878] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.173867 786755 usertrap_amd64.go:122] [ 877: 878] Allocate a new trap: 0xc001aba8a0 13 D0713 00:07:59.173881 786755 usertrap_amd64.go:225] [ 877: 878] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:07:59.173947 786755 task_signals.go:470] [ 877: 877] Notified of signal 23 D0713 00:07:59.174108 786755 task_signals.go:220] [ 877: 877] Signal 23: delivering to handler D0713 00:07:59.181196 786755 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.181230 786755 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc001aba8a0 14 D0713 00:07:59.181242 786755 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:07:59.181335 786755 task_exit.go:204] [ 877: 877] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.181365 786755 task_exit.go:204] [ 877: 877] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.181400 786755 task_signals.go:204] [ 877: 880] Signal 877, PID: 880, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.181391 786755 task_signals.go:204] [ 877: 878] Signal 877, PID: 878, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.181414 786755 task_exit.go:204] [ 877: 880] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.181431 786755 task_signals.go:204] [ 877: 879] Signal 877, PID: 879, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.181460 786755 task_signals.go:204] [ 877: 881] Signal 877, PID: 881, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.181489 786755 task_exit.go:204] [ 877: 880] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.181502 786755 task_exit.go:204] [ 877: 880] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.181534 786755 task_exit.go:204] [ 877: 878] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.181541 786755 task_exit.go:204] [ 877: 878] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.181546 786755 task_exit.go:204] [ 877: 878] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.181553 786755 task_exit.go:204] [ 877: 879] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.181559 786755 task_exit.go:204] [ 877: 879] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.181563 786755 task_exit.go:204] [ 877: 879] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.181581 786755 task_exit.go:204] [ 877: 881] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.183091 786755 task_exit.go:204] [ 877: 881] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.183126 786755 task_exit.go:204] [ 877: 881] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.183153 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.183195 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:59.183221 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.183292 786755 task_exit.go:204] [ 877: 877] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.184085 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.187910 786755 syscalls.go:262] [ 882: 882] Allocating stack with size of 8388608 bytes D0713 00:07:59.188678 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.190104 786755 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.190227 786755 usertrap_amd64.go:106] [ 882: 882] Map a usertrap vma at 6a000 D0713 00:07:59.190316 786755 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc001a42ea0 1 D0713 00:07:59.190364 786755 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:07:59.190820 786755 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.190845 786755 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc001a42ea0 2 D0713 00:07:59.190854 786755 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:07:59.191693 786755 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.191738 786755 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc001a42ea0 3 D0713 00:07:59.191837 786755 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:07:59.202699 786755 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.202816 786755 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc001a42ea0 4 D0713 00:07:59.202837 786755 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:07:59.204119 786755 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.204156 786755 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc001a42ea0 5 D0713 00:07:59.204181 786755 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:07:59.204243 786755 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.204263 786755 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc001a42ea0 6 D0713 00:07:59.204274 786755 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:07:59.204705 786755 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.204729 786755 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc001a42ea0 7 D0713 00:07:59.204736 786755 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:07:59.205127 786755 usertrap_amd64.go:212] [ 882: 883] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.205209 786755 usertrap_amd64.go:122] [ 882: 883] Allocate a new trap: 0xc001a42ea0 8 D0713 00:07:59.205231 786755 usertrap_amd64.go:225] [ 882: 883] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:07:59.205535 786755 usertrap_amd64.go:212] [ 882: 883] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.205571 786755 usertrap_amd64.go:122] [ 882: 883] Allocate a new trap: 0xc001a42ea0 9 D0713 00:07:59.205585 786755 usertrap_amd64.go:225] [ 882: 883] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:07:59.205872 786755 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.205926 786755 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc001a42ea0 10 D0713 00:07:59.205977 786755 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:07:59.213984 786755 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.214010 786755 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc001a42ea0 11 D0713 00:07:59.214021 786755 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:07:59.217884 786755 usertrap_amd64.go:212] [ 882: 883] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.217918 786755 usertrap_amd64.go:122] [ 882: 883] Allocate a new trap: 0xc001a42ea0 12 D0713 00:07:59.218017 786755 usertrap_amd64.go:225] [ 882: 883] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:07:59.218219 786755 usertrap_amd64.go:212] [ 882: 883] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.218245 786755 usertrap_amd64.go:122] [ 882: 883] Allocate a new trap: 0xc001a42ea0 13 D0713 00:07:59.218256 786755 usertrap_amd64.go:225] [ 882: 883] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:07:59.218309 786755 task_signals.go:470] [ 882: 882] Notified of signal 23 D0713 00:07:59.218423 786755 task_signals.go:220] [ 882: 882] Signal 23: delivering to handler D0713 00:07:59.224867 786755 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.224905 786755 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc001a42ea0 14 D0713 00:07:59.224923 786755 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:07:59.225035 786755 task_exit.go:204] [ 882: 882] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.225082 786755 task_exit.go:204] [ 882: 882] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.225124 786755 task_signals.go:204] [ 882: 884] Signal 882, PID: 884, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.225166 786755 task_signals.go:204] [ 882: 886] Signal 882, PID: 886, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.225168 786755 task_signals.go:204] [ 882: 885] Signal 882, PID: 885, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.225187 786755 task_exit.go:204] [ 882: 884] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.225207 786755 task_exit.go:204] [ 882: 885] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.225240 786755 task_exit.go:204] [ 882: 885] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.225249 786755 task_exit.go:204] [ 882: 885] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.225275 786755 task_exit.go:204] [ 882: 886] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.225240 786755 task_signals.go:204] [ 882: 883] Signal 882, PID: 883, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.225297 786755 task_exit.go:204] [ 882: 884] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.225311 786755 task_exit.go:204] [ 882: 884] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.225327 786755 task_exit.go:204] [ 882: 883] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.225373 786755 task_exit.go:204] [ 882: 883] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.225393 786755 task_exit.go:204] [ 882: 883] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.227018 786755 task_exit.go:204] [ 882: 886] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.227053 786755 task_exit.go:204] [ 882: 886] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.227120 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.227270 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:59.227298 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.227445 786755 task_exit.go:204] [ 882: 882] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.228929 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.230439 786755 syscalls.go:262] [ 887: 887] Allocating stack with size of 8388608 bytes D0713 00:07:59.230582 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.231521 786755 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.231552 786755 usertrap_amd64.go:106] [ 887: 887] Map a usertrap vma at 67000 D0713 00:07:59.231644 786755 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc0020131a0 1 D0713 00:07:59.231698 786755 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:07:59.232063 786755 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.232087 786755 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc0020131a0 2 D0713 00:07:59.232098 786755 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:07:59.232898 786755 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.232928 786755 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc0020131a0 3 D0713 00:07:59.232974 786755 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:07:59.239273 786755 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.239336 786755 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc0020131a0 4 D0713 00:07:59.239485 786755 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:07:59.240919 786755 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.240973 786755 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc0020131a0 5 D0713 00:07:59.240987 786755 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:07:59.241051 786755 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.241066 786755 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc0020131a0 6 D0713 00:07:59.241071 786755 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:07:59.241553 786755 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.241579 786755 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc0020131a0 7 D0713 00:07:59.241588 786755 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:07:59.241740 786755 usertrap_amd64.go:212] [ 887: 888] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.241760 786755 usertrap_amd64.go:122] [ 887: 888] Allocate a new trap: 0xc0020131a0 8 D0713 00:07:59.241770 786755 usertrap_amd64.go:225] [ 887: 888] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:07:59.241970 786755 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.241991 786755 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc0020131a0 9 D0713 00:07:59.241999 786755 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:07:59.242036 786755 usertrap_amd64.go:212] [ 887: 888] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.242058 786755 usertrap_amd64.go:122] [ 887: 888] Allocate a new trap: 0xc0020131a0 10 D0713 00:07:59.242084 786755 usertrap_amd64.go:225] [ 887: 888] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:07:59.249788 786755 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.249819 786755 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc0020131a0 11 D0713 00:07:59.249828 786755 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:07:59.252425 786755 usertrap_amd64.go:212] [ 887: 888] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.252449 786755 usertrap_amd64.go:122] [ 887: 888] Allocate a new trap: 0xc0020131a0 12 D0713 00:07:59.252494 786755 usertrap_amd64.go:225] [ 887: 888] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:07:59.252549 786755 usertrap_amd64.go:212] [ 887: 888] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.252569 786755 usertrap_amd64.go:122] [ 887: 888] Allocate a new trap: 0xc0020131a0 13 D0713 00:07:59.252574 786755 usertrap_amd64.go:225] [ 887: 888] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:07:59.252589 786755 task_signals.go:470] [ 887: 887] Notified of signal 23 D0713 00:07:59.252665 786755 task_signals.go:220] [ 887: 887] Signal 23: delivering to handler D0713 00:07:59.260335 786755 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.260383 786755 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc0020131a0 14 D0713 00:07:59.260399 786755 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:07:59.260497 786755 task_exit.go:204] [ 887: 887] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.260549 786755 task_exit.go:204] [ 887: 887] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.260572 786755 task_signals.go:204] [ 887: 889] Signal 887, PID: 889, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.260575 786755 task_signals.go:204] [ 887: 891] Signal 887, PID: 891, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.260600 786755 task_signals.go:204] [ 887: 888] Signal 887, PID: 888, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.260633 786755 task_exit.go:204] [ 887: 889] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.260659 786755 task_signals.go:204] [ 887: 890] Signal 887, PID: 890, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.260677 786755 task_exit.go:204] [ 887: 889] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.260682 786755 task_exit.go:204] [ 887: 889] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.260693 786755 task_exit.go:204] [ 887: 891] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.260711 786755 task_exit.go:204] [ 887: 891] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.260719 786755 task_exit.go:204] [ 887: 891] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.260730 786755 task_exit.go:204] [ 887: 888] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.260748 786755 task_exit.go:204] [ 887: 888] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.260755 786755 task_exit.go:204] [ 887: 888] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.260772 786755 task_exit.go:204] [ 887: 890] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.262144 786755 task_exit.go:204] [ 887: 890] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.262308 786755 task_exit.go:204] [ 887: 890] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.262340 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.262366 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:07:59.262379 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.262427 786755 task_exit.go:204] [ 887: 887] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.263421 786755 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.264810 786755 syscalls.go:262] [ 892: 892] Allocating stack with size of 8388608 bytes D0713 00:07:59.265043 786755 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.265928 786755 usertrap_amd64.go:212] [ 892: 892] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.265966 786755 usertrap_amd64.go:106] [ 892: 892] Map a usertrap vma at 62000 D0713 00:07:59.266061 786755 usertrap_amd64.go:122] [ 892: 892] Allocate a new trap: 0xc001380510 1 D0713 00:07:59.266094 786755 usertrap_amd64.go:225] [ 892: 892] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:07:59.266335 786755 usertrap_amd64.go:212] [ 892: 892] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.266346 786755 usertrap_amd64.go:122] [ 892: 892] Allocate a new trap: 0xc001380510 2 D0713 00:07:59.266355 786755 usertrap_amd64.go:225] [ 892: 892] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:07:59.266836 786755 usertrap_amd64.go:212] [ 892: 892] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.266879 786755 usertrap_amd64.go:122] [ 892: 892] Allocate a new trap: 0xc001380510 3 D0713 00:07:59.266892 786755 usertrap_amd64.go:225] [ 892: 892] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:07:59.273265 786755 usertrap_amd64.go:212] [ 892: 892] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.273298 786755 usertrap_amd64.go:122] [ 892: 892] Allocate a new trap: 0xc001380510 4 D0713 00:07:59.273311 786755 usertrap_amd64.go:225] [ 892: 892] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:07:59.274429 786755 usertrap_amd64.go:212] [ 892: 892] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.274452 786755 usertrap_amd64.go:122] [ 892: 892] Allocate a new trap: 0xc001380510 5 D0713 00:07:59.274461 786755 usertrap_amd64.go:225] [ 892: 892] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:07:59.274511 786755 usertrap_amd64.go:212] [ 892: 892] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.274527 786755 usertrap_amd64.go:122] [ 892: 892] Allocate a new trap: 0xc001380510 6 D0713 00:07:59.274534 786755 usertrap_amd64.go:225] [ 892: 892] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:07:59.274711 786755 usertrap_amd64.go:212] [ 892: 892] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.274755 786755 usertrap_amd64.go:122] [ 892: 892] Allocate a new trap: 0xc001380510 7 D0713 00:07:59.274764 786755 usertrap_amd64.go:225] [ 892: 892] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:07:59.274999 786755 usertrap_amd64.go:212] [ 892: 893] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.275031 786755 usertrap_amd64.go:122] [ 892: 893] Allocate a new trap: 0xc001380510 8 D0713 00:07:59.275042 786755 usertrap_amd64.go:225] [ 892: 893] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:07:59.275308 786755 usertrap_amd64.go:212] [ 892: 893] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.275354 786755 usertrap_amd64.go:122] [ 892: 893] Allocate a new trap: 0xc001380510 9 D0713 00:07:59.275363 786755 usertrap_amd64.go:225] [ 892: 893] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:07:59.275382 786755 usertrap_amd64.go:212] [ 892: 892] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.275387 786755 usertrap_amd64.go:122] [ 892: 892] Allocate a new trap: 0xc001380510 10 D0713 00:07:59.275393 786755 usertrap_amd64.go:225] [ 892: 892] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:07:59.275910 786755 usertrap_amd64.go:212] [ 892: 893] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.275938 786755 usertrap_amd64.go:122] [ 892: 893] Allocate a new trap: 0xc001380510 11 D0713 00:07:59.275951 786755 usertrap_amd64.go:225] [ 892: 893] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:07:59.275991 786755 usertrap_amd64.go:212] [ 892: 893] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.276000 786755 usertrap_amd64.go:122] [ 892: 893] Allocate a new trap: 0xc001380510 12 D0713 00:07:59.276012 786755 usertrap_amd64.go:225] [ 892: 893] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:07:59.276062 786755 task_signals.go:470] [ 892: 892] Notified of signal 23 D0713 00:07:59.276243 786755 task_signals.go:220] [ 892: 892] Signal 23: delivering to handler D0713 00:07:59.282564 786755 usertrap_amd64.go:212] [ 892: 892] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.282590 786755 usertrap_amd64.go:122] [ 892: 892] Allocate a new trap: 0xc001380510 13 D0713 00:07:59.282600 786755 usertrap_amd64.go:225] [ 892: 892] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:07:59.286526 786755 task_signals.go:470] [ 892: 892] Notified of signal 23 D0713 00:07:59.286609 786755 task_signals.go:220] [ 892: 892] Signal 23: delivering to handler D0713 00:07:59.293274 786755 usertrap_amd64.go:212] [ 892: 892] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.293321 786755 usertrap_amd64.go:122] [ 892: 892] Allocate a new trap: 0xc001380510 14 D0713 00:07:59.293335 786755 usertrap_amd64.go:225] [ 892: 892] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:07:59.293398 786755 task_exit.go:204] [ 892: 892] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.293421 786755 task_exit.go:204] [ 892: 892] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.293448 786755 task_signals.go:204] [ 892: 896] Signal 892, PID: 896, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.293446 786755 task_signals.go:204] [ 892: 894] Signal 892, PID: 894, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.293466 786755 task_exit.go:204] [ 892: 896] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.293483 786755 task_exit.go:204] [ 892: 896] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.293490 786755 task_exit.go:204] [ 892: 896] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.293504 786755 task_exit.go:204] [ 892: 894] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.293514 786755 task_signals.go:204] [ 892: 893] Signal 892, PID: 893, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.293541 786755 task_signals.go:204] [ 892: 895] Signal 892, PID: 895, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.293563 786755 task_exit.go:204] [ 892: 894] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.293570 786755 task_exit.go:204] [ 892: 894] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.293581 786755 task_exit.go:204] [ 892: 893] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.293590 786755 task_exit.go:204] [ 892: 893] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.293596 786755 task_exit.go:204] [ 892: 893] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.293607 786755 task_exit.go:204] [ 892: 895] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.294847 786755 task_exit.go:204] [ 892: 895] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.294873 786755 task_exit.go:204] [ 892: 895] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.294883 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.294934 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.295069 786755 task_signals.go:470] [ 6: 9] Notified of signal 23 D0713 00:07:59.295107 786755 task_exit.go:204] [ 892: 892] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.295131 786755 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:07:59.296130 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.297893 786755 syscalls.go:262] [ 897: 897] Allocating stack with size of 8388608 bytes D0713 00:07:59.298130 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.305846 786755 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.305893 786755 usertrap_amd64.go:106] [ 897: 897] Map a usertrap vma at 65000 D0713 00:07:59.305967 786755 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc0012815f0 1 D0713 00:07:59.305991 786755 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:07:59.306379 786755 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.306407 786755 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc0012815f0 2 D0713 00:07:59.306417 786755 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:07:59.306895 786755 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.306915 786755 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc0012815f0 3 D0713 00:07:59.306923 786755 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:07:59.312644 786755 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.312702 786755 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc0012815f0 4 D0713 00:07:59.312718 786755 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:07:59.314002 786755 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.314047 786755 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc0012815f0 5 D0713 00:07:59.314064 786755 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:07:59.314138 786755 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.314168 786755 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc0012815f0 6 D0713 00:07:59.314178 786755 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:07:59.314772 786755 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.314800 786755 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc0012815f0 7 D0713 00:07:59.314812 786755 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:07:59.315160 786755 usertrap_amd64.go:212] [ 897: 898] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.315193 786755 usertrap_amd64.go:122] [ 897: 898] Allocate a new trap: 0xc0012815f0 8 D0713 00:07:59.315206 786755 usertrap_amd64.go:225] [ 897: 898] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:07:59.315436 786755 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.315466 786755 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc0012815f0 9 D0713 00:07:59.315478 786755 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:07:59.315575 786755 usertrap_amd64.go:212] [ 897: 898] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.315603 786755 usertrap_amd64.go:122] [ 897: 898] Allocate a new trap: 0xc0012815f0 10 D0713 00:07:59.315611 786755 usertrap_amd64.go:225] [ 897: 898] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:07:59.323351 786755 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.323379 786755 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc0012815f0 11 D0713 00:07:59.323389 786755 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:07:59.326045 786755 usertrap_amd64.go:212] [ 897: 898] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.326068 786755 usertrap_amd64.go:122] [ 897: 898] Allocate a new trap: 0xc0012815f0 12 D0713 00:07:59.326080 786755 usertrap_amd64.go:225] [ 897: 898] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:07:59.326104 786755 usertrap_amd64.go:212] [ 897: 898] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.326109 786755 usertrap_amd64.go:122] [ 897: 898] Allocate a new trap: 0xc0012815f0 13 D0713 00:07:59.326113 786755 usertrap_amd64.go:225] [ 897: 898] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:07:59.326128 786755 task_signals.go:470] [ 897: 897] Notified of signal 23 D0713 00:07:59.326213 786755 task_signals.go:220] [ 897: 897] Signal 23: delivering to handler D0713 00:07:59.334459 786755 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.334527 786755 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc0012815f0 14 D0713 00:07:59.334620 786755 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:07:59.334732 786755 task_exit.go:204] [ 897: 897] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.334774 786755 task_exit.go:204] [ 897: 897] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.334781 786755 task_signals.go:204] [ 897: 899] Signal 897, PID: 899, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.334800 786755 task_signals.go:204] [ 897: 900] Signal 897, PID: 900, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.334814 786755 task_signals.go:204] [ 897: 901] Signal 897, PID: 901, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.334819 786755 task_exit.go:204] [ 897: 899] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.334907 786755 task_exit.go:204] [ 897: 900] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.334932 786755 task_signals.go:204] [ 897: 898] Signal 897, PID: 898, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.334955 786755 task_exit.go:204] [ 897: 900] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.334963 786755 task_exit.go:204] [ 897: 900] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.334980 786755 task_exit.go:204] [ 897: 901] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.334990 786755 task_exit.go:204] [ 897: 901] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.334996 786755 task_exit.go:204] [ 897: 901] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.335008 786755 task_exit.go:204] [ 897: 899] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.335015 786755 task_exit.go:204] [ 897: 899] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.335034 786755 task_exit.go:204] [ 897: 898] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.336520 786755 task_exit.go:204] [ 897: 898] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.336558 786755 task_exit.go:204] [ 897: 898] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.336572 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.336610 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:59.336635 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.336719 786755 task_exit.go:204] [ 897: 897] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.336978 786755 task_signals.go:470] [ 6: 9] Notified of signal 23 D0713 00:07:59.337037 786755 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:07:59.337724 786755 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.339357 786755 syscalls.go:262] [ 902: 902] Allocating stack with size of 8388608 bytes D0713 00:07:59.339546 786755 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.340507 786755 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.340589 786755 usertrap_amd64.go:106] [ 902: 902] Map a usertrap vma at 67000 D0713 00:07:59.340692 786755 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc001380a80 1 D0713 00:07:59.340721 786755 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:07:59.341054 786755 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.341093 786755 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc001380a80 2 D0713 00:07:59.341101 786755 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:07:59.341774 786755 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.341810 786755 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc001380a80 3 D0713 00:07:59.341826 786755 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:07:59.348417 786755 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.348454 786755 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc001380a80 4 D0713 00:07:59.348468 786755 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:07:59.349801 786755 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.349829 786755 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc001380a80 5 D0713 00:07:59.349839 786755 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:07:59.349899 786755 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.349918 786755 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc001380a80 6 D0713 00:07:59.349927 786755 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:07:59.350208 786755 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.350229 786755 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc001380a80 7 D0713 00:07:59.350238 786755 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:07:59.350422 786755 usertrap_amd64.go:212] [ 902: 903] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.350451 786755 usertrap_amd64.go:122] [ 902: 903] Allocate a new trap: 0xc001380a80 8 D0713 00:07:59.350471 786755 usertrap_amd64.go:225] [ 902: 903] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:07:59.350617 786755 usertrap_amd64.go:212] [ 902: 903] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.350643 786755 usertrap_amd64.go:122] [ 902: 903] Allocate a new trap: 0xc001380a80 9 D0713 00:07:59.350652 786755 usertrap_amd64.go:225] [ 902: 903] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:07:59.350725 786755 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.350739 786755 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc001380a80 10 D0713 00:07:59.350747 786755 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:07:59.351204 786755 usertrap_amd64.go:212] [ 902: 903] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.351225 786755 usertrap_amd64.go:122] [ 902: 903] Allocate a new trap: 0xc001380a80 11 D0713 00:07:59.351237 786755 usertrap_amd64.go:225] [ 902: 903] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:07:59.351557 786755 usertrap_amd64.go:212] [ 902: 903] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.351585 786755 usertrap_amd64.go:122] [ 902: 903] Allocate a new trap: 0xc001380a80 12 D0713 00:07:59.351595 786755 usertrap_amd64.go:225] [ 902: 903] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:07:59.351626 786755 task_signals.go:470] [ 902: 902] Notified of signal 23 D0713 00:07:59.351661 786755 task_signals.go:220] [ 902: 902] Signal 23: delivering to handler D0713 00:07:59.358461 786755 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.358497 786755 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc001380a80 13 D0713 00:07:59.358510 786755 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:07:59.361805 786755 task_signals.go:470] [ 902: 902] Notified of signal 23 D0713 00:07:59.361844 786755 task_signals.go:220] [ 902: 902] Signal 23: delivering to handler D0713 00:07:59.369652 786755 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.369686 786755 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc001380a80 14 D0713 00:07:59.369699 786755 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:07:59.369752 786755 task_exit.go:204] [ 902: 902] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.369779 786755 task_exit.go:204] [ 902: 902] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.369797 786755 task_signals.go:204] [ 902: 905] Signal 902, PID: 905, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.369809 786755 task_exit.go:204] [ 902: 905] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.369814 786755 task_exit.go:204] [ 902: 905] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.369802 786755 task_signals.go:204] [ 902: 904] Signal 902, PID: 904, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.369817 786755 task_exit.go:204] [ 902: 905] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.369847 786755 task_signals.go:204] [ 902: 906] Signal 902, PID: 906, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.369931 786755 task_exit.go:204] [ 902: 904] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.369954 786755 task_signals.go:204] [ 902: 903] Signal 902, PID: 903, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.369973 786755 task_exit.go:204] [ 902: 904] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.369992 786755 task_exit.go:204] [ 902: 904] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.370024 786755 task_exit.go:204] [ 902: 906] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.370041 786755 task_exit.go:204] [ 902: 906] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.370048 786755 task_exit.go:204] [ 902: 906] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.370061 786755 task_exit.go:204] [ 902: 903] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.371358 786755 task_exit.go:204] [ 902: 903] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.371385 786755 task_exit.go:204] [ 902: 903] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.371396 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.371423 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.371556 786755 task_exit.go:204] [ 902: 902] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.372333 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.374238 786755 syscalls.go:262] [ 907: 907] Allocating stack with size of 8388608 bytes D0713 00:07:59.374348 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.375754 786755 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.375808 786755 usertrap_amd64.go:106] [ 907: 907] Map a usertrap vma at 66000 D0713 00:07:59.375870 786755 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc002013770 1 D0713 00:07:59.375897 786755 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:07:59.376289 786755 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.376313 786755 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc002013770 2 D0713 00:07:59.376324 786755 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:07:59.377019 786755 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.377048 786755 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc002013770 3 D0713 00:07:59.377061 786755 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:07:59.384773 786755 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.384803 786755 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc002013770 4 D0713 00:07:59.384817 786755 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:07:59.385944 786755 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.385963 786755 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc002013770 5 D0713 00:07:59.385996 786755 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:07:59.386128 786755 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.386144 786755 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc002013770 6 D0713 00:07:59.386152 786755 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:07:59.386354 786755 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.386367 786755 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc002013770 7 D0713 00:07:59.386375 786755 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:07:59.386555 786755 usertrap_amd64.go:212] [ 907: 908] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.386575 786755 usertrap_amd64.go:122] [ 907: 908] Allocate a new trap: 0xc002013770 8 D0713 00:07:59.386585 786755 usertrap_amd64.go:225] [ 907: 908] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:07:59.386766 786755 usertrap_amd64.go:212] [ 907: 908] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.386790 786755 usertrap_amd64.go:122] [ 907: 908] Allocate a new trap: 0xc002013770 9 D0713 00:07:59.386807 786755 usertrap_amd64.go:225] [ 907: 908] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:07:59.386818 786755 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.386825 786755 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc002013770 10 D0713 00:07:59.386834 786755 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:07:59.386914 786755 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:59.386938 786755 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc002013770 11 D0713 00:07:59.386948 786755 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:07:59.387340 786755 usertrap_amd64.go:212] [ 907: 908] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.387379 786755 usertrap_amd64.go:122] [ 907: 908] Allocate a new trap: 0xc002013770 12 D0713 00:07:59.387399 786755 usertrap_amd64.go:225] [ 907: 908] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:07:59.387436 786755 usertrap_amd64.go:212] [ 907: 908] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.387458 786755 usertrap_amd64.go:122] [ 907: 908] Allocate a new trap: 0xc002013770 13 D0713 00:07:59.387467 786755 usertrap_amd64.go:225] [ 907: 908] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:07:59.387539 786755 task_signals.go:470] [ 907: 907] Notified of signal 23 D0713 00:07:59.387637 786755 task_signals.go:220] [ 907: 907] Signal 23: delivering to handler D0713 00:07:59.395093 786755 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.395120 786755 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc002013770 14 D0713 00:07:59.395135 786755 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46af29 trap addr 66460 ([184 37 1 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:07:59.398867 786755 task_signals.go:470] [ 907: 907] Notified of signal 23 D0713 00:07:59.398908 786755 task_signals.go:220] [ 907: 907] Signal 23: delivering to handler D0713 00:07:59.405265 786755 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.405315 786755 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc002013770 15 D0713 00:07:59.405332 786755 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 00:07:59.405466 786755 task_exit.go:204] [ 907: 907] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.405509 786755 task_exit.go:204] [ 907: 907] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.405539 786755 task_signals.go:204] [ 907: 909] Signal 907, PID: 909, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.405568 786755 task_exit.go:204] [ 907: 909] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.405577 786755 task_exit.go:204] [ 907: 909] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.405583 786755 task_exit.go:204] [ 907: 909] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.405626 786755 task_signals.go:204] [ 907: 908] Signal 907, PID: 908, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.405682 786755 task_exit.go:204] [ 907: 908] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.405705 786755 task_exit.go:204] [ 907: 908] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.405725 786755 task_exit.go:204] [ 907: 908] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.405768 786755 task_signals.go:204] [ 907: 911] Signal 907, PID: 911, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.405772 786755 task_signals.go:204] [ 907: 910] Signal 907, PID: 910, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.405789 786755 task_exit.go:204] [ 907: 911] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.405806 786755 task_exit.go:204] [ 907: 911] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.405828 786755 task_exit.go:204] [ 907: 911] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.405841 786755 task_exit.go:204] [ 907: 910] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.407464 786755 task_exit.go:204] [ 907: 910] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.407496 786755 task_exit.go:204] [ 907: 910] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.407516 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.407547 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:59.407558 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.408092 786755 task_exit.go:204] [ 907: 907] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.409163 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.410827 786755 syscalls.go:262] [ 912: 912] Allocating stack with size of 8388608 bytes D0713 00:07:59.410943 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.411864 786755 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.411947 786755 usertrap_amd64.go:106] [ 912: 912] Map a usertrap vma at 63000 D0713 00:07:59.412071 786755 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc0022bdbf0 1 D0713 00:07:59.412103 786755 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:07:59.412404 786755 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.412427 786755 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc0022bdbf0 2 D0713 00:07:59.412437 786755 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:07:59.413137 786755 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.413253 786755 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc0022bdbf0 3 D0713 00:07:59.413269 786755 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:07:59.421927 786755 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.421957 786755 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc0022bdbf0 4 D0713 00:07:59.421974 786755 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:07:59.423376 786755 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.423403 786755 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc0022bdbf0 5 D0713 00:07:59.423414 786755 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:07:59.423478 786755 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.423489 786755 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc0022bdbf0 6 D0713 00:07:59.423498 786755 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:07:59.423689 786755 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.423719 786755 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc0022bdbf0 7 D0713 00:07:59.423728 786755 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:07:59.423923 786755 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.423976 786755 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc0022bdbf0 8 D0713 00:07:59.423994 786755 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:07:59.424309 786755 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.424348 786755 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc0022bdbf0 9 D0713 00:07:59.424362 786755 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:07:59.424456 786755 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.424470 786755 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc0022bdbf0 10 D0713 00:07:59.424481 786755 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:07:59.424596 786755 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.424621 786755 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc0022bdbf0 11 D0713 00:07:59.424633 786755 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:07:59.424757 786755 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.424772 786755 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc0022bdbf0 12 D0713 00:07:59.424782 786755 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:07:59.424934 786755 task_signals.go:470] [ 912: 915] Notified of signal 23 D0713 00:07:59.425036 786755 task_signals.go:179] [ 912: 915] Restarting syscall 202: interrupted by signal 23 D0713 00:07:59.425047 786755 task_signals.go:220] [ 912: 915] Signal 23: delivering to handler D0713 00:07:59.432454 786755 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.432485 786755 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc0022bdbf0 13 D0713 00:07:59.432504 786755 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:07:59.435382 786755 task_signals.go:470] [ 912: 912] Notified of signal 23 D0713 00:07:59.435419 786755 task_signals.go:220] [ 912: 912] Signal 23: delivering to handler D0713 00:07:59.443185 786755 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.443213 786755 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc0022bdbf0 14 D0713 00:07:59.443227 786755 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:07:59.443286 786755 task_exit.go:204] [ 912: 912] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.443313 786755 task_exit.go:204] [ 912: 912] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.443347 786755 task_signals.go:204] [ 912: 914] Signal 912, PID: 914, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.443382 786755 task_signals.go:204] [ 912: 915] Signal 912, PID: 915, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.443391 786755 task_exit.go:204] [ 912: 914] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.443408 786755 task_exit.go:204] [ 912: 914] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.443417 786755 task_exit.go:204] [ 912: 914] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.443472 786755 task_signals.go:204] [ 912: 913] Signal 912, PID: 913, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.443477 786755 task_signals.go:204] [ 912: 916] Signal 912, PID: 916, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.443513 786755 task_exit.go:204] [ 912: 913] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.443527 786755 task_exit.go:204] [ 912: 916] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.443551 786755 task_exit.go:204] [ 912: 916] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.443558 786755 task_exit.go:204] [ 912: 916] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.443571 786755 task_exit.go:204] [ 912: 913] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.443575 786755 task_exit.go:204] [ 912: 913] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.443583 786755 task_exit.go:204] [ 912: 915] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.444921 786755 task_exit.go:204] [ 912: 915] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.445040 786755 task_exit.go:204] [ 912: 915] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.445129 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.445192 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:59.445205 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.445343 786755 task_exit.go:204] [ 912: 912] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.445941 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.447506 786755 syscalls.go:262] [ 917: 917] Allocating stack with size of 8388608 bytes D0713 00:07:59.447628 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.448504 786755 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.448535 786755 usertrap_amd64.go:106] [ 917: 917] Map a usertrap vma at 61000 D0713 00:07:59.448637 786755 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc002013c20 1 D0713 00:07:59.448672 786755 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:07:59.449408 786755 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.449486 786755 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc002013c20 2 D0713 00:07:59.449513 786755 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:07:59.450093 786755 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.450121 786755 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc002013c20 3 D0713 00:07:59.450132 786755 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:07:59.455299 786755 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.455325 786755 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc002013c20 4 D0713 00:07:59.455336 786755 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:07:59.456472 786755 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.456483 786755 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc002013c20 5 D0713 00:07:59.456491 786755 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:07:59.456505 786755 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.456509 786755 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc002013c20 6 D0713 00:07:59.456520 786755 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:07:59.456870 786755 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.456890 786755 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc002013c20 7 D0713 00:07:59.456900 786755 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:07:59.457088 786755 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.457111 786755 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc002013c20 8 D0713 00:07:59.457121 786755 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:07:59.457355 786755 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.457382 786755 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc002013c20 9 D0713 00:07:59.457393 786755 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:07:59.457513 786755 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.457549 786755 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc002013c20 10 D0713 00:07:59.457572 786755 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:07:59.458059 786755 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.458076 786755 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc002013c20 11 D0713 00:07:59.458087 786755 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:07:59.458119 786755 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.458128 786755 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc002013c20 12 D0713 00:07:59.458137 786755 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:07:59.458220 786755 task_signals.go:470] [ 917: 917] Notified of signal 23 D0713 00:07:59.458289 786755 task_signals.go:220] [ 917: 917] Signal 23: delivering to handler D0713 00:07:59.464548 786755 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.464575 786755 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc002013c20 13 D0713 00:07:59.464583 786755 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:07:59.468506 786755 task_signals.go:470] [ 917: 917] Notified of signal 23 D0713 00:07:59.468591 786755 task_signals.go:220] [ 917: 917] Signal 23: delivering to handler D0713 00:07:59.474913 786755 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.474949 786755 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc002013c20 14 D0713 00:07:59.474970 786755 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:07:59.475023 786755 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.475054 786755 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.475081 786755 task_signals.go:204] [ 917: 921] Signal 917, PID: 921, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.475089 786755 task_signals.go:204] [ 917: 919] Signal 917, PID: 919, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.475109 786755 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.475127 786755 task_signals.go:204] [ 917: 918] Signal 917, PID: 918, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.475112 786755 task_signals.go:204] [ 917: 920] Signal 917, PID: 920, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.475142 786755 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.475174 786755 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.475228 786755 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.475280 786755 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.475286 786755 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.475298 786755 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.475311 786755 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.475314 786755 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.475323 786755 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.476425 786755 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.476471 786755 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.476492 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.476546 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.476642 786755 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.477334 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.478942 786755 syscalls.go:262] [ 922: 922] Allocating stack with size of 8388608 bytes D0713 00:07:59.479145 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.481042 786755 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.481137 786755 usertrap_amd64.go:106] [ 922: 922] Map a usertrap vma at 68000 D0713 00:07:59.481241 786755 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001a43bf0 1 D0713 00:07:59.481291 786755 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:07:59.481855 786755 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.481882 786755 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001a43bf0 2 D0713 00:07:59.481894 786755 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:07:59.483019 786755 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.483046 786755 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001a43bf0 3 D0713 00:07:59.483057 786755 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:07:59.488878 786755 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.488915 786755 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001a43bf0 4 D0713 00:07:59.488974 786755 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:07:59.490265 786755 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.490297 786755 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001a43bf0 5 D0713 00:07:59.490311 786755 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:07:59.490378 786755 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.490388 786755 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001a43bf0 6 D0713 00:07:59.490399 786755 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:07:59.490749 786755 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.490774 786755 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001a43bf0 7 D0713 00:07:59.490783 786755 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:07:59.491049 786755 usertrap_amd64.go:212] [ 922: 923] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.491061 786755 usertrap_amd64.go:122] [ 922: 923] Allocate a new trap: 0xc001a43bf0 8 D0713 00:07:59.491071 786755 usertrap_amd64.go:225] [ 922: 923] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:07:59.491237 786755 usertrap_amd64.go:212] [ 922: 923] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.491257 786755 usertrap_amd64.go:122] [ 922: 923] Allocate a new trap: 0xc001a43bf0 9 D0713 00:07:59.491271 786755 usertrap_amd64.go:225] [ 922: 923] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:07:59.491493 786755 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.491510 786755 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001a43bf0 10 D0713 00:07:59.491523 786755 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:07:59.501592 786755 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.501636 786755 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001a43bf0 11 D0713 00:07:59.501649 786755 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:07:59.504285 786755 usertrap_amd64.go:212] [ 922: 923] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.504371 786755 usertrap_amd64.go:122] [ 922: 923] Allocate a new trap: 0xc001a43bf0 12 D0713 00:07:59.504495 786755 usertrap_amd64.go:225] [ 922: 923] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:07:59.504549 786755 usertrap_amd64.go:212] [ 922: 923] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.504561 786755 usertrap_amd64.go:122] [ 922: 923] Allocate a new trap: 0xc001a43bf0 13 D0713 00:07:59.504571 786755 usertrap_amd64.go:225] [ 922: 923] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:07:59.504595 786755 task_signals.go:470] [ 922: 922] Notified of signal 23 D0713 00:07:59.504747 786755 task_signals.go:220] [ 922: 922] Signal 23: delivering to handler D0713 00:07:59.515018 786755 task_signals.go:470] [ 922: 922] Notified of signal 23 D0713 00:07:59.515192 786755 task_signals.go:220] [ 922: 922] Signal 23: delivering to handler D0713 00:07:59.515581 786755 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.515642 786755 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001a43bf0 14 D0713 00:07:59.515668 786755 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:07:59.515763 786755 task_exit.go:204] [ 922: 922] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.515905 786755 task_exit.go:204] [ 922: 922] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.516014 786755 task_signals.go:204] [ 922: 926] Signal 922, PID: 926, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.516051 786755 task_exit.go:204] [ 922: 926] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.516065 786755 task_exit.go:204] [ 922: 926] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.516072 786755 task_exit.go:204] [ 922: 926] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.516013 786755 task_signals.go:204] [ 922: 923] Signal 922, PID: 923, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.516099 786755 task_exit.go:204] [ 922: 923] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.516107 786755 task_exit.go:204] [ 922: 923] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.516112 786755 task_exit.go:204] [ 922: 923] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.516032 786755 task_signals.go:204] [ 922: 924] Signal 922, PID: 924, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.516125 786755 task_exit.go:204] [ 922: 924] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.516132 786755 task_exit.go:204] [ 922: 924] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.516196 786755 task_exit.go:204] [ 922: 924] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.516045 786755 task_signals.go:204] [ 922: 925] Signal 922, PID: 925, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.516245 786755 task_exit.go:204] [ 922: 925] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.517804 786755 task_exit.go:204] [ 922: 925] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.517895 786755 task_exit.go:204] [ 922: 925] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.517934 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.517996 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:59.518082 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.518182 786755 task_exit.go:204] [ 922: 922] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.519239 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.521231 786755 syscalls.go:262] [ 927: 927] Allocating stack with size of 8388608 bytes D0713 00:07:59.521391 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.523049 786755 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.523089 786755 usertrap_amd64.go:106] [ 927: 927] Map a usertrap vma at 60000 D0713 00:07:59.523239 786755 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc001abbb30 1 D0713 00:07:59.523277 786755 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:07:59.523705 786755 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.523727 786755 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc001abbb30 2 D0713 00:07:59.523743 786755 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:07:59.524387 786755 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.524416 786755 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc001abbb30 3 D0713 00:07:59.524431 786755 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:07:59.532508 786755 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.532550 786755 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc001abbb30 4 D0713 00:07:59.532566 786755 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:07:59.533825 786755 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.533852 786755 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc001abbb30 5 D0713 00:07:59.533865 786755 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:07:59.533933 786755 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.533951 786755 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc001abbb30 6 D0713 00:07:59.533956 786755 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:07:59.534355 786755 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.534382 786755 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc001abbb30 7 D0713 00:07:59.534388 786755 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:07:59.534777 786755 usertrap_amd64.go:212] [ 927: 928] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.534810 786755 usertrap_amd64.go:122] [ 927: 928] Allocate a new trap: 0xc001abbb30 8 D0713 00:07:59.534828 786755 usertrap_amd64.go:225] [ 927: 928] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:07:59.535125 786755 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.535150 786755 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc001abbb30 9 D0713 00:07:59.535162 786755 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:07:59.535199 786755 usertrap_amd64.go:212] [ 927: 928] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.535216 786755 usertrap_amd64.go:122] [ 927: 928] Allocate a new trap: 0xc001abbb30 10 D0713 00:07:59.535224 786755 usertrap_amd64.go:225] [ 927: 928] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:07:59.535393 786755 usertrap_amd64.go:212] [ 927: 930] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:59.535417 786755 usertrap_amd64.go:122] [ 927: 930] Allocate a new trap: 0xc001abbb30 11 D0713 00:07:59.535428 786755 usertrap_amd64.go:225] [ 927: 930] Apply the binary patch addr 46b6e0 trap addr 60370 ([184 24 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:07:59.542835 786755 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.542868 786755 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc001abbb30 12 D0713 00:07:59.542885 786755 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46af29 trap addr 603c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:07:59.545631 786755 usertrap_amd64.go:212] [ 927: 928] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.545671 786755 usertrap_amd64.go:122] [ 927: 928] Allocate a new trap: 0xc001abbb30 13 D0713 00:07:59.545685 786755 usertrap_amd64.go:225] [ 927: 928] Apply the binary patch addr 46b020 trap addr 60410 ([184 39 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:07:59.545752 786755 usertrap_amd64.go:212] [ 927: 928] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.545779 786755 usertrap_amd64.go:122] [ 927: 928] Allocate a new trap: 0xc001abbb30 14 D0713 00:07:59.545793 786755 usertrap_amd64.go:225] [ 927: 928] Apply the binary patch addr 46b04f trap addr 60460 ([184 234 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:07:59.545837 786755 task_signals.go:470] [ 927: 927] Notified of signal 23 D0713 00:07:59.545908 786755 task_signals.go:220] [ 927: 927] Signal 23: delivering to handler D0713 00:07:59.553958 786755 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.553994 786755 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc001abbb30 15 D0713 00:07:59.554009 786755 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0713 00:07:59.554116 786755 task_exit.go:204] [ 927: 927] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.554167 786755 task_exit.go:204] [ 927: 927] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.554196 786755 task_signals.go:204] [ 927: 929] Signal 927, PID: 929, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.554210 786755 task_exit.go:204] [ 927: 929] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.554194 786755 task_signals.go:204] [ 927: 931] Signal 927, PID: 931, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.554216 786755 task_exit.go:204] [ 927: 929] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.554234 786755 task_exit.go:204] [ 927: 929] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.554273 786755 task_signals.go:204] [ 927: 928] Signal 927, PID: 928, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.554288 786755 task_exit.go:204] [ 927: 928] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.554299 786755 task_signals.go:204] [ 927: 930] Signal 927, PID: 930, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.554319 786755 task_exit.go:204] [ 927: 928] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.554328 786755 task_exit.go:204] [ 927: 928] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.554352 786755 task_exit.go:204] [ 927: 931] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.554361 786755 task_exit.go:204] [ 927: 931] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.554367 786755 task_exit.go:204] [ 927: 931] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.554377 786755 task_exit.go:204] [ 927: 930] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.555798 786755 task_exit.go:204] [ 927: 930] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.555829 786755 task_exit.go:204] [ 927: 930] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.555844 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.557339 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:59.557414 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.557594 786755 task_exit.go:204] [ 927: 927] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.558116 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.560080 786755 syscalls.go:262] [ 932: 932] Allocating stack with size of 8388608 bytes D0713 00:07:59.560195 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.561168 786755 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.561210 786755 usertrap_amd64.go:106] [ 932: 932] Map a usertrap vma at 67000 D0713 00:07:59.561330 786755 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0008b4120 1 D0713 00:07:59.561368 786755 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:07:59.561635 786755 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.561651 786755 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0008b4120 2 D0713 00:07:59.561658 786755 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:07:59.562251 786755 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.562275 786755 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0008b4120 3 D0713 00:07:59.562284 786755 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:07:59.569375 786755 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.569431 786755 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0008b4120 4 D0713 00:07:59.569446 786755 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:07:59.570618 786755 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.570658 786755 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0008b4120 5 D0713 00:07:59.570672 786755 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:07:59.570789 786755 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.570809 786755 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0008b4120 6 D0713 00:07:59.570817 786755 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:07:59.571249 786755 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.571273 786755 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0008b4120 7 D0713 00:07:59.571280 786755 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:07:59.571482 786755 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.571500 786755 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc0008b4120 8 D0713 00:07:59.571507 786755 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:07:59.571698 786755 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:59.571755 786755 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc0008b4120 9 D0713 00:07:59.571859 786755 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46b6e0 trap addr 672d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:07:59.572048 786755 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.572415 786755 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0008b4120 10 D0713 00:07:59.572550 786755 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:07:59.572772 786755 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.572799 786755 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc0008b4120 11 D0713 00:07:59.572810 786755 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46af76 trap addr 67370 ([184 35 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:07:59.581285 786755 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.581322 786755 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0008b4120 12 D0713 00:07:59.581333 786755 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46af29 trap addr 673c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:07:59.585165 786755 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.585207 786755 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc0008b4120 13 D0713 00:07:59.585227 786755 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46b020 trap addr 67410 ([184 39 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:07:59.585275 786755 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.585342 786755 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc0008b4120 14 D0713 00:07:59.585363 786755 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46b04f trap addr 67460 ([184 234 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:07:59.585492 786755 task_signals.go:470] [ 932: 932] Notified of signal 23 D0713 00:07:59.585586 786755 task_signals.go:220] [ 932: 932] Signal 23: delivering to handler D0713 00:07:59.593394 786755 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.593449 786755 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc0008b4120 15 D0713 00:07:59.593466 786755 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46ae44 trap addr 674b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 116 6 0]) D0713 00:07:59.593543 786755 task_exit.go:204] [ 932: 932] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.593577 786755 task_exit.go:204] [ 932: 932] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.593615 786755 task_signals.go:204] [ 932: 933] Signal 932, PID: 933, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.593645 786755 task_exit.go:204] [ 932: 933] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.593651 786755 task_exit.go:204] [ 932: 933] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.593654 786755 task_exit.go:204] [ 932: 933] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.593675 786755 task_signals.go:204] [ 932: 934] Signal 932, PID: 934, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.593683 786755 task_exit.go:204] [ 932: 934] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.593687 786755 task_exit.go:204] [ 932: 934] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.593690 786755 task_exit.go:204] [ 932: 934] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.593699 786755 task_signals.go:204] [ 932: 935] Signal 932, PID: 935, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.593707 786755 task_exit.go:204] [ 932: 935] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.593711 786755 task_exit.go:204] [ 932: 935] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.593715 786755 task_exit.go:204] [ 932: 935] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.593726 786755 task_signals.go:204] [ 932: 936] Signal 932, PID: 936, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.593733 786755 task_exit.go:204] [ 932: 936] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.595157 786755 task_exit.go:204] [ 932: 936] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.595208 786755 task_exit.go:204] [ 932: 936] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.595229 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.595271 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:59.595301 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.595392 786755 task_exit.go:204] [ 932: 932] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.596137 786755 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.598066 786755 syscalls.go:262] [ 937: 937] Allocating stack with size of 8388608 bytes D0713 00:07:59.598196 786755 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.599230 786755 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.599267 786755 usertrap_amd64.go:106] [ 937: 937] Map a usertrap vma at 68000 D0713 00:07:59.599377 786755 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001abbf50 1 D0713 00:07:59.599399 786755 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:07:59.599854 786755 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.599883 786755 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001abbf50 2 D0713 00:07:59.599895 786755 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:07:59.600724 786755 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.600748 786755 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001abbf50 3 D0713 00:07:59.600761 786755 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:07:59.607513 786755 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.607545 786755 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001abbf50 4 D0713 00:07:59.607558 786755 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:07:59.608690 786755 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.608713 786755 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001abbf50 5 D0713 00:07:59.608721 786755 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:07:59.608750 786755 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.608755 786755 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001abbf50 6 D0713 00:07:59.608761 786755 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:07:59.608910 786755 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.608925 786755 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001abbf50 7 D0713 00:07:59.608931 786755 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:07:59.609083 786755 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.609100 786755 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc001abbf50 8 D0713 00:07:59.609107 786755 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:07:59.609178 786755 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.609191 786755 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc001abbf50 9 D0713 00:07:59.609200 786755 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:07:59.609270 786755 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.609304 786755 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc001abbf50 10 D0713 00:07:59.609317 786755 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46b020 trap addr 68320 ([184 39 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:07:59.609388 786755 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.609437 786755 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc001abbf50 11 D0713 00:07:59.609448 786755 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46b04f trap addr 68370 ([184 234 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:07:59.609606 786755 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.609610 786755 task_signals.go:470] [ 937: 937] Notified of signal 23 D0713 00:07:59.609629 786755 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001abbf50 12 D0713 00:07:59.609640 786755 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b57c trap addr 683c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:07:59.609654 786755 task_signals.go:220] [ 937: 937] Signal 23: delivering to handler D0713 00:07:59.617410 786755 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.617435 786755 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001abbf50 13 D0713 00:07:59.617446 786755 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:07:59.621052 786755 task_signals.go:470] [ 937: 937] Notified of signal 23 D0713 00:07:59.621113 786755 task_signals.go:220] [ 937: 937] Signal 23: delivering to handler D0713 00:07:59.627383 786755 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.627411 786755 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc001abbf50 14 D0713 00:07:59.627444 786755 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:07:59.627505 786755 task_exit.go:204] [ 937: 937] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.627527 786755 task_exit.go:204] [ 937: 937] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.627563 786755 task_signals.go:204] [ 937: 941] Signal 937, PID: 941, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.627575 786755 task_signals.go:204] [ 937: 939] Signal 937, PID: 939, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.627588 786755 task_exit.go:204] [ 937: 941] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.627557 786755 task_signals.go:204] [ 937: 938] Signal 937, PID: 938, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.627597 786755 task_exit.go:204] [ 937: 941] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.627587 786755 task_signals.go:204] [ 937: 940] Signal 937, PID: 940, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.627604 786755 task_exit.go:204] [ 937: 941] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.627621 786755 task_signals.go:204] [ 937: 942] Signal 937, PID: 942, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.627658 786755 task_exit.go:204] [ 937: 942] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.627666 786755 task_exit.go:204] [ 937: 942] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.627672 786755 task_exit.go:204] [ 937: 942] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.627683 786755 task_exit.go:204] [ 937: 939] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.627691 786755 task_exit.go:204] [ 937: 939] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.627697 786755 task_exit.go:204] [ 937: 939] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.627706 786755 task_exit.go:204] [ 937: 938] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.627723 786755 task_exit.go:204] [ 937: 938] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.627730 786755 task_exit.go:204] [ 937: 938] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.627739 786755 task_exit.go:204] [ 937: 940] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.629068 786755 task_exit.go:204] [ 937: 940] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.629097 786755 task_exit.go:204] [ 937: 940] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.629111 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.629235 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.629314 786755 task_exit.go:204] [ 937: 937] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.630185 786755 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.631588 786755 syscalls.go:262] [ 943: 943] Allocating stack with size of 8388608 bytes D0713 00:07:59.631802 786755 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.632717 786755 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.632750 786755 usertrap_amd64.go:106] [ 943: 943] Map a usertrap vma at 66000 D0713 00:07:59.632827 786755 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc001281890 1 D0713 00:07:59.632853 786755 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:07:59.633169 786755 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.633191 786755 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc001281890 2 D0713 00:07:59.633201 786755 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:07:59.633737 786755 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.633758 786755 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc001281890 3 D0713 00:07:59.633767 786755 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:07:59.638669 786755 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.638698 786755 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc001281890 4 D0713 00:07:59.638711 786755 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:07:59.639873 786755 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.639899 786755 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc001281890 5 D0713 00:07:59.639911 786755 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:07:59.639974 786755 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.639992 786755 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc001281890 6 D0713 00:07:59.640001 786755 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:07:59.640361 786755 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.640427 786755 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc001281890 7 D0713 00:07:59.640446 786755 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:07:59.640681 786755 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.640705 786755 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc001281890 8 D0713 00:07:59.640722 786755 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:07:59.640904 786755 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.640927 786755 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc001281890 9 D0713 00:07:59.641085 786755 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:07:59.641222 786755 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.641285 786755 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc001281890 10 D0713 00:07:59.641335 786755 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:07:59.648188 786755 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.648211 786755 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc001281890 11 D0713 00:07:59.648220 786755 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:07:59.651798 786755 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.651848 786755 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc001281890 12 D0713 00:07:59.651864 786755 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:07:59.651920 786755 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.651938 786755 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc001281890 13 D0713 00:07:59.651958 786755 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:07:59.652016 786755 task_signals.go:470] [ 943: 943] Notified of signal 23 D0713 00:07:59.652092 786755 task_signals.go:220] [ 943: 943] Signal 23: delivering to handler I0713 00:07:59.659010 786755 compat.go:120] Unsupported syscall open_tree(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/open_tree for more information. D0713 00:07:59.659091 786755 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.659102 786755 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc001281890 14 D0713 00:07:59.659113 786755 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:07:59.659157 786755 task_exit.go:204] [ 943: 943] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.659194 786755 task_exit.go:204] [ 943: 943] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.659225 786755 task_signals.go:204] [ 943: 944] Signal 943, PID: 944, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.659240 786755 task_exit.go:204] [ 943: 944] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.659248 786755 task_exit.go:204] [ 943: 944] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.659254 786755 task_exit.go:204] [ 943: 944] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.659274 786755 task_signals.go:204] [ 943: 945] Signal 943, PID: 945, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.659309 786755 task_exit.go:204] [ 943: 945] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.659318 786755 task_exit.go:204] [ 943: 945] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.659324 786755 task_exit.go:204] [ 943: 945] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.659340 786755 task_signals.go:204] [ 943: 946] Signal 943, PID: 946, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.659351 786755 task_exit.go:204] [ 943: 946] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.659359 786755 task_exit.go:204] [ 943: 946] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.659364 786755 task_exit.go:204] [ 943: 946] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.659377 786755 task_signals.go:204] [ 943: 947] Signal 943, PID: 947, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.659387 786755 task_exit.go:204] [ 943: 947] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.660515 786755 task_exit.go:204] [ 943: 947] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.660544 786755 task_exit.go:204] [ 943: 947] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.660553 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.660684 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.661039 786755 task_exit.go:204] [ 943: 943] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.661641 786755 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.663333 786755 syscalls.go:262] [ 948: 948] Allocating stack with size of 8388608 bytes D0713 00:07:59.663464 786755 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.664245 786755 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.664272 786755 usertrap_amd64.go:106] [ 948: 948] Map a usertrap vma at 68000 D0713 00:07:59.664333 786755 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc0019e63f0 1 D0713 00:07:59.664353 786755 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:07:59.664535 786755 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.664559 786755 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc0019e63f0 2 D0713 00:07:59.664606 786755 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:07:59.665269 786755 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.665300 786755 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc0019e63f0 3 D0713 00:07:59.665313 786755 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:07:59.670967 786755 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.670994 786755 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc0019e63f0 4 D0713 00:07:59.671008 786755 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:07:59.671978 786755 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.672003 786755 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc0019e63f0 5 D0713 00:07:59.672014 786755 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:07:59.672085 786755 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.672102 786755 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc0019e63f0 6 D0713 00:07:59.672112 786755 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:07:59.672755 786755 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.672783 786755 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc0019e63f0 7 D0713 00:07:59.672795 786755 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:07:59.673017 786755 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.673042 786755 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc0019e63f0 8 D0713 00:07:59.673054 786755 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:07:59.673310 786755 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.673335 786755 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc0019e63f0 9 D0713 00:07:59.673348 786755 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:07:59.673388 786755 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.673423 786755 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc0019e63f0 10 D0713 00:07:59.673453 786755 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:07:59.673535 786755 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.673559 786755 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc0019e63f0 11 D0713 00:07:59.673575 786755 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:07:59.673666 786755 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.673689 786755 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc0019e63f0 12 D0713 00:07:59.673701 786755 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:07:59.673803 786755 task_signals.go:470] [ 948: 951] Notified of signal 23 D0713 00:07:59.674103 786755 task_signals.go:220] [ 948: 951] Signal 23: delivering to handler D0713 00:07:59.674652 786755 task_signals.go:470] [ 948: 948] Notified of signal 23 D0713 00:07:59.674701 786755 task_signals.go:220] [ 948: 948] Signal 23: delivering to handler D0713 00:07:59.681651 786755 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.681678 786755 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc0019e63f0 13 D0713 00:07:59.681687 786755 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:07:59.685318 786755 task_signals.go:470] [ 948: 948] Notified of signal 23 D0713 00:07:59.685413 786755 task_signals.go:220] [ 948: 948] Signal 23: delivering to handler D0713 00:07:59.693484 786755 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.693520 786755 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc0019e63f0 14 D0713 00:07:59.693535 786755 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:07:59.693599 786755 task_exit.go:204] [ 948: 948] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.693642 786755 task_exit.go:204] [ 948: 948] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.693647 786755 task_signals.go:204] [ 948: 949] Signal 948, PID: 949, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.693668 786755 task_signals.go:204] [ 948: 951] Signal 948, PID: 951, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.693679 786755 task_exit.go:204] [ 948: 949] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.693698 786755 task_exit.go:204] [ 948: 949] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.693706 786755 task_exit.go:204] [ 948: 949] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.693721 786755 task_signals.go:204] [ 948: 952] Signal 948, PID: 952, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.693743 786755 task_exit.go:204] [ 948: 952] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.693751 786755 task_exit.go:204] [ 948: 952] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.693789 786755 task_exit.go:204] [ 948: 952] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.693803 786755 task_signals.go:204] [ 948: 950] Signal 948, PID: 950, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.693814 786755 task_exit.go:204] [ 948: 950] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.693831 786755 task_exit.go:204] [ 948: 951] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.693859 786755 task_exit.go:204] [ 948: 951] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.693879 786755 task_exit.go:204] [ 948: 951] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.695370 786755 task_exit.go:204] [ 948: 950] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.695402 786755 task_exit.go:204] [ 948: 950] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.695415 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.695473 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.695548 786755 task_exit.go:204] [ 948: 948] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.697859 786755 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:07:59.697938 786755 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:07:59.705966 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.707299 786755 syscalls.go:262] [ 953: 953] Allocating stack with size of 8388608 bytes D0713 00:07:59.707425 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.708725 786755 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.708766 786755 usertrap_amd64.go:106] [ 953: 953] Map a usertrap vma at 65000 D0713 00:07:59.708844 786755 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0019e6a50 1 D0713 00:07:59.708872 786755 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:07:59.709222 786755 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.709241 786755 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0019e6a50 2 D0713 00:07:59.709248 786755 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:07:59.709991 786755 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.710018 786755 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0019e6a50 3 D0713 00:07:59.710031 786755 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:07:59.717231 786755 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.717262 786755 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0019e6a50 4 D0713 00:07:59.717276 786755 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:07:59.718528 786755 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.718559 786755 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0019e6a50 5 D0713 00:07:59.718572 786755 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:07:59.718670 786755 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.718679 786755 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0019e6a50 6 D0713 00:07:59.718687 786755 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:07:59.718843 786755 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.718848 786755 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0019e6a50 7 D0713 00:07:59.718853 786755 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:07:59.719029 786755 usertrap_amd64.go:212] [ 953: 954] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.719047 786755 usertrap_amd64.go:122] [ 953: 954] Allocate a new trap: 0xc0019e6a50 8 D0713 00:07:59.719056 786755 usertrap_amd64.go:225] [ 953: 954] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:07:59.719324 786755 usertrap_amd64.go:212] [ 953: 954] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.719343 786755 usertrap_amd64.go:122] [ 953: 954] Allocate a new trap: 0xc0019e6a50 9 D0713 00:07:59.719353 786755 usertrap_amd64.go:225] [ 953: 954] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:07:59.719470 786755 usertrap_amd64.go:212] [ 953: 954] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.719517 786755 usertrap_amd64.go:122] [ 953: 954] Allocate a new trap: 0xc0019e6a50 10 D0713 00:07:59.719537 786755 usertrap_amd64.go:225] [ 953: 954] Apply the binary patch addr 46b020 trap addr 65320 ([184 39 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:07:59.719651 786755 usertrap_amd64.go:212] [ 953: 954] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.719680 786755 usertrap_amd64.go:122] [ 953: 954] Allocate a new trap: 0xc0019e6a50 11 D0713 00:07:59.719693 786755 usertrap_amd64.go:225] [ 953: 954] Apply the binary patch addr 46b04f trap addr 65370 ([184 234 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:07:59.719894 786755 usertrap_amd64.go:212] [ 953: 955] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.719918 786755 usertrap_amd64.go:122] [ 953: 955] Allocate a new trap: 0xc0019e6a50 12 D0713 00:07:59.719917 786755 task_signals.go:470] [ 953: 953] Notified of signal 23 D0713 00:07:59.719930 786755 usertrap_amd64.go:225] [ 953: 955] Apply the binary patch addr 46b57c trap addr 653c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:07:59.720006 786755 task_signals.go:220] [ 953: 953] Signal 23: delivering to handler D0713 00:07:59.727559 786755 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.727585 786755 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0019e6a50 13 D0713 00:07:59.727598 786755 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:07:59.731680 786755 task_signals.go:470] [ 953: 953] Notified of signal 23 D0713 00:07:59.731737 786755 task_signals.go:220] [ 953: 953] Signal 23: delivering to handler I0713 00:07:59.740124 786755 compat.go:120] Unsupported syscall sys_437(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_437 for more information. D0713 00:07:59.740241 786755 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.740272 786755 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0019e6a50 14 D0713 00:07:59.740290 786755 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:07:59.740408 786755 task_exit.go:204] [ 953: 953] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.740456 786755 task_exit.go:204] [ 953: 953] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.740481 786755 task_signals.go:204] [ 953: 954] Signal 953, PID: 954, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.740505 786755 task_exit.go:204] [ 953: 954] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.740514 786755 task_exit.go:204] [ 953: 954] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.740520 786755 task_exit.go:204] [ 953: 954] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.740540 786755 task_signals.go:204] [ 953: 955] Signal 953, PID: 955, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.740570 786755 task_exit.go:204] [ 953: 955] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.740575 786755 task_exit.go:204] [ 953: 955] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.740578 786755 task_exit.go:204] [ 953: 955] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.740589 786755 task_signals.go:204] [ 953: 956] Signal 953, PID: 956, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.740596 786755 task_exit.go:204] [ 953: 956] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.740600 786755 task_exit.go:204] [ 953: 956] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.740603 786755 task_exit.go:204] [ 953: 956] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.740612 786755 task_signals.go:204] [ 953: 957] Signal 953, PID: 957, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.740618 786755 task_exit.go:204] [ 953: 957] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.740622 786755 task_exit.go:204] [ 953: 957] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.740625 786755 task_exit.go:204] [ 953: 957] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.740638 786755 task_signals.go:204] [ 953: 958] Signal 953, PID: 958, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.740653 786755 task_exit.go:204] [ 953: 958] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.740665 786755 task_exit.go:204] [ 953: 958] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.740678 786755 task_exit.go:204] [ 953: 958] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.740694 786755 task_signals.go:204] [ 953: 959] Signal 953, PID: 959, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.740705 786755 task_exit.go:204] [ 953: 959] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.742407 786755 task_exit.go:204] [ 953: 959] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.742443 786755 task_exit.go:204] [ 953: 959] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.742464 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.742530 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:59.742543 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.742704 786755 task_exit.go:204] [ 953: 953] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.743603 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.745315 786755 syscalls.go:262] [ 960: 960] Allocating stack with size of 8388608 bytes D0713 00:07:59.745524 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.748428 786755 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.748488 786755 usertrap_amd64.go:106] [ 960: 960] Map a usertrap vma at 60000 D0713 00:07:59.748607 786755 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc001281bc0 1 D0713 00:07:59.748640 786755 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:07:59.749127 786755 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.749204 786755 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc001281bc0 2 D0713 00:07:59.749236 786755 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:07:59.749853 786755 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.749875 786755 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc001281bc0 3 D0713 00:07:59.749889 786755 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:07:59.756184 786755 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.756295 786755 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc001281bc0 4 D0713 00:07:59.756402 786755 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:07:59.757499 786755 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.757530 786755 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc001281bc0 5 D0713 00:07:59.757542 786755 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:07:59.757692 786755 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.757714 786755 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc001281bc0 6 D0713 00:07:59.757721 786755 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:07:59.757927 786755 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.757944 786755 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc001281bc0 7 D0713 00:07:59.757949 786755 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:07:59.758091 786755 usertrap_amd64.go:212] [ 960: 961] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.758111 786755 usertrap_amd64.go:122] [ 960: 961] Allocate a new trap: 0xc001281bc0 8 D0713 00:07:59.758120 786755 usertrap_amd64.go:225] [ 960: 961] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:07:59.758230 786755 usertrap_amd64.go:212] [ 960: 961] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.758248 786755 usertrap_amd64.go:122] [ 960: 961] Allocate a new trap: 0xc001281bc0 9 D0713 00:07:59.758254 786755 usertrap_amd64.go:225] [ 960: 961] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:07:59.758437 786755 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:59.758465 786755 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc001281bc0 10 D0713 00:07:59.758477 786755 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b6e0 trap addr 60320 ([184 24 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:07:59.758505 786755 usertrap_amd64.go:212] [ 960: 963] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.758515 786755 usertrap_amd64.go:122] [ 960: 963] Allocate a new trap: 0xc001281bc0 11 D0713 00:07:59.758525 786755 usertrap_amd64.go:225] [ 960: 963] Apply the binary patch addr 46b57c trap addr 60370 ([184 202 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:07:59.765640 786755 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.765664 786755 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc001281bc0 12 D0713 00:07:59.765675 786755 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46af29 trap addr 603c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:07:59.769057 786755 usertrap_amd64.go:212] [ 960: 961] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.769091 786755 usertrap_amd64.go:122] [ 960: 961] Allocate a new trap: 0xc001281bc0 13 D0713 00:07:59.769104 786755 usertrap_amd64.go:225] [ 960: 961] Apply the binary patch addr 46b020 trap addr 60410 ([184 39 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:07:59.769172 786755 usertrap_amd64.go:212] [ 960: 961] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.769226 786755 usertrap_amd64.go:122] [ 960: 961] Allocate a new trap: 0xc001281bc0 14 D0713 00:07:59.769243 786755 usertrap_amd64.go:225] [ 960: 961] Apply the binary patch addr 46b04f trap addr 60460 ([184 234 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:07:59.769303 786755 task_signals.go:470] [ 960: 960] Notified of signal 23 D0713 00:07:59.769383 786755 task_signals.go:220] [ 960: 960] Signal 23: delivering to handler I0713 00:07:59.776764 786755 compat.go:120] Unsupported syscall perf_event_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/perf_event_open for more information. D0713 00:07:59.776853 786755 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.776864 786755 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc001281bc0 15 D0713 00:07:59.776876 786755 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0713 00:07:59.777196 786755 task_exit.go:204] [ 960: 960] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.777240 786755 task_signals.go:204] [ 960: 962] Signal 960, PID: 962, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.777239 786755 task_signals.go:204] [ 960: 961] Signal 960, PID: 961, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.777259 786755 task_exit.go:204] [ 960: 960] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.777284 786755 task_signals.go:204] [ 960: 964] Signal 960, PID: 964, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.777345 786755 task_exit.go:204] [ 960: 962] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.777375 786755 task_signals.go:204] [ 960: 963] Signal 960, PID: 963, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.777383 786755 task_exit.go:204] [ 960: 962] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.777400 786755 task_exit.go:204] [ 960: 962] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.777476 786755 task_exit.go:204] [ 960: 961] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.777494 786755 task_exit.go:204] [ 960: 961] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.777502 786755 task_exit.go:204] [ 960: 961] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.777515 786755 task_exit.go:204] [ 960: 964] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.777562 786755 task_exit.go:204] [ 960: 964] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.777569 786755 task_exit.go:204] [ 960: 964] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.777580 786755 task_exit.go:204] [ 960: 963] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.779113 786755 task_exit.go:204] [ 960: 963] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.779174 786755 task_exit.go:204] [ 960: 963] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.779196 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.779246 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:59.779273 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.779445 786755 task_exit.go:204] [ 960: 960] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.780109 786755 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.781855 786755 syscalls.go:262] [ 965: 965] Allocating stack with size of 8388608 bytes D0713 00:07:59.782046 786755 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.783409 786755 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.783445 786755 usertrap_amd64.go:106] [ 965: 965] Map a usertrap vma at 63000 D0713 00:07:59.783548 786755 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc001642cc0 1 D0713 00:07:59.783612 786755 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:07:59.784198 786755 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.784290 786755 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc001642cc0 2 D0713 00:07:59.784317 786755 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:07:59.785449 786755 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.785482 786755 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc001642cc0 3 D0713 00:07:59.785512 786755 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:07:59.793589 786755 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.793630 786755 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc001642cc0 4 D0713 00:07:59.793645 786755 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:07:59.794765 786755 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.794793 786755 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc001642cc0 5 D0713 00:07:59.794805 786755 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:07:59.794847 786755 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.794855 786755 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc001642cc0 6 D0713 00:07:59.794862 786755 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:07:59.795125 786755 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.795150 786755 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc001642cc0 7 D0713 00:07:59.795159 786755 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:07:59.795358 786755 usertrap_amd64.go:212] [ 965: 966] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.795385 786755 usertrap_amd64.go:122] [ 965: 966] Allocate a new trap: 0xc001642cc0 8 D0713 00:07:59.795394 786755 usertrap_amd64.go:225] [ 965: 966] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:07:59.795640 786755 usertrap_amd64.go:212] [ 965: 966] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.795662 786755 usertrap_amd64.go:122] [ 965: 966] Allocate a new trap: 0xc001642cc0 9 D0713 00:07:59.795671 786755 usertrap_amd64.go:225] [ 965: 966] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:07:59.795681 786755 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.795685 786755 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc001642cc0 10 D0713 00:07:59.795691 786755 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:07:59.795845 786755 usertrap_amd64.go:212] [ 965: 968] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:59.795891 786755 usertrap_amd64.go:122] [ 965: 968] Allocate a new trap: 0xc001642cc0 11 D0713 00:07:59.795910 786755 usertrap_amd64.go:225] [ 965: 968] Apply the binary patch addr 46b6e0 trap addr 63370 ([184 24 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:07:59.796435 786755 usertrap_amd64.go:212] [ 965: 966] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.796460 786755 usertrap_amd64.go:122] [ 965: 966] Allocate a new trap: 0xc001642cc0 12 D0713 00:07:59.796472 786755 usertrap_amd64.go:225] [ 965: 966] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:07:59.796520 786755 usertrap_amd64.go:212] [ 965: 966] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.796535 786755 usertrap_amd64.go:122] [ 965: 966] Allocate a new trap: 0xc001642cc0 13 D0713 00:07:59.796550 786755 usertrap_amd64.go:225] [ 965: 966] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:07:59.796569 786755 task_signals.go:470] [ 965: 965] Notified of signal 23 D0713 00:07:59.796683 786755 task_signals.go:220] [ 965: 965] Signal 23: delivering to handler D0713 00:07:59.804244 786755 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.804277 786755 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc001642cc0 14 D0713 00:07:59.804290 786755 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46af29 trap addr 63460 ([184 37 1 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:07:59.807685 786755 task_signals.go:470] [ 965: 965] Notified of signal 23 D0713 00:07:59.809030 786755 task_signals.go:220] [ 965: 965] Signal 23: delivering to handler I0713 00:07:59.818278 786755 compat.go:120] Unsupported syscall personality(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/personality for more information. D0713 00:07:59.818494 786755 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.818526 786755 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc001642cc0 15 D0713 00:07:59.818544 786755 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0713 00:07:59.818658 786755 task_exit.go:204] [ 965: 965] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.818698 786755 task_exit.go:204] [ 965: 965] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.818757 786755 task_signals.go:204] [ 965: 968] Signal 965, PID: 968, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.818802 786755 task_exit.go:204] [ 965: 968] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.818824 786755 task_exit.go:204] [ 965: 968] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.818839 786755 task_exit.go:204] [ 965: 968] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.818904 786755 task_signals.go:204] [ 965: 967] Signal 965, PID: 967, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.818778 786755 task_signals.go:204] [ 965: 969] Signal 965, PID: 969, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.818932 786755 task_exit.go:204] [ 965: 967] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.818978 786755 task_exit.go:204] [ 965: 967] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.819000 786755 task_exit.go:204] [ 965: 967] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.818900 786755 task_signals.go:204] [ 965: 966] Signal 965, PID: 966, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.819024 786755 task_exit.go:204] [ 965: 969] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.819047 786755 task_exit.go:204] [ 965: 969] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.819065 786755 task_exit.go:204] [ 965: 969] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.819077 786755 task_exit.go:204] [ 965: 966] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.820751 786755 task_exit.go:204] [ 965: 966] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.820852 786755 task_exit.go:204] [ 965: 966] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.820930 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.821098 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.821177 786755 task_exit.go:204] [ 965: 965] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.821902 786755 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.823785 786755 syscalls.go:262] [ 970: 970] Allocating stack with size of 8388608 bytes D0713 00:07:59.823924 786755 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.824703 786755 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.824742 786755 usertrap_amd64.go:106] [ 970: 970] Map a usertrap vma at 60000 D0713 00:07:59.824885 786755 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc001281c20 1 D0713 00:07:59.824929 786755 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:07:59.826156 786755 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.826186 786755 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc001281c20 2 D0713 00:07:59.826199 786755 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:07:59.826869 786755 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.826899 786755 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc001281c20 3 D0713 00:07:59.826915 786755 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:07:59.836599 786755 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.836667 786755 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc001281c20 4 D0713 00:07:59.836690 786755 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:07:59.838050 786755 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.838141 786755 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc001281c20 5 D0713 00:07:59.838198 786755 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:07:59.838400 786755 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.838428 786755 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc001281c20 6 D0713 00:07:59.838443 786755 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:07:59.840075 786755 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.840100 786755 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc001281c20 7 D0713 00:07:59.840112 786755 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:07:59.840389 786755 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.840411 786755 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc001281c20 8 D0713 00:07:59.840421 786755 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:07:59.840591 786755 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.840622 786755 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc001281c20 9 D0713 00:07:59.840634 786755 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:07:59.840815 786755 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.840915 786755 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc001281c20 10 D0713 00:07:59.841022 786755 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:07:59.841586 786755 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.841609 786755 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc001281c20 11 D0713 00:07:59.841621 786755 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:07:59.841697 786755 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.841716 786755 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc001281c20 12 D0713 00:07:59.841727 786755 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:07:59.841766 786755 task_signals.go:470] [ 970: 970] Notified of signal 23 D0713 00:07:59.841832 786755 task_signals.go:220] [ 970: 970] Signal 23: delivering to handler D0713 00:07:59.851228 786755 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.851270 786755 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc001281c20 13 D0713 00:07:59.851288 786755 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:07:59.857594 786755 task_signals.go:470] [ 970: 970] Notified of signal 23 D0713 00:07:59.857762 786755 task_signals.go:220] [ 970: 970] Signal 23: delivering to handler I0713 00:07:59.868399 786755 compat.go:120] Unsupported syscall sys_438(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_438 for more information. D0713 00:07:59.868714 786755 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.868763 786755 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc001281c20 14 D0713 00:07:59.868783 786755 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:07:59.868803 786755 task_signals.go:470] [ 970: 970] Notified of signal 23 D0713 00:07:59.868993 786755 task_exit.go:204] [ 970: 970] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.869046 786755 task_exit.go:204] [ 970: 970] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.869060 786755 task_signals.go:204] [ 970: 974] Signal 970, PID: 974, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.869083 786755 task_exit.go:204] [ 970: 974] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.869093 786755 task_exit.go:204] [ 970: 974] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.869100 786755 task_exit.go:204] [ 970: 974] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.869123 786755 task_signals.go:204] [ 970: 971] Signal 970, PID: 971, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.869136 786755 task_exit.go:204] [ 970: 971] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.869144 786755 task_exit.go:204] [ 970: 971] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.869150 786755 task_exit.go:204] [ 970: 971] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.869163 786755 task_signals.go:204] [ 970: 972] Signal 970, PID: 972, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.869176 786755 task_exit.go:204] [ 970: 972] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.869184 786755 task_exit.go:204] [ 970: 972] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.869190 786755 task_exit.go:204] [ 970: 972] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.869205 786755 task_signals.go:204] [ 970: 973] Signal 970, PID: 973, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.869299 786755 task_exit.go:204] [ 970: 973] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.871064 786755 task_exit.go:204] [ 970: 973] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.871103 786755 task_exit.go:204] [ 970: 973] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.871117 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.871176 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.871262 786755 task_exit.go:204] [ 970: 970] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.871474 786755 task_signals.go:470] [ 6: 9] Notified of signal 23 D0713 00:07:59.871504 786755 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:07:59.872155 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.873721 786755 syscalls.go:262] [ 975: 975] Allocating stack with size of 8388608 bytes D0713 00:07:59.873827 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.875239 786755 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.875270 786755 usertrap_amd64.go:106] [ 975: 975] Map a usertrap vma at 68000 D0713 00:07:59.875354 786755 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc0008b4ed0 1 D0713 00:07:59.875382 786755 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:07:59.876725 786755 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.876758 786755 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc0008b4ed0 2 D0713 00:07:59.876773 786755 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:07:59.877766 786755 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.877851 786755 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc0008b4ed0 3 D0713 00:07:59.877889 786755 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:07:59.885099 786755 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.885152 786755 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc0008b4ed0 4 D0713 00:07:59.885169 786755 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:07:59.886604 786755 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.886640 786755 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc0008b4ed0 5 D0713 00:07:59.886665 786755 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:07:59.889353 786755 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.889390 786755 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc0008b4ed0 6 D0713 00:07:59.889405 786755 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:07:59.890393 786755 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.890452 786755 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc0008b4ed0 7 D0713 00:07:59.890473 786755 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:07:59.890756 786755 usertrap_amd64.go:212] [ 975: 976] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.890795 786755 usertrap_amd64.go:122] [ 975: 976] Allocate a new trap: 0xc0008b4ed0 8 D0713 00:07:59.890819 786755 usertrap_amd64.go:225] [ 975: 976] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:07:59.891248 786755 usertrap_amd64.go:212] [ 975: 976] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:59.891302 786755 usertrap_amd64.go:122] [ 975: 976] Allocate a new trap: 0xc0008b4ed0 9 D0713 00:07:59.891324 786755 usertrap_amd64.go:225] [ 975: 976] Apply the binary patch addr 46b6e0 trap addr 682d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:07:59.891448 786755 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.891479 786755 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc0008b4ed0 10 D0713 00:07:59.891490 786755 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:07:59.891744 786755 usertrap_amd64.go:212] [ 975: 976] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.891777 786755 usertrap_amd64.go:122] [ 975: 976] Allocate a new trap: 0xc0008b4ed0 11 D0713 00:07:59.891790 786755 usertrap_amd64.go:225] [ 975: 976] Apply the binary patch addr 46af76 trap addr 68370 ([184 35 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:07:59.900916 786755 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.900992 786755 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc0008b4ed0 12 D0713 00:07:59.901016 786755 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46af29 trap addr 683c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:07:59.903955 786755 usertrap_amd64.go:212] [ 975: 976] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.904014 786755 usertrap_amd64.go:122] [ 975: 976] Allocate a new trap: 0xc0008b4ed0 13 D0713 00:07:59.904033 786755 usertrap_amd64.go:225] [ 975: 976] Apply the binary patch addr 46b020 trap addr 68410 ([184 39 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:07:59.904201 786755 usertrap_amd64.go:212] [ 975: 976] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.904239 786755 usertrap_amd64.go:122] [ 975: 976] Allocate a new trap: 0xc0008b4ed0 14 D0713 00:07:59.904251 786755 usertrap_amd64.go:225] [ 975: 976] Apply the binary patch addr 46b04f trap addr 68460 ([184 234 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:07:59.904307 786755 task_signals.go:470] [ 975: 975] Notified of signal 23 D0713 00:07:59.904392 786755 task_signals.go:220] [ 975: 975] Signal 23: delivering to handler I0713 00:07:59.916097 786755 compat.go:120] Unsupported syscall pidfd_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_open for more information. D0713 00:07:59.916225 786755 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.916243 786755 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc0008b4ed0 15 D0713 00:07:59.916259 786755 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0713 00:07:59.916322 786755 task_exit.go:204] [ 975: 975] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.916351 786755 task_exit.go:204] [ 975: 975] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.916389 786755 task_signals.go:204] [ 975: 978] Signal 975, PID: 978, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.916410 786755 task_exit.go:204] [ 975: 978] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.916373 786755 task_signals.go:204] [ 975: 977] Signal 975, PID: 977, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.916419 786755 task_exit.go:204] [ 975: 978] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.916447 786755 task_exit.go:204] [ 975: 978] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.916412 786755 task_signals.go:204] [ 975: 979] Signal 975, PID: 979, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.916496 786755 task_exit.go:204] [ 975: 979] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.916532 786755 task_signals.go:204] [ 975: 976] Signal 975, PID: 976, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.916548 786755 task_exit.go:204] [ 975: 977] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.916572 786755 task_exit.go:204] [ 975: 976] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.916704 786755 task_exit.go:204] [ 975: 979] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.916737 786755 task_exit.go:204] [ 975: 979] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.916777 786755 task_exit.go:204] [ 975: 977] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.916795 786755 task_exit.go:204] [ 975: 977] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.918414 786755 task_exit.go:204] [ 975: 976] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.918434 786755 task_exit.go:204] [ 975: 976] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.918449 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.918860 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:59.918897 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.919032 786755 task_exit.go:204] [ 975: 975] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.920049 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.921614 786755 syscalls.go:262] [ 980: 980] Allocating stack with size of 8388608 bytes D0713 00:07:59.921740 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.922972 786755 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.923009 786755 usertrap_amd64.go:106] [ 980: 980] Map a usertrap vma at 68000 D0713 00:07:59.923106 786755 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc000bda120 1 D0713 00:07:59.923144 786755 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:07:59.925203 786755 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.925238 786755 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc000bda120 2 D0713 00:07:59.925251 786755 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:07:59.926555 786755 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.926594 786755 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc000bda120 3 D0713 00:07:59.926609 786755 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:07:59.934924 786755 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.935020 786755 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc000bda120 4 D0713 00:07:59.935044 786755 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:07:59.936376 786755 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.936409 786755 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc000bda120 5 D0713 00:07:59.936421 786755 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:07:59.936498 786755 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.936512 786755 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc000bda120 6 D0713 00:07:59.936522 786755 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:07:59.937115 786755 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.937193 786755 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc000bda120 7 D0713 00:07:59.937215 786755 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:07:59.937429 786755 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.937454 786755 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc000bda120 8 D0713 00:07:59.937465 786755 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:07:59.937637 786755 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.937655 786755 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc000bda120 9 D0713 00:07:59.937661 786755 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:07:59.937723 786755 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.937735 786755 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc000bda120 10 D0713 00:07:59.937740 786755 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:07:59.938323 786755 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.938351 786755 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc000bda120 11 D0713 00:07:59.938364 786755 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:07:59.938429 786755 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.938445 786755 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc000bda120 12 D0713 00:07:59.938463 786755 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:07:59.938486 786755 task_signals.go:470] [ 980: 980] Notified of signal 23 D0713 00:07:59.938960 786755 task_signals.go:220] [ 980: 980] Signal 23: delivering to handler D0713 00:07:59.946922 786755 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.946952 786755 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc000bda120 13 D0713 00:07:59.946979 786755 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:07:59.949701 786755 task_signals.go:470] [ 980: 980] Notified of signal 23 D0713 00:07:59.949814 786755 task_signals.go:220] [ 980: 980] Signal 23: delivering to handler D0713 00:07:59.949920 786755 task_signals.go:470] [ 980: 980] Notified of signal 23 D0713 00:07:59.949984 786755 task_signals.go:220] [ 980: 980] Signal 23: delivering to handler I0713 00:07:59.958843 786755 compat.go:120] Unsupported syscall pidfd_send_signal(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_send_signal for more information. D0713 00:07:59.958937 786755 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46ae44:sysno 231 D0713 00:07:59.958952 786755 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc000bda120 14 D0713 00:07:59.958968 786755 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:07:59.959018 786755 task_exit.go:204] [ 980: 980] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.959059 786755 task_exit.go:204] [ 980: 980] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.959088 786755 task_signals.go:204] [ 980: 981] Signal 980, PID: 981, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.959115 786755 task_exit.go:204] [ 980: 981] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.959124 786755 task_exit.go:204] [ 980: 981] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.959130 786755 task_exit.go:204] [ 980: 981] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.959153 786755 task_signals.go:204] [ 980: 982] Signal 980, PID: 982, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.959165 786755 task_exit.go:204] [ 980: 982] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.959174 786755 task_exit.go:204] [ 980: 982] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.959181 786755 task_exit.go:204] [ 980: 982] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.959198 786755 task_signals.go:204] [ 980: 983] Signal 980, PID: 983, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.959210 786755 task_exit.go:204] [ 980: 983] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.959228 786755 task_exit.go:204] [ 980: 983] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.959233 786755 task_exit.go:204] [ 980: 983] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.959246 786755 task_signals.go:204] [ 980: 984] Signal 980, PID: 984, TID: 0, fault addr: 0x9: terminating thread group D0713 00:07:59.959263 786755 task_exit.go:204] [ 980: 984] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:07:59.960882 786755 task_exit.go:204] [ 980: 984] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:07:59.961050 786755 task_exit.go:204] [ 980: 984] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.961087 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:07:59.961142 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:07:59.961155 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:07:59.961436 786755 task_exit.go:204] [ 980: 980] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:07:59.962079 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.963622 786755 syscalls.go:262] [ 985: 985] Allocating stack with size of 8388608 bytes D0713 00:07:59.963729 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:07:59.965104 786755 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b70f:sysno 204 D0713 00:07:59.965150 786755 usertrap_amd64.go:106] [ 985: 985] Map a usertrap vma at 69000 D0713 00:07:59.965267 786755 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0019e7710 1 D0713 00:07:59.965385 786755 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:07:59.966031 786755 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46ae93:sysno 257 D0713 00:07:59.966057 786755 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0019e7710 2 D0713 00:07:59.966071 786755 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:07:59.968573 786755 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b41d:sysno 9 D0713 00:07:59.968600 786755 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0019e7710 3 D0713 00:07:59.968617 786755 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:07:59.978321 786755 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b1d3:sysno 14 D0713 00:07:59.978373 786755 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0019e7710 4 D0713 00:07:59.978391 786755 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:07:59.980234 786755 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46afa0:sysno 186 D0713 00:07:59.980264 786755 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0019e7710 5 D0713 00:07:59.980279 786755 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:07:59.980416 786755 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b214:sysno 13 D0713 00:07:59.980471 786755 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0019e7710 6 D0713 00:07:59.980505 786755 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:07:59.981062 786755 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b5eb:sysno 56 D0713 00:07:59.981100 786755 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0019e7710 7 D0713 00:07:59.981113 786755 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:07:59.981333 786755 usertrap_amd64.go:212] [ 985: 986] Found the pattern at ip 46b60c:sysno 186 D0713 00:07:59.981352 786755 usertrap_amd64.go:122] [ 985: 986] Allocate a new trap: 0xc0019e7710 8 D0713 00:07:59.981360 786755 usertrap_amd64.go:225] [ 985: 986] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:07:59.981799 786755 usertrap_amd64.go:212] [ 985: 986] Found the pattern at ip 46af76:sysno 35 D0713 00:07:59.981830 786755 usertrap_amd64.go:122] [ 985: 986] Allocate a new trap: 0xc0019e7710 9 D0713 00:07:59.981839 786755 usertrap_amd64.go:225] [ 985: 986] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:07:59.982046 786755 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b6e0:sysno 24 D0713 00:07:59.982130 786755 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0019e7710 10 D0713 00:07:59.982177 786755 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b6e0 trap addr 69320 ([184 24 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:07:59.982208 786755 usertrap_amd64.go:212] [ 985: 987] Found the pattern at ip 46b57c:sysno 202 D0713 00:07:59.982228 786755 usertrap_amd64.go:122] [ 985: 987] Allocate a new trap: 0xc0019e7710 11 D0713 00:07:59.982238 786755 usertrap_amd64.go:225] [ 985: 987] Apply the binary patch addr 46b57c trap addr 69370 ([184 202 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:07:59.990777 786755 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46af29:sysno 293 D0713 00:07:59.990809 786755 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0019e7710 12 D0713 00:07:59.990833 786755 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46af29 trap addr 693c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:07:59.993457 786755 usertrap_amd64.go:212] [ 985: 986] Found the pattern at ip 46b020:sysno 39 D0713 00:07:59.993496 786755 usertrap_amd64.go:122] [ 985: 986] Allocate a new trap: 0xc0019e7710 13 D0713 00:07:59.993511 786755 usertrap_amd64.go:225] [ 985: 986] Apply the binary patch addr 46b020 trap addr 69410 ([184 39 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:07:59.993569 786755 usertrap_amd64.go:212] [ 985: 986] Found the pattern at ip 46b04f:sysno 234 D0713 00:07:59.993579 786755 usertrap_amd64.go:122] [ 985: 986] Allocate a new trap: 0xc0019e7710 14 D0713 00:07:59.993589 786755 usertrap_amd64.go:225] [ 985: 986] Apply the binary patch addr 46b04f trap addr 69460 ([184 234 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:07:59.993611 786755 task_signals.go:470] [ 985: 985] Notified of signal 23 D0713 00:07:59.993686 786755 task_signals.go:220] [ 985: 985] Signal 23: delivering to handler D0713 00:08:00.002515 786755 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.002562 786755 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0019e7710 15 D0713 00:08:00.002578 786755 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0713 00:08:00.002732 786755 task_exit.go:204] [ 985: 985] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.002775 786755 task_exit.go:204] [ 985: 985] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.002779 786755 task_signals.go:204] [ 985: 987] Signal 985, PID: 987, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.002811 786755 task_exit.go:204] [ 985: 987] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.002803 786755 task_signals.go:204] [ 985: 986] Signal 985, PID: 986, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.002835 786755 task_exit.go:204] [ 985: 987] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.002836 786755 task_signals.go:204] [ 985: 988] Signal 985, PID: 988, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.002843 786755 task_exit.go:204] [ 985: 987] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.002841 786755 task_signals.go:204] [ 985: 989] Signal 985, PID: 989, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.002861 786755 task_exit.go:204] [ 985: 986] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.002872 786755 task_exit.go:204] [ 985: 989] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.002883 786755 task_exit.go:204] [ 985: 989] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.002888 786755 task_exit.go:204] [ 985: 989] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.002897 786755 task_exit.go:204] [ 985: 988] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.002952 786755 task_exit.go:204] [ 985: 986] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.003000 786755 task_exit.go:204] [ 985: 986] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.004569 786755 task_exit.go:204] [ 985: 988] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.004606 786755 task_exit.go:204] [ 985: 988] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.004629 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.004663 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:08:00.004673 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.004873 786755 task_exit.go:204] [ 985: 985] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.005900 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.007533 786755 syscalls.go:262] [ 990: 990] Allocating stack with size of 8388608 bytes D0713 00:08:00.007656 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.009322 786755 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.009420 786755 usertrap_amd64.go:106] [ 990: 990] Map a usertrap vma at 64000 D0713 00:08:00.009559 786755 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc000bda600 1 D0713 00:08:00.009610 786755 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:08:00.010032 786755 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.010064 786755 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc000bda600 2 D0713 00:08:00.010078 786755 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:08:00.011392 786755 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.011427 786755 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc000bda600 3 D0713 00:08:00.011441 786755 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:08:00.021104 786755 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.021168 786755 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc000bda600 4 D0713 00:08:00.021208 786755 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:08:00.022670 786755 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.022701 786755 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc000bda600 5 D0713 00:08:00.022717 786755 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:08:00.022986 786755 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.023022 786755 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc000bda600 6 D0713 00:08:00.023035 786755 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:08:00.023583 786755 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.023608 786755 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc000bda600 7 D0713 00:08:00.023619 786755 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:08:00.023830 786755 usertrap_amd64.go:212] [ 990: 991] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.023854 786755 usertrap_amd64.go:122] [ 990: 991] Allocate a new trap: 0xc000bda600 8 D0713 00:08:00.023863 786755 usertrap_amd64.go:225] [ 990: 991] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:08:00.024117 786755 usertrap_amd64.go:212] [ 990: 991] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.024166 786755 usertrap_amd64.go:122] [ 990: 991] Allocate a new trap: 0xc000bda600 9 D0713 00:08:00.024182 786755 usertrap_amd64.go:225] [ 990: 991] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:08:00.024344 786755 usertrap_amd64.go:212] [ 990: 993] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.024368 786755 usertrap_amd64.go:122] [ 990: 993] Allocate a new trap: 0xc000bda600 10 D0713 00:08:00.024381 786755 usertrap_amd64.go:225] [ 990: 993] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:08:00.032349 786755 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.032399 786755 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc000bda600 11 D0713 00:08:00.032420 786755 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:08:00.035299 786755 usertrap_amd64.go:212] [ 990: 991] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.035328 786755 usertrap_amd64.go:122] [ 990: 991] Allocate a new trap: 0xc000bda600 12 D0713 00:08:00.035345 786755 usertrap_amd64.go:225] [ 990: 991] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:08:00.035406 786755 usertrap_amd64.go:212] [ 990: 991] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.035416 786755 usertrap_amd64.go:122] [ 990: 991] Allocate a new trap: 0xc000bda600 13 D0713 00:08:00.035427 786755 usertrap_amd64.go:225] [ 990: 991] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:08:00.035553 786755 task_signals.go:470] [ 990: 990] Notified of signal 23 D0713 00:08:00.035637 786755 task_signals.go:220] [ 990: 990] Signal 23: delivering to handler D0713 00:08:00.044927 786755 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.045050 786755 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc000bda600 14 D0713 00:08:00.045067 786755 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:08:00.045133 786755 task_exit.go:204] [ 990: 990] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.045167 786755 task_exit.go:204] [ 990: 990] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.045192 786755 task_signals.go:204] [ 990: 991] Signal 990, PID: 991, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.045190 786755 task_signals.go:204] [ 990: 994] Signal 990, PID: 994, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.045209 786755 task_exit.go:204] [ 990: 991] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.045203 786755 task_signals.go:204] [ 990: 992] Signal 990, PID: 992, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.045218 786755 task_exit.go:204] [ 990: 994] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.045242 786755 task_exit.go:204] [ 990: 994] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.045248 786755 task_exit.go:204] [ 990: 994] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.045298 786755 task_signals.go:204] [ 990: 993] Signal 990, PID: 993, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.045314 786755 task_exit.go:204] [ 990: 991] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.045321 786755 task_exit.go:204] [ 990: 991] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.045347 786755 task_exit.go:204] [ 990: 992] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.045353 786755 task_exit.go:204] [ 990: 992] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.045357 786755 task_exit.go:204] [ 990: 992] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.045364 786755 task_exit.go:204] [ 990: 993] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.046920 786755 task_exit.go:204] [ 990: 993] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.046950 786755 task_exit.go:204] [ 990: 993] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.046965 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.046992 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.047014 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.047250 786755 task_exit.go:204] [ 990: 990] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.047338 786755 task_signals.go:470] [ 6: 23] Notified of signal 23 D0713 00:08:00.047466 786755 task_signals.go:220] [ 6: 23] Signal 23: delivering to handler D0713 00:08:00.048298 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.050227 786755 syscalls.go:262] [ 995: 995] Allocating stack with size of 8388608 bytes D0713 00:08:00.050381 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.053021 786755 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.053077 786755 usertrap_amd64.go:106] [ 995: 995] Map a usertrap vma at 69000 D0713 00:08:00.053219 786755 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0003c1d70 1 D0713 00:08:00.053261 786755 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:08:00.053778 786755 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.053809 786755 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0003c1d70 2 D0713 00:08:00.053823 786755 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:08:00.054461 786755 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.054496 786755 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0003c1d70 3 D0713 00:08:00.054510 786755 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:08:00.062794 786755 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.062923 786755 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0003c1d70 4 D0713 00:08:00.063009 786755 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:08:00.064085 786755 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.064172 786755 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0003c1d70 5 D0713 00:08:00.064230 786755 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:08:00.064403 786755 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.064471 786755 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0003c1d70 6 D0713 00:08:00.064531 786755 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:08:00.065339 786755 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.065365 786755 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0003c1d70 7 D0713 00:08:00.065378 786755 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:08:00.065608 786755 usertrap_amd64.go:212] [ 995: 996] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.065647 786755 usertrap_amd64.go:122] [ 995: 996] Allocate a new trap: 0xc0003c1d70 8 D0713 00:08:00.065665 786755 usertrap_amd64.go:225] [ 995: 996] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:08:00.065872 786755 usertrap_amd64.go:212] [ 995: 996] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.065902 786755 usertrap_amd64.go:122] [ 995: 996] Allocate a new trap: 0xc0003c1d70 9 D0713 00:08:00.065916 786755 usertrap_amd64.go:225] [ 995: 996] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:08:00.066176 786755 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.066207 786755 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0003c1d70 10 D0713 00:08:00.066220 786755 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:08:00.074832 786755 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.074865 786755 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0003c1d70 11 D0713 00:08:00.074876 786755 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:08:00.077918 786755 usertrap_amd64.go:212] [ 995: 996] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.078030 786755 usertrap_amd64.go:122] [ 995: 996] Allocate a new trap: 0xc0003c1d70 12 D0713 00:08:00.078094 786755 usertrap_amd64.go:225] [ 995: 996] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:08:00.078187 786755 usertrap_amd64.go:212] [ 995: 996] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.078212 786755 usertrap_amd64.go:122] [ 995: 996] Allocate a new trap: 0xc0003c1d70 13 D0713 00:08:00.078222 786755 usertrap_amd64.go:225] [ 995: 996] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:08:00.078472 786755 task_signals.go:470] [ 995: 995] Notified of signal 23 D0713 00:08:00.078608 786755 task_signals.go:220] [ 995: 995] Signal 23: delivering to handler D0713 00:08:00.086757 786755 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.086797 786755 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0003c1d70 14 D0713 00:08:00.086812 786755 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:08:00.086873 786755 task_exit.go:204] [ 995: 995] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.086912 786755 task_exit.go:204] [ 995: 995] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.086949 786755 task_signals.go:204] [ 995: 999] Signal 995, PID: 999, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.086940 786755 task_signals.go:204] [ 995: 997] Signal 995, PID: 997, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.086955 786755 task_signals.go:204] [ 995: 998] Signal 995, PID: 998, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.086983 786755 task_exit.go:204] [ 995: 999] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.087000 786755 task_exit.go:204] [ 995: 999] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.087125 786755 task_exit.go:204] [ 995: 999] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.087001 786755 task_signals.go:204] [ 995: 996] Signal 995, PID: 996, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.087176 786755 task_exit.go:204] [ 995: 996] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.087188 786755 task_exit.go:204] [ 995: 996] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.087194 786755 task_exit.go:204] [ 995: 996] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.087206 786755 task_exit.go:204] [ 995: 998] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.087215 786755 task_exit.go:204] [ 995: 998] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.087221 786755 task_exit.go:204] [ 995: 998] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.087232 786755 task_exit.go:204] [ 995: 997] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.088878 786755 task_exit.go:204] [ 995: 997] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.088907 786755 task_exit.go:204] [ 995: 997] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.088920 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.088986 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.088999 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.089139 786755 task_exit.go:204] [ 995: 995] Transitioning from exit state TaskExitZombie to TaskExitDead I0713 00:08:00.089385 786755 compat.go:120] Unsupported syscall pkey_alloc(0x0,0x0,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_alloc for more information. D0713 00:08:00.090017 786755 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.091491 786755 syscalls.go:262] [ 1000: 1000] Allocating stack with size of 8388608 bytes D0713 00:08:00.091597 786755 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.095059 786755 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.095119 786755 usertrap_amd64.go:106] [ 1000: 1000] Map a usertrap vma at 64000 D0713 00:08:00.095262 786755 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc000ac6030 1 D0713 00:08:00.095291 786755 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:08:00.095873 786755 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.095904 786755 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc000ac6030 2 D0713 00:08:00.095916 786755 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:08:00.096522 786755 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.096553 786755 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc000ac6030 3 D0713 00:08:00.096565 786755 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:08:00.103957 786755 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.104013 786755 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc000ac6030 4 D0713 00:08:00.104033 786755 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:08:00.105340 786755 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.105370 786755 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc000ac6030 5 D0713 00:08:00.105381 786755 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:08:00.105445 786755 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.105489 786755 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc000ac6030 6 D0713 00:08:00.105503 786755 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:08:00.106395 786755 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.106449 786755 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc000ac6030 7 D0713 00:08:00.106463 786755 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:08:00.106748 786755 usertrap_amd64.go:212] [ 1000: 1001] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.106798 786755 usertrap_amd64.go:122] [ 1000: 1001] Allocate a new trap: 0xc000ac6030 8 D0713 00:08:00.106813 786755 usertrap_amd64.go:225] [ 1000: 1001] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:08:00.107091 786755 usertrap_amd64.go:212] [ 1000: 1001] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.107123 786755 usertrap_amd64.go:122] [ 1000: 1001] Allocate a new trap: 0xc000ac6030 9 D0713 00:08:00.107137 786755 usertrap_amd64.go:225] [ 1000: 1001] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:08:00.107208 786755 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.107307 786755 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc000ac6030 10 D0713 00:08:00.107334 786755 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:08:00.117419 786755 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.117462 786755 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc000ac6030 11 D0713 00:08:00.117476 786755 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:08:00.120290 786755 usertrap_amd64.go:212] [ 1000: 1001] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.120327 786755 usertrap_amd64.go:122] [ 1000: 1001] Allocate a new trap: 0xc000ac6030 12 D0713 00:08:00.120342 786755 usertrap_amd64.go:225] [ 1000: 1001] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:08:00.120451 786755 usertrap_amd64.go:212] [ 1000: 1001] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.120491 786755 usertrap_amd64.go:122] [ 1000: 1001] Allocate a new trap: 0xc000ac6030 13 D0713 00:08:00.120512 786755 usertrap_amd64.go:225] [ 1000: 1001] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:08:00.120584 786755 task_signals.go:470] [ 1000: 1000] Notified of signal 23 D0713 00:08:00.120669 786755 task_signals.go:220] [ 1000: 1000] Signal 23: delivering to handler I0713 00:08:00.129378 786755 compat.go:120] Unsupported syscall pkey_free(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_free for more information. D0713 00:08:00.129526 786755 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.129566 786755 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc000ac6030 14 D0713 00:08:00.129585 786755 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:08:00.129663 786755 task_exit.go:204] [ 1000: 1000] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.129712 786755 task_exit.go:204] [ 1000: 1000] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.129729 786755 task_signals.go:204] [ 1000: 1002] Signal 1000, PID: 1002, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.129749 786755 task_signals.go:204] [ 1000: 1003] Signal 1000, PID: 1003, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.129749 786755 task_signals.go:204] [ 1000: 1001] Signal 1000, PID: 1001, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.129762 786755 task_exit.go:204] [ 1000: 1002] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.129791 786755 task_exit.go:204] [ 1000: 1002] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.129810 786755 task_exit.go:204] [ 1000: 1002] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.129847 786755 task_exit.go:204] [ 1000: 1003] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.129873 786755 task_exit.go:204] [ 1000: 1003] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.129879 786755 task_exit.go:204] [ 1000: 1003] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.129899 786755 task_signals.go:204] [ 1000: 1004] Signal 1000, PID: 1004, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.129929 786755 task_exit.go:204] [ 1000: 1004] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.129948 786755 task_exit.go:204] [ 1000: 1004] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.129954 786755 task_exit.go:204] [ 1000: 1004] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.129984 786755 task_exit.go:204] [ 1000: 1001] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.130019 786755 task_signals.go:204] [ 1000: 1005] Signal 1000, PID: 1005, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.130033 786755 task_exit.go:204] [ 1000: 1001] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.130043 786755 task_exit.go:204] [ 1000: 1001] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.130054 786755 task_exit.go:204] [ 1000: 1005] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.131678 786755 task_exit.go:204] [ 1000: 1005] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.131713 786755 task_exit.go:204] [ 1000: 1005] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.131730 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.133093 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.133140 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.133515 786755 task_exit.go:204] [ 1000: 1000] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.133637 786755 task_signals.go:470] [ 6: 13] Notified of signal 23 D0713 00:08:00.133670 786755 task_signals.go:220] [ 6: 13] Signal 23: delivering to handler D0713 00:08:00.134248 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.135778 786755 syscalls.go:262] [ 1006: 1006] Allocating stack with size of 8388608 bytes D0713 00:08:00.135899 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.145259 786755 usertrap_amd64.go:212] [ 1006: 1006] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.145310 786755 usertrap_amd64.go:106] [ 1006: 1006] Map a usertrap vma at 69000 D0713 00:08:00.145424 786755 usertrap_amd64.go:122] [ 1006: 1006] Allocate a new trap: 0xc001643ce0 1 D0713 00:08:00.145482 786755 usertrap_amd64.go:225] [ 1006: 1006] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:08:00.145913 786755 usertrap_amd64.go:212] [ 1006: 1006] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.145939 786755 usertrap_amd64.go:122] [ 1006: 1006] Allocate a new trap: 0xc001643ce0 2 D0713 00:08:00.145951 786755 usertrap_amd64.go:225] [ 1006: 1006] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:08:00.146832 786755 usertrap_amd64.go:212] [ 1006: 1006] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.146864 786755 usertrap_amd64.go:122] [ 1006: 1006] Allocate a new trap: 0xc001643ce0 3 D0713 00:08:00.146877 786755 usertrap_amd64.go:225] [ 1006: 1006] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:08:00.154610 786755 usertrap_amd64.go:212] [ 1006: 1006] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.154653 786755 usertrap_amd64.go:122] [ 1006: 1006] Allocate a new trap: 0xc001643ce0 4 D0713 00:08:00.154671 786755 usertrap_amd64.go:225] [ 1006: 1006] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:08:00.155943 786755 usertrap_amd64.go:212] [ 1006: 1006] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.156001 786755 usertrap_amd64.go:122] [ 1006: 1006] Allocate a new trap: 0xc001643ce0 5 D0713 00:08:00.156027 786755 usertrap_amd64.go:225] [ 1006: 1006] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:08:00.156104 786755 usertrap_amd64.go:212] [ 1006: 1006] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.156119 786755 usertrap_amd64.go:122] [ 1006: 1006] Allocate a new trap: 0xc001643ce0 6 D0713 00:08:00.156126 786755 usertrap_amd64.go:225] [ 1006: 1006] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:08:00.156472 786755 usertrap_amd64.go:212] [ 1006: 1006] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.156494 786755 usertrap_amd64.go:122] [ 1006: 1006] Allocate a new trap: 0xc001643ce0 7 D0713 00:08:00.156500 786755 usertrap_amd64.go:225] [ 1006: 1006] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:08:00.156732 786755 usertrap_amd64.go:212] [ 1006: 1007] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.156781 786755 usertrap_amd64.go:122] [ 1006: 1007] Allocate a new trap: 0xc001643ce0 8 D0713 00:08:00.156803 786755 usertrap_amd64.go:225] [ 1006: 1007] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:08:00.157114 786755 usertrap_amd64.go:212] [ 1006: 1007] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.157149 786755 usertrap_amd64.go:122] [ 1006: 1007] Allocate a new trap: 0xc001643ce0 9 D0713 00:08:00.157159 786755 usertrap_amd64.go:225] [ 1006: 1007] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:08:00.157204 786755 usertrap_amd64.go:212] [ 1006: 1006] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.157227 786755 usertrap_amd64.go:122] [ 1006: 1006] Allocate a new trap: 0xc001643ce0 10 D0713 00:08:00.157242 786755 usertrap_amd64.go:225] [ 1006: 1006] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:08:00.166824 786755 usertrap_amd64.go:212] [ 1006: 1006] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.166882 786755 usertrap_amd64.go:122] [ 1006: 1006] Allocate a new trap: 0xc001643ce0 11 D0713 00:08:00.166905 786755 usertrap_amd64.go:225] [ 1006: 1006] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:08:00.167821 786755 usertrap_amd64.go:212] [ 1006: 1007] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.167853 786755 usertrap_amd64.go:122] [ 1006: 1007] Allocate a new trap: 0xc001643ce0 12 D0713 00:08:00.167872 786755 usertrap_amd64.go:225] [ 1006: 1007] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:08:00.167957 786755 usertrap_amd64.go:212] [ 1006: 1007] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.167970 786755 usertrap_amd64.go:122] [ 1006: 1007] Allocate a new trap: 0xc001643ce0 13 D0713 00:08:00.167979 786755 usertrap_amd64.go:225] [ 1006: 1007] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:08:00.168001 786755 task_signals.go:470] [ 1006: 1006] Notified of signal 23 D0713 00:08:00.168208 786755 task_signals.go:220] [ 1006: 1006] Signal 23: delivering to handler D0713 00:08:00.168500 786755 task_signals.go:470] [ 1006: 1006] Notified of signal 23 D0713 00:08:00.168623 786755 task_signals.go:220] [ 1006: 1006] Signal 23: delivering to handler D0713 00:08:00.179213 786755 task_signals.go:470] [ 1006: 1006] Notified of signal 23 D0713 00:08:00.179620 786755 task_signals.go:220] [ 1006: 1006] Signal 23: delivering to handler I0713 00:08:00.180226 786755 compat.go:120] Unsupported syscall pkey_mprotect(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_mprotect for more information. D0713 00:08:00.180330 786755 usertrap_amd64.go:212] [ 1006: 1006] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.180360 786755 usertrap_amd64.go:122] [ 1006: 1006] Allocate a new trap: 0xc001643ce0 14 D0713 00:08:00.180373 786755 usertrap_amd64.go:225] [ 1006: 1006] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:08:00.180452 786755 task_exit.go:204] [ 1006: 1006] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.180484 786755 task_exit.go:204] [ 1006: 1006] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.180515 786755 task_signals.go:204] [ 1006: 1009] Signal 1006, PID: 1009, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.180516 786755 task_signals.go:204] [ 1006: 1008] Signal 1006, PID: 1008, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.180543 786755 task_exit.go:204] [ 1006: 1009] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.180531 786755 task_signals.go:204] [ 1006: 1010] Signal 1006, PID: 1010, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.180557 786755 task_exit.go:204] [ 1006: 1009] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.180564 786755 task_exit.go:204] [ 1006: 1009] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.180585 786755 task_exit.go:204] [ 1006: 1008] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.180641 786755 task_signals.go:204] [ 1006: 1007] Signal 1006, PID: 1007, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.180658 786755 task_exit.go:204] [ 1006: 1007] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.180669 786755 task_exit.go:204] [ 1006: 1007] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.180676 786755 task_exit.go:204] [ 1006: 1007] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.180687 786755 task_exit.go:204] [ 1006: 1010] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.180763 786755 task_exit.go:204] [ 1006: 1008] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.180791 786755 task_exit.go:204] [ 1006: 1008] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.182398 786755 task_exit.go:204] [ 1006: 1010] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.182439 786755 task_exit.go:204] [ 1006: 1010] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.182459 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.182570 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.182620 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.182652 786755 task_exit.go:204] [ 1006: 1006] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.183466 786755 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.185182 786755 syscalls.go:262] [ 1011: 1011] Allocating stack with size of 8388608 bytes D0713 00:08:00.185316 786755 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.187822 786755 usertrap_amd64.go:212] [ 1011: 1011] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.187866 786755 usertrap_amd64.go:106] [ 1011: 1011] Map a usertrap vma at 61000 D0713 00:08:00.187955 786755 usertrap_amd64.go:122] [ 1011: 1011] Allocate a new trap: 0xc000604060 1 D0713 00:08:00.187982 786755 usertrap_amd64.go:225] [ 1011: 1011] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:08:00.188614 786755 usertrap_amd64.go:212] [ 1011: 1011] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.188637 786755 usertrap_amd64.go:122] [ 1011: 1011] Allocate a new trap: 0xc000604060 2 D0713 00:08:00.188652 786755 usertrap_amd64.go:225] [ 1011: 1011] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:08:00.189430 786755 usertrap_amd64.go:212] [ 1011: 1011] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.189466 786755 usertrap_amd64.go:122] [ 1011: 1011] Allocate a new trap: 0xc000604060 3 D0713 00:08:00.189490 786755 usertrap_amd64.go:225] [ 1011: 1011] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:08:00.199450 786755 usertrap_amd64.go:212] [ 1011: 1011] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.199515 786755 usertrap_amd64.go:122] [ 1011: 1011] Allocate a new trap: 0xc000604060 4 D0713 00:08:00.199535 786755 usertrap_amd64.go:225] [ 1011: 1011] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:08:00.201006 786755 usertrap_amd64.go:212] [ 1011: 1011] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.201128 786755 usertrap_amd64.go:122] [ 1011: 1011] Allocate a new trap: 0xc000604060 5 D0713 00:08:00.201174 786755 usertrap_amd64.go:225] [ 1011: 1011] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:08:00.201325 786755 usertrap_amd64.go:212] [ 1011: 1011] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.201351 786755 usertrap_amd64.go:122] [ 1011: 1011] Allocate a new trap: 0xc000604060 6 D0713 00:08:00.201362 786755 usertrap_amd64.go:225] [ 1011: 1011] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:08:00.201688 786755 usertrap_amd64.go:212] [ 1011: 1011] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.201720 786755 usertrap_amd64.go:122] [ 1011: 1011] Allocate a new trap: 0xc000604060 7 D0713 00:08:00.201736 786755 usertrap_amd64.go:225] [ 1011: 1011] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:08:00.201922 786755 usertrap_amd64.go:212] [ 1011: 1012] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.201949 786755 usertrap_amd64.go:122] [ 1011: 1012] Allocate a new trap: 0xc000604060 8 D0713 00:08:00.201960 786755 usertrap_amd64.go:225] [ 1011: 1012] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:08:00.202173 786755 usertrap_amd64.go:212] [ 1011: 1012] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.202198 786755 usertrap_amd64.go:122] [ 1011: 1012] Allocate a new trap: 0xc000604060 9 D0713 00:08:00.202212 786755 usertrap_amd64.go:225] [ 1011: 1012] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:08:00.202266 786755 usertrap_amd64.go:212] [ 1011: 1011] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.202292 786755 usertrap_amd64.go:122] [ 1011: 1011] Allocate a new trap: 0xc000604060 10 D0713 00:08:00.202306 786755 usertrap_amd64.go:225] [ 1011: 1011] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:08:00.210132 786755 usertrap_amd64.go:212] [ 1011: 1011] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.210172 786755 usertrap_amd64.go:122] [ 1011: 1011] Allocate a new trap: 0xc000604060 11 D0713 00:08:00.210187 786755 usertrap_amd64.go:225] [ 1011: 1011] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:08:00.213166 786755 usertrap_amd64.go:212] [ 1011: 1012] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.213200 786755 usertrap_amd64.go:122] [ 1011: 1012] Allocate a new trap: 0xc000604060 12 D0713 00:08:00.213213 786755 usertrap_amd64.go:225] [ 1011: 1012] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:08:00.213244 786755 usertrap_amd64.go:212] [ 1011: 1012] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.213263 786755 usertrap_amd64.go:122] [ 1011: 1012] Allocate a new trap: 0xc000604060 13 D0713 00:08:00.213273 786755 usertrap_amd64.go:225] [ 1011: 1012] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:08:00.213303 786755 task_signals.go:470] [ 1011: 1011] Notified of signal 23 D0713 00:08:00.213369 786755 task_signals.go:220] [ 1011: 1011] Signal 23: delivering to handler D0713 00:08:00.222167 786755 usertrap_amd64.go:212] [ 1011: 1011] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.222218 786755 usertrap_amd64.go:122] [ 1011: 1011] Allocate a new trap: 0xc000604060 14 D0713 00:08:00.222234 786755 usertrap_amd64.go:225] [ 1011: 1011] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:08:00.222304 786755 task_exit.go:204] [ 1011: 1011] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.222338 786755 task_exit.go:204] [ 1011: 1011] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.222378 786755 task_signals.go:204] [ 1011: 1016] Signal 1011, PID: 1016, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.222397 786755 task_exit.go:204] [ 1011: 1016] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.222406 786755 task_exit.go:204] [ 1011: 1016] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.222399 786755 task_signals.go:204] [ 1011: 1012] Signal 1011, PID: 1012, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.222376 786755 task_signals.go:204] [ 1011: 1013] Signal 1011, PID: 1013, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.222412 786755 task_exit.go:204] [ 1011: 1016] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.222376 786755 task_signals.go:204] [ 1011: 1014] Signal 1011, PID: 1014, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.222485 786755 task_exit.go:204] [ 1011: 1014] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.222504 786755 task_signals.go:204] [ 1011: 1015] Signal 1011, PID: 1015, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.222516 786755 task_exit.go:204] [ 1011: 1012] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.222531 786755 task_exit.go:204] [ 1011: 1012] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.222535 786755 task_exit.go:204] [ 1011: 1012] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.222545 786755 task_exit.go:204] [ 1011: 1013] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.222549 786755 task_exit.go:204] [ 1011: 1013] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.222552 786755 task_exit.go:204] [ 1011: 1013] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.222560 786755 task_exit.go:204] [ 1011: 1014] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.222563 786755 task_exit.go:204] [ 1011: 1014] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.222569 786755 task_exit.go:204] [ 1011: 1015] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.224250 786755 task_exit.go:204] [ 1011: 1015] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.224298 786755 task_exit.go:204] [ 1011: 1015] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.224320 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.224353 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.224365 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.224510 786755 task_exit.go:204] [ 1011: 1011] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.225412 786755 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.226939 786755 syscalls.go:262] [ 1017: 1017] Allocating stack with size of 8388608 bytes D0713 00:08:00.227056 786755 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.228300 786755 usertrap_amd64.go:212] [ 1017: 1017] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.228350 786755 usertrap_amd64.go:106] [ 1017: 1017] Map a usertrap vma at 6a000 D0713 00:08:00.228465 786755 usertrap_amd64.go:122] [ 1017: 1017] Allocate a new trap: 0xc0008b5440 1 D0713 00:08:00.228501 786755 usertrap_amd64.go:225] [ 1017: 1017] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:08:00.228934 786755 usertrap_amd64.go:212] [ 1017: 1017] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.228977 786755 usertrap_amd64.go:122] [ 1017: 1017] Allocate a new trap: 0xc0008b5440 2 D0713 00:08:00.228989 786755 usertrap_amd64.go:225] [ 1017: 1017] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:08:00.229756 786755 usertrap_amd64.go:212] [ 1017: 1017] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.229803 786755 usertrap_amd64.go:122] [ 1017: 1017] Allocate a new trap: 0xc0008b5440 3 D0713 00:08:00.229817 786755 usertrap_amd64.go:225] [ 1017: 1017] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:08:00.237804 786755 usertrap_amd64.go:212] [ 1017: 1017] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.237846 786755 usertrap_amd64.go:122] [ 1017: 1017] Allocate a new trap: 0xc0008b5440 4 D0713 00:08:00.237863 786755 usertrap_amd64.go:225] [ 1017: 1017] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:08:00.238984 786755 usertrap_amd64.go:212] [ 1017: 1017] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.239015 786755 usertrap_amd64.go:122] [ 1017: 1017] Allocate a new trap: 0xc0008b5440 5 D0713 00:08:00.239027 786755 usertrap_amd64.go:225] [ 1017: 1017] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:08:00.239080 786755 usertrap_amd64.go:212] [ 1017: 1017] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.239105 786755 usertrap_amd64.go:122] [ 1017: 1017] Allocate a new trap: 0xc0008b5440 6 D0713 00:08:00.239113 786755 usertrap_amd64.go:225] [ 1017: 1017] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:08:00.239595 786755 usertrap_amd64.go:212] [ 1017: 1017] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.239620 786755 usertrap_amd64.go:122] [ 1017: 1017] Allocate a new trap: 0xc0008b5440 7 D0713 00:08:00.239629 786755 usertrap_amd64.go:225] [ 1017: 1017] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:08:00.239886 786755 usertrap_amd64.go:212] [ 1017: 1018] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.239912 786755 usertrap_amd64.go:122] [ 1017: 1018] Allocate a new trap: 0xc0008b5440 8 D0713 00:08:00.239924 786755 usertrap_amd64.go:225] [ 1017: 1018] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:08:00.240194 786755 usertrap_amd64.go:212] [ 1017: 1018] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.240218 786755 usertrap_amd64.go:122] [ 1017: 1018] Allocate a new trap: 0xc0008b5440 9 D0713 00:08:00.240229 786755 usertrap_amd64.go:225] [ 1017: 1018] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:08:00.240244 786755 usertrap_amd64.go:212] [ 1017: 1017] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.240250 786755 usertrap_amd64.go:122] [ 1017: 1017] Allocate a new trap: 0xc0008b5440 10 D0713 00:08:00.240259 786755 usertrap_amd64.go:225] [ 1017: 1017] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:08:00.248200 786755 usertrap_amd64.go:212] [ 1017: 1017] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.248227 786755 usertrap_amd64.go:122] [ 1017: 1017] Allocate a new trap: 0xc0008b5440 11 D0713 00:08:00.248239 786755 usertrap_amd64.go:225] [ 1017: 1017] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:08:00.250815 786755 usertrap_amd64.go:212] [ 1017: 1018] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.250846 786755 usertrap_amd64.go:122] [ 1017: 1018] Allocate a new trap: 0xc0008b5440 12 D0713 00:08:00.250857 786755 usertrap_amd64.go:225] [ 1017: 1018] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:08:00.250907 786755 usertrap_amd64.go:212] [ 1017: 1018] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.250927 786755 usertrap_amd64.go:122] [ 1017: 1018] Allocate a new trap: 0xc0008b5440 13 D0713 00:08:00.250938 786755 usertrap_amd64.go:225] [ 1017: 1018] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:08:00.251044 786755 task_signals.go:470] [ 1017: 1017] Notified of signal 23 D0713 00:08:00.251126 786755 task_signals.go:220] [ 1017: 1017] Signal 23: delivering to handler D0713 00:08:00.259847 786755 usertrap_amd64.go:212] [ 1017: 1017] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.259869 786755 usertrap_amd64.go:122] [ 1017: 1017] Allocate a new trap: 0xc0008b5440 14 D0713 00:08:00.259880 786755 usertrap_amd64.go:225] [ 1017: 1017] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:08:00.259927 786755 task_exit.go:204] [ 1017: 1017] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.259946 786755 task_exit.go:204] [ 1017: 1017] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.259969 786755 task_signals.go:204] [ 1017: 1019] Signal 1017, PID: 1019, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.259997 786755 task_exit.go:204] [ 1017: 1019] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.260007 786755 task_exit.go:204] [ 1017: 1019] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.260011 786755 task_exit.go:204] [ 1017: 1019] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.260006 786755 task_signals.go:204] [ 1017: 1020] Signal 1017, PID: 1020, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.260010 786755 task_signals.go:204] [ 1017: 1018] Signal 1017, PID: 1018, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.260021 786755 task_exit.go:204] [ 1017: 1020] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.260033 786755 task_exit.go:204] [ 1017: 1020] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.260039 786755 task_exit.go:204] [ 1017: 1020] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.260079 786755 task_signals.go:204] [ 1017: 1021] Signal 1017, PID: 1021, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.260124 786755 task_exit.go:204] [ 1017: 1018] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.260139 786755 task_exit.go:204] [ 1017: 1018] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.260146 786755 task_exit.go:204] [ 1017: 1018] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.260176 786755 task_exit.go:204] [ 1017: 1021] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.261750 786755 task_exit.go:204] [ 1017: 1021] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.261785 786755 task_exit.go:204] [ 1017: 1021] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.261800 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.261838 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.261846 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.261945 786755 task_exit.go:204] [ 1017: 1017] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.262089 786755 task_signals.go:470] [ 6: 23] Notified of signal 23 D0713 00:08:00.262248 786755 task_signals.go:220] [ 6: 23] Signal 23: delivering to handler D0713 00:08:00.262801 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.264193 786755 syscalls.go:262] [ 1022: 1022] Allocating stack with size of 8388608 bytes D0713 00:08:00.264331 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.265805 786755 usertrap_amd64.go:212] [ 1022: 1022] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.265865 786755 usertrap_amd64.go:106] [ 1022: 1022] Map a usertrap vma at 6a000 D0713 00:08:00.265984 786755 usertrap_amd64.go:122] [ 1022: 1022] Allocate a new trap: 0xc000bdaed0 1 D0713 00:08:00.266024 786755 usertrap_amd64.go:225] [ 1022: 1022] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:08:00.266402 786755 usertrap_amd64.go:212] [ 1022: 1022] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.266422 786755 usertrap_amd64.go:122] [ 1022: 1022] Allocate a new trap: 0xc000bdaed0 2 D0713 00:08:00.266430 786755 usertrap_amd64.go:225] [ 1022: 1022] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:08:00.267579 786755 usertrap_amd64.go:212] [ 1022: 1022] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.267605 786755 usertrap_amd64.go:122] [ 1022: 1022] Allocate a new trap: 0xc000bdaed0 3 D0713 00:08:00.267614 786755 usertrap_amd64.go:225] [ 1022: 1022] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:08:00.275630 786755 usertrap_amd64.go:212] [ 1022: 1022] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.275659 786755 usertrap_amd64.go:122] [ 1022: 1022] Allocate a new trap: 0xc000bdaed0 4 D0713 00:08:00.275671 786755 usertrap_amd64.go:225] [ 1022: 1022] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:08:00.276803 786755 usertrap_amd64.go:212] [ 1022: 1022] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.276835 786755 usertrap_amd64.go:122] [ 1022: 1022] Allocate a new trap: 0xc000bdaed0 5 D0713 00:08:00.276846 786755 usertrap_amd64.go:225] [ 1022: 1022] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:08:00.276888 786755 usertrap_amd64.go:212] [ 1022: 1022] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.276894 786755 usertrap_amd64.go:122] [ 1022: 1022] Allocate a new trap: 0xc000bdaed0 6 D0713 00:08:00.276901 786755 usertrap_amd64.go:225] [ 1022: 1022] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:08:00.277303 786755 usertrap_amd64.go:212] [ 1022: 1022] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.277386 786755 usertrap_amd64.go:122] [ 1022: 1022] Allocate a new trap: 0xc000bdaed0 7 D0713 00:08:00.277467 786755 usertrap_amd64.go:225] [ 1022: 1022] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:08:00.277731 786755 usertrap_amd64.go:212] [ 1022: 1023] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.277748 786755 usertrap_amd64.go:122] [ 1022: 1023] Allocate a new trap: 0xc000bdaed0 8 D0713 00:08:00.277756 786755 usertrap_amd64.go:225] [ 1022: 1023] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:08:00.278136 786755 usertrap_amd64.go:212] [ 1022: 1023] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.278155 786755 usertrap_amd64.go:122] [ 1022: 1023] Allocate a new trap: 0xc000bdaed0 9 D0713 00:08:00.278169 786755 usertrap_amd64.go:225] [ 1022: 1023] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:08:00.278335 786755 usertrap_amd64.go:212] [ 1022: 1022] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.278351 786755 usertrap_amd64.go:122] [ 1022: 1022] Allocate a new trap: 0xc000bdaed0 10 D0713 00:08:00.278361 786755 usertrap_amd64.go:225] [ 1022: 1022] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:08:00.278495 786755 usertrap_amd64.go:212] [ 1022: 1025] Found the pattern at ip 46b6e0:sysno 24 D0713 00:08:00.278532 786755 usertrap_amd64.go:122] [ 1022: 1025] Allocate a new trap: 0xc000bdaed0 11 D0713 00:08:00.278548 786755 usertrap_amd64.go:225] [ 1022: 1025] Apply the binary patch addr 46b6e0 trap addr 6a370 ([184 24 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:08:00.286191 786755 usertrap_amd64.go:212] [ 1022: 1022] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.286220 786755 usertrap_amd64.go:122] [ 1022: 1022] Allocate a new trap: 0xc000bdaed0 12 D0713 00:08:00.286233 786755 usertrap_amd64.go:225] [ 1022: 1022] Apply the binary patch addr 46af29 trap addr 6a3c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:08:00.290756 786755 usertrap_amd64.go:212] [ 1022: 1023] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.290791 786755 usertrap_amd64.go:122] [ 1022: 1023] Allocate a new trap: 0xc000bdaed0 13 D0713 00:08:00.290814 786755 usertrap_amd64.go:225] [ 1022: 1023] Apply the binary patch addr 46b020 trap addr 6a410 ([184 39 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:08:00.290879 786755 usertrap_amd64.go:212] [ 1022: 1023] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.290896 786755 usertrap_amd64.go:122] [ 1022: 1023] Allocate a new trap: 0xc000bdaed0 14 D0713 00:08:00.290910 786755 usertrap_amd64.go:225] [ 1022: 1023] Apply the binary patch addr 46b04f trap addr 6a460 ([184 234 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:08:00.290940 786755 task_signals.go:470] [ 1022: 1022] Notified of signal 23 D0713 00:08:00.291003 786755 task_signals.go:220] [ 1022: 1022] Signal 23: delivering to handler D0713 00:08:00.296776 786755 usertrap_amd64.go:212] [ 1022: 1022] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.296807 786755 usertrap_amd64.go:122] [ 1022: 1022] Allocate a new trap: 0xc000bdaed0 15 D0713 00:08:00.296816 786755 usertrap_amd64.go:225] [ 1022: 1022] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 00:08:00.296852 786755 task_exit.go:204] [ 1022: 1022] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.296887 786755 task_exit.go:204] [ 1022: 1022] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.296916 786755 task_signals.go:204] [ 1022: 1023] Signal 1022, PID: 1023, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.296932 786755 task_exit.go:204] [ 1022: 1023] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.296965 786755 task_exit.go:204] [ 1022: 1023] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.296972 786755 task_exit.go:204] [ 1022: 1023] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.296989 786755 task_signals.go:204] [ 1022: 1027] Signal 1022, PID: 1027, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.297023 786755 task_exit.go:204] [ 1022: 1027] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.297002 786755 task_signals.go:204] [ 1022: 1026] Signal 1022, PID: 1026, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.297032 786755 task_exit.go:204] [ 1022: 1027] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.297037 786755 task_exit.go:204] [ 1022: 1027] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.297029 786755 task_signals.go:204] [ 1022: 1028] Signal 1022, PID: 1028, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.297051 786755 task_signals.go:204] [ 1022: 1024] Signal 1022, PID: 1024, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.297056 786755 task_exit.go:204] [ 1022: 1028] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.297075 786755 task_exit.go:204] [ 1022: 1026] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.297088 786755 task_exit.go:204] [ 1022: 1026] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.297106 786755 task_exit.go:204] [ 1022: 1026] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.297122 786755 task_exit.go:204] [ 1022: 1028] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.297135 786755 task_exit.go:204] [ 1022: 1028] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.297147 786755 task_signals.go:204] [ 1022: 1025] Signal 1022, PID: 1025, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.297158 786755 task_exit.go:204] [ 1022: 1025] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.297167 786755 task_exit.go:204] [ 1022: 1025] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.297173 786755 task_exit.go:204] [ 1022: 1025] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.297412 786755 task_exit.go:204] [ 1022: 1024] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.298789 786755 task_exit.go:204] [ 1022: 1024] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.298824 786755 task_exit.go:204] [ 1022: 1024] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.298846 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.298872 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.298881 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.299001 786755 task_exit.go:204] [ 1022: 1022] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.299719 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.301914 786755 syscalls.go:262] [ 1029: 1029] Allocating stack with size of 8388608 bytes D0713 00:08:00.302029 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.302797 786755 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.302834 786755 usertrap_amd64.go:106] [ 1029: 1029] Map a usertrap vma at 67000 D0713 00:08:00.302956 786755 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0008b5560 1 D0713 00:08:00.302981 786755 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:08:00.303418 786755 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.303455 786755 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0008b5560 2 D0713 00:08:00.303471 786755 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:08:00.304120 786755 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.304139 786755 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0008b5560 3 D0713 00:08:00.304148 786755 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:08:00.310203 786755 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.310236 786755 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0008b5560 4 D0713 00:08:00.310265 786755 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:08:00.311524 786755 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.311548 786755 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0008b5560 5 D0713 00:08:00.311557 786755 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:08:00.311585 786755 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.311605 786755 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0008b5560 6 D0713 00:08:00.311614 786755 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:08:00.311899 786755 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.311921 786755 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0008b5560 7 D0713 00:08:00.311942 786755 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:08:00.312077 786755 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.312094 786755 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc0008b5560 8 D0713 00:08:00.312100 786755 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:08:00.312228 786755 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.312244 786755 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc0008b5560 9 D0713 00:08:00.312250 786755 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:08:00.312402 786755 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.312434 786755 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0008b5560 10 D0713 00:08:00.312449 786755 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:08:00.319414 786755 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.319441 786755 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0008b5560 11 D0713 00:08:00.319454 786755 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:08:00.323272 786755 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.323304 786755 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc0008b5560 12 D0713 00:08:00.323317 786755 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:08:00.323368 786755 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.323394 786755 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc0008b5560 13 D0713 00:08:00.323404 786755 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:08:00.323514 786755 task_signals.go:470] [ 1029: 1029] Notified of signal 23 D0713 00:08:00.323809 786755 task_signals.go:220] [ 1029: 1029] Signal 23: delivering to handler D0713 00:08:00.330174 786755 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.330208 786755 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0008b5560 14 D0713 00:08:00.330222 786755 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:08:00.330303 786755 task_exit.go:204] [ 1029: 1029] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.330322 786755 task_exit.go:204] [ 1029: 1029] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.330341 786755 task_signals.go:204] [ 1029: 1032] Signal 1029, PID: 1032, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.330338 786755 task_signals.go:204] [ 1029: 1031] Signal 1029, PID: 1031, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.330358 786755 task_signals.go:204] [ 1029: 1033] Signal 1029, PID: 1033, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.330370 786755 task_exit.go:204] [ 1029: 1032] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.330361 786755 task_signals.go:204] [ 1029: 1030] Signal 1029, PID: 1030, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.330385 786755 task_exit.go:204] [ 1029: 1032] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.330405 786755 task_exit.go:204] [ 1029: 1032] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.330432 786755 task_exit.go:204] [ 1029: 1031] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.330463 786755 task_exit.go:204] [ 1029: 1031] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.330484 786755 task_exit.go:204] [ 1029: 1031] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.330498 786755 task_exit.go:204] [ 1029: 1033] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.330521 786755 task_exit.go:204] [ 1029: 1033] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.330528 786755 task_exit.go:204] [ 1029: 1033] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.330549 786755 task_exit.go:204] [ 1029: 1030] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.332073 786755 task_exit.go:204] [ 1029: 1030] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.332108 786755 task_exit.go:204] [ 1029: 1030] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.332135 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.332167 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.332187 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.332260 786755 task_exit.go:204] [ 1029: 1029] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.332806 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.334428 786755 syscalls.go:262] [ 1034: 1034] Allocating stack with size of 8388608 bytes D0713 00:08:00.334588 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.335826 786755 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.335871 786755 usertrap_amd64.go:106] [ 1034: 1034] Map a usertrap vma at 62000 D0713 00:08:00.335957 786755 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc000e1e120 1 D0713 00:08:00.335998 786755 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:08:00.336548 786755 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.336569 786755 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc000e1e120 2 D0713 00:08:00.336581 786755 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:08:00.337250 786755 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.337275 786755 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc000e1e120 3 D0713 00:08:00.337286 786755 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:08:00.343848 786755 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.343876 786755 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc000e1e120 4 D0713 00:08:00.343886 786755 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:08:00.345059 786755 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.345080 786755 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc000e1e120 5 D0713 00:08:00.345096 786755 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:08:00.345155 786755 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.345179 786755 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc000e1e120 6 D0713 00:08:00.345186 786755 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:08:00.345483 786755 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.345504 786755 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc000e1e120 7 D0713 00:08:00.345513 786755 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:08:00.345729 786755 usertrap_amd64.go:212] [ 1034: 1035] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.345803 786755 usertrap_amd64.go:122] [ 1034: 1035] Allocate a new trap: 0xc000e1e120 8 D0713 00:08:00.345828 786755 usertrap_amd64.go:225] [ 1034: 1035] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:08:00.346058 786755 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.346078 786755 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc000e1e120 9 D0713 00:08:00.346087 786755 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:08:00.346102 786755 usertrap_amd64.go:212] [ 1034: 1035] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.346109 786755 usertrap_amd64.go:122] [ 1034: 1035] Allocate a new trap: 0xc000e1e120 10 D0713 00:08:00.346118 786755 usertrap_amd64.go:225] [ 1034: 1035] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:08:00.346679 786755 usertrap_amd64.go:212] [ 1034: 1035] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.346737 786755 usertrap_amd64.go:122] [ 1034: 1035] Allocate a new trap: 0xc000e1e120 11 D0713 00:08:00.346754 786755 usertrap_amd64.go:225] [ 1034: 1035] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:08:00.346821 786755 usertrap_amd64.go:212] [ 1034: 1035] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.346841 786755 usertrap_amd64.go:122] [ 1034: 1035] Allocate a new trap: 0xc000e1e120 12 D0713 00:08:00.346850 786755 usertrap_amd64.go:225] [ 1034: 1035] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:08:00.346871 786755 task_signals.go:470] [ 1034: 1034] Notified of signal 23 D0713 00:08:00.346908 786755 task_signals.go:220] [ 1034: 1034] Signal 23: delivering to handler D0713 00:08:00.354135 786755 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.354177 786755 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc000e1e120 13 D0713 00:08:00.354191 786755 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:08:00.357882 786755 task_signals.go:470] [ 1034: 1034] Notified of signal 23 D0713 00:08:00.357930 786755 task_signals.go:220] [ 1034: 1034] Signal 23: delivering to handler D0713 00:08:00.365762 786755 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.365827 786755 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc000e1e120 14 D0713 00:08:00.365847 786755 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:08:00.366094 786755 task_exit.go:204] [ 1034: 1034] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.366146 786755 task_exit.go:204] [ 1034: 1034] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.366170 786755 task_signals.go:204] [ 1034: 1038] Signal 1034, PID: 1038, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.366189 786755 task_exit.go:204] [ 1034: 1038] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.366197 786755 task_exit.go:204] [ 1034: 1038] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.366193 786755 task_signals.go:204] [ 1034: 1035] Signal 1034, PID: 1035, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.366204 786755 task_exit.go:204] [ 1034: 1038] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.366228 786755 task_signals.go:204] [ 1034: 1036] Signal 1034, PID: 1036, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.366255 786755 task_exit.go:204] [ 1034: 1036] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.366266 786755 task_signals.go:204] [ 1034: 1037] Signal 1034, PID: 1037, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.366280 786755 task_exit.go:204] [ 1034: 1036] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.366288 786755 task_exit.go:204] [ 1034: 1036] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.366299 786755 task_exit.go:204] [ 1034: 1037] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.366307 786755 task_exit.go:204] [ 1034: 1037] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.366312 786755 task_exit.go:204] [ 1034: 1037] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.366345 786755 task_exit.go:204] [ 1034: 1035] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.367757 786755 task_exit.go:204] [ 1034: 1035] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.367783 786755 task_exit.go:204] [ 1034: 1035] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.367856 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.367898 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.367935 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.368055 786755 task_exit.go:204] [ 1034: 1034] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.368714 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.370138 786755 syscalls.go:262] [ 1039: 1039] Allocating stack with size of 8388608 bytes D0713 00:08:00.370256 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.373674 786755 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.373723 786755 usertrap_amd64.go:106] [ 1039: 1039] Map a usertrap vma at 63000 D0713 00:08:00.373841 786755 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc000e1e330 1 D0713 00:08:00.373884 786755 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:08:00.374306 786755 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.374416 786755 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc000e1e330 2 D0713 00:08:00.374457 786755 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:08:00.375080 786755 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.375102 786755 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc000e1e330 3 D0713 00:08:00.375111 786755 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:08:00.381900 786755 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.381921 786755 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc000e1e330 4 D0713 00:08:00.381934 786755 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:08:00.383234 786755 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.383263 786755 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc000e1e330 5 D0713 00:08:00.383275 786755 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:08:00.383319 786755 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.383345 786755 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc000e1e330 6 D0713 00:08:00.383357 786755 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:08:00.383638 786755 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.383658 786755 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc000e1e330 7 D0713 00:08:00.383668 786755 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:08:00.383830 786755 usertrap_amd64.go:212] [ 1039: 1040] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.383846 786755 usertrap_amd64.go:122] [ 1039: 1040] Allocate a new trap: 0xc000e1e330 8 D0713 00:08:00.383857 786755 usertrap_amd64.go:225] [ 1039: 1040] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:08:00.383940 786755 usertrap_amd64.go:212] [ 1039: 1040] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.383955 786755 usertrap_amd64.go:122] [ 1039: 1040] Allocate a new trap: 0xc000e1e330 9 D0713 00:08:00.383964 786755 usertrap_amd64.go:225] [ 1039: 1040] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:08:00.384120 786755 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.384142 786755 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc000e1e330 10 D0713 00:08:00.384152 786755 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:08:00.384298 786755 usertrap_amd64.go:212] [ 1039: 1042] Found the pattern at ip 46b6e0:sysno 24 D0713 00:08:00.384357 786755 usertrap_amd64.go:122] [ 1039: 1042] Allocate a new trap: 0xc000e1e330 11 D0713 00:08:00.384388 786755 usertrap_amd64.go:225] [ 1039: 1042] Apply the binary patch addr 46b6e0 trap addr 63370 ([184 24 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:08:00.392792 786755 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.392831 786755 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc000e1e330 12 D0713 00:08:00.392845 786755 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:08:00.395794 786755 usertrap_amd64.go:212] [ 1039: 1040] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.395826 786755 usertrap_amd64.go:122] [ 1039: 1040] Allocate a new trap: 0xc000e1e330 13 D0713 00:08:00.395854 786755 usertrap_amd64.go:225] [ 1039: 1040] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:08:00.395884 786755 usertrap_amd64.go:212] [ 1039: 1040] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.395905 786755 usertrap_amd64.go:122] [ 1039: 1040] Allocate a new trap: 0xc000e1e330 14 D0713 00:08:00.395916 786755 usertrap_amd64.go:225] [ 1039: 1040] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:08:00.395973 786755 task_signals.go:470] [ 1039: 1039] Notified of signal 23 D0713 00:08:00.396056 786755 task_signals.go:220] [ 1039: 1039] Signal 23: delivering to handler D0713 00:08:00.403849 786755 usertrap_amd64.go:212] [ 1039: 1039] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.403906 786755 usertrap_amd64.go:122] [ 1039: 1039] Allocate a new trap: 0xc000e1e330 15 D0713 00:08:00.403926 786755 usertrap_amd64.go:225] [ 1039: 1039] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0713 00:08:00.404076 786755 task_exit.go:204] [ 1039: 1039] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.404126 786755 task_signals.go:204] [ 1039: 1040] Signal 1039, PID: 1040, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.404132 786755 task_signals.go:204] [ 1039: 1041] Signal 1039, PID: 1041, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.404157 786755 task_signals.go:204] [ 1039: 1042] Signal 1039, PID: 1042, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.404175 786755 task_signals.go:204] [ 1039: 1043] Signal 1039, PID: 1043, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.404198 786755 task_exit.go:204] [ 1039: 1039] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.404223 786755 task_signals.go:204] [ 1039: 1044] Signal 1039, PID: 1044, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.404236 786755 task_exit.go:204] [ 1039: 1040] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.404266 786755 task_exit.go:204] [ 1039: 1040] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.404282 786755 task_exit.go:204] [ 1039: 1040] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.404295 786755 task_exit.go:204] [ 1039: 1041] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.404305 786755 task_exit.go:204] [ 1039: 1041] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.404312 786755 task_exit.go:204] [ 1039: 1041] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.404331 786755 task_exit.go:204] [ 1039: 1044] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.404349 786755 task_exit.go:204] [ 1039: 1044] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.404355 786755 task_exit.go:204] [ 1039: 1044] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.404366 786755 task_exit.go:204] [ 1039: 1043] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.404398 786755 task_exit.go:204] [ 1039: 1043] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.404406 786755 task_exit.go:204] [ 1039: 1043] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.404423 786755 task_exit.go:204] [ 1039: 1042] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.406107 786755 task_exit.go:204] [ 1039: 1042] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.406156 786755 task_exit.go:204] [ 1039: 1042] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.406173 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.409785 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.409820 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.409900 786755 task_exit.go:204] [ 1039: 1039] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.410534 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.412148 786755 syscalls.go:262] [ 1045: 1045] Allocating stack with size of 8388608 bytes D0713 00:08:00.412260 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.413497 786755 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.413536 786755 usertrap_amd64.go:106] [ 1045: 1045] Map a usertrap vma at 66000 D0713 00:08:00.413608 786755 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000ac6d20 1 D0713 00:08:00.413638 786755 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:08:00.414075 786755 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.414181 786755 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000ac6d20 2 D0713 00:08:00.414206 786755 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:08:00.415120 786755 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.415167 786755 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000ac6d20 3 D0713 00:08:00.415184 786755 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:08:00.422163 786755 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.422209 786755 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000ac6d20 4 D0713 00:08:00.422224 786755 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:08:00.423422 786755 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.423468 786755 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000ac6d20 5 D0713 00:08:00.423481 786755 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:08:00.423552 786755 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.423562 786755 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000ac6d20 6 D0713 00:08:00.423570 786755 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:08:00.423832 786755 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.423856 786755 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000ac6d20 7 D0713 00:08:00.423864 786755 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:08:00.424220 786755 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.424250 786755 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc000ac6d20 8 D0713 00:08:00.424262 786755 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:08:00.424530 786755 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.424553 786755 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc000ac6d20 9 D0713 00:08:00.424634 786755 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:08:00.424654 786755 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.424662 786755 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000ac6d20 10 D0713 00:08:00.424671 786755 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:08:00.435412 786755 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.435444 786755 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000ac6d20 11 D0713 00:08:00.435463 786755 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:08:00.438150 786755 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.438163 786755 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc000ac6d20 12 D0713 00:08:00.438181 786755 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:08:00.438239 786755 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.438251 786755 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc000ac6d20 13 D0713 00:08:00.438261 786755 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:08:00.438392 786755 task_signals.go:470] [ 1045: 1045] Notified of signal 23 D0713 00:08:00.438501 786755 task_signals.go:220] [ 1045: 1045] Signal 23: delivering to handler D0713 00:08:00.446913 786755 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.446962 786755 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000ac6d20 14 D0713 00:08:00.446985 786755 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:08:00.447109 786755 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.447166 786755 task_signals.go:204] [ 1045: 1049] Signal 1045, PID: 1049, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.447206 786755 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.447227 786755 task_signals.go:204] [ 1045: 1048] Signal 1045, PID: 1048, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.447253 786755 task_signals.go:204] [ 1045: 1046] Signal 1045, PID: 1046, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.447258 786755 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.447285 786755 task_signals.go:204] [ 1045: 1047] Signal 1045, PID: 1047, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.447309 786755 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.447316 786755 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.447333 786755 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.447418 786755 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.447451 786755 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.447467 786755 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.447477 786755 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.447482 786755 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.447493 786755 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.448870 786755 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.448904 786755 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.448920 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.448993 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.449006 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.449234 786755 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.449918 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.451409 786755 syscalls.go:262] [ 1050: 1050] Allocating stack with size of 8388608 bytes D0713 00:08:00.451564 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.452965 786755 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.453010 786755 usertrap_amd64.go:106] [ 1050: 1050] Map a usertrap vma at 65000 D0713 00:08:00.453209 786755 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0008732c0 1 D0713 00:08:00.453282 786755 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:08:00.453846 786755 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.453872 786755 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0008732c0 2 D0713 00:08:00.453892 786755 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:08:00.454566 786755 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.454591 786755 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0008732c0 3 D0713 00:08:00.454605 786755 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:08:00.462213 786755 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.462251 786755 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0008732c0 4 D0713 00:08:00.462265 786755 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:08:00.463594 786755 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.463627 786755 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0008732c0 5 D0713 00:08:00.463647 786755 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:08:00.463714 786755 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.463723 786755 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0008732c0 6 D0713 00:08:00.463729 786755 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:08:00.464092 786755 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.464117 786755 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0008732c0 7 D0713 00:08:00.464130 786755 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:08:00.464656 786755 usertrap_amd64.go:212] [ 1050: 1051] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.464683 786755 usertrap_amd64.go:122] [ 1050: 1051] Allocate a new trap: 0xc0008732c0 8 D0713 00:08:00.464693 786755 usertrap_amd64.go:225] [ 1050: 1051] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:08:00.464885 786755 usertrap_amd64.go:212] [ 1050: 1051] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.464913 786755 usertrap_amd64.go:122] [ 1050: 1051] Allocate a new trap: 0xc0008732c0 9 D0713 00:08:00.464925 786755 usertrap_amd64.go:225] [ 1050: 1051] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:08:00.465241 786755 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.465292 786755 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0008732c0 10 D0713 00:08:00.465312 786755 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:08:00.473692 786755 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.473714 786755 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0008732c0 11 D0713 00:08:00.473724 786755 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:08:00.476313 786755 usertrap_amd64.go:212] [ 1050: 1051] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.476346 786755 usertrap_amd64.go:122] [ 1050: 1051] Allocate a new trap: 0xc0008732c0 12 D0713 00:08:00.476362 786755 usertrap_amd64.go:225] [ 1050: 1051] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:08:00.476497 786755 usertrap_amd64.go:212] [ 1050: 1051] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.476529 786755 usertrap_amd64.go:122] [ 1050: 1051] Allocate a new trap: 0xc0008732c0 13 D0713 00:08:00.476537 786755 usertrap_amd64.go:225] [ 1050: 1051] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:08:00.476604 786755 task_signals.go:470] [ 1050: 1050] Notified of signal 23 D0713 00:08:00.476695 786755 task_signals.go:220] [ 1050: 1050] Signal 23: delivering to handler I0713 00:08:00.485223 786755 compat.go:120] Unsupported syscall sys_440(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_440 for more information. D0713 00:08:00.485367 786755 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.485391 786755 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0008732c0 14 D0713 00:08:00.485412 786755 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:08:00.485455 786755 task_exit.go:204] [ 1050: 1050] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.485491 786755 task_exit.go:204] [ 1050: 1050] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.485513 786755 task_signals.go:204] [ 1050: 1051] Signal 1050, PID: 1051, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.485527 786755 task_exit.go:204] [ 1050: 1051] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.485535 786755 task_exit.go:204] [ 1050: 1051] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.485541 786755 task_exit.go:204] [ 1050: 1051] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.485556 786755 task_signals.go:204] [ 1050: 1052] Signal 1050, PID: 1052, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.485567 786755 task_exit.go:204] [ 1050: 1052] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.485575 786755 task_exit.go:204] [ 1050: 1052] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.485581 786755 task_exit.go:204] [ 1050: 1052] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.485595 786755 task_signals.go:204] [ 1050: 1053] Signal 1050, PID: 1053, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.485614 786755 task_exit.go:204] [ 1050: 1053] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.485622 786755 task_exit.go:204] [ 1050: 1053] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.485627 786755 task_exit.go:204] [ 1050: 1053] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.485655 786755 task_signals.go:204] [ 1050: 1054] Signal 1050, PID: 1054, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.485676 786755 task_exit.go:204] [ 1050: 1054] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.486954 786755 task_exit.go:204] [ 1050: 1054] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.487034 786755 task_exit.go:204] [ 1050: 1054] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.487094 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.487222 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.487263 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.487389 786755 task_exit.go:204] [ 1050: 1050] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.488127 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.489713 786755 syscalls.go:262] [ 1055: 1055] Allocating stack with size of 8388608 bytes D0713 00:08:00.489843 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.491333 786755 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.491428 786755 usertrap_amd64.go:106] [ 1055: 1055] Map a usertrap vma at 69000 D0713 00:08:00.491861 786755 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc000ac7080 1 D0713 00:08:00.491899 786755 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:08:00.492212 786755 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.492270 786755 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc000ac7080 2 D0713 00:08:00.492317 786755 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:08:00.493090 786755 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.493138 786755 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc000ac7080 3 D0713 00:08:00.493161 786755 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:08:00.507029 786755 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.507070 786755 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc000ac7080 4 D0713 00:08:00.507085 786755 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:08:00.508495 786755 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.508531 786755 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc000ac7080 5 D0713 00:08:00.508544 786755 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:08:00.508595 786755 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.508603 786755 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc000ac7080 6 D0713 00:08:00.508611 786755 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:08:00.508899 786755 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.508927 786755 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc000ac7080 7 D0713 00:08:00.508973 786755 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:08:00.509221 786755 usertrap_amd64.go:212] [ 1055: 1056] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.509245 786755 usertrap_amd64.go:122] [ 1055: 1056] Allocate a new trap: 0xc000ac7080 8 D0713 00:08:00.509254 786755 usertrap_amd64.go:225] [ 1055: 1056] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:08:00.509482 786755 usertrap_amd64.go:212] [ 1055: 1056] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.509512 786755 usertrap_amd64.go:122] [ 1055: 1056] Allocate a new trap: 0xc000ac7080 9 D0713 00:08:00.509525 786755 usertrap_amd64.go:225] [ 1055: 1056] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:08:00.509713 786755 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.509733 786755 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc000ac7080 10 D0713 00:08:00.509743 786755 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:08:00.519327 786755 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.519360 786755 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc000ac7080 11 D0713 00:08:00.519371 786755 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:08:00.522143 786755 usertrap_amd64.go:212] [ 1055: 1056] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.522180 786755 usertrap_amd64.go:122] [ 1055: 1056] Allocate a new trap: 0xc000ac7080 12 D0713 00:08:00.522197 786755 usertrap_amd64.go:225] [ 1055: 1056] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:08:00.522229 786755 usertrap_amd64.go:212] [ 1055: 1056] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.522252 786755 usertrap_amd64.go:122] [ 1055: 1056] Allocate a new trap: 0xc000ac7080 13 D0713 00:08:00.522263 786755 usertrap_amd64.go:225] [ 1055: 1056] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:08:00.522367 786755 task_signals.go:470] [ 1055: 1055] Notified of signal 23 D0713 00:08:00.522472 786755 task_signals.go:220] [ 1055: 1055] Signal 23: delivering to handler I0713 00:08:00.531770 786755 compat.go:120] Unsupported syscall sys_448(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_448 for more information. D0713 00:08:00.531867 786755 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.531905 786755 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc000ac7080 14 D0713 00:08:00.531921 786755 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:08:00.531968 786755 task_exit.go:204] [ 1055: 1055] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.532011 786755 task_exit.go:204] [ 1055: 1055] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.532034 786755 task_signals.go:204] [ 1055: 1059] Signal 1055, PID: 1059, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.532058 786755 task_signals.go:204] [ 1055: 1058] Signal 1055, PID: 1058, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.532060 786755 task_exit.go:204] [ 1055: 1059] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.532041 786755 task_signals.go:204] [ 1055: 1056] Signal 1055, PID: 1056, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.532076 786755 task_exit.go:204] [ 1055: 1058] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.532085 786755 task_exit.go:204] [ 1055: 1056] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.532104 786755 task_exit.go:204] [ 1055: 1056] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.532150 786755 task_exit.go:204] [ 1055: 1056] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.532182 786755 task_exit.go:204] [ 1055: 1058] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.532200 786755 task_exit.go:204] [ 1055: 1058] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.532222 786755 task_signals.go:204] [ 1055: 1057] Signal 1055, PID: 1057, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.532256 786755 task_exit.go:204] [ 1055: 1059] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.532264 786755 task_exit.go:204] [ 1055: 1059] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.532275 786755 task_exit.go:204] [ 1055: 1057] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.533907 786755 task_exit.go:204] [ 1055: 1057] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.533954 786755 task_exit.go:204] [ 1055: 1057] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.533973 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.534024 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.534045 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.534106 786755 task_exit.go:204] [ 1055: 1055] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.534876 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.536425 786755 syscalls.go:262] [ 1060: 1060] Allocating stack with size of 8388608 bytes D0713 00:08:00.536560 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.537827 786755 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.537877 786755 usertrap_amd64.go:106] [ 1060: 1060] Map a usertrap vma at 61000 D0713 00:08:00.537970 786755 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc000604900 1 D0713 00:08:00.537995 786755 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:08:00.538428 786755 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.538490 786755 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc000604900 2 D0713 00:08:00.538520 786755 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:08:00.539322 786755 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.539349 786755 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc000604900 3 D0713 00:08:00.539364 786755 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:08:00.547820 786755 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.547856 786755 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc000604900 4 D0713 00:08:00.547871 786755 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:08:00.549365 786755 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.549416 786755 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc000604900 5 D0713 00:08:00.549441 786755 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:08:00.549644 786755 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.549670 786755 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc000604900 6 D0713 00:08:00.549688 786755 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:08:00.550005 786755 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.550035 786755 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc000604900 7 D0713 00:08:00.550047 786755 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:08:00.550292 786755 usertrap_amd64.go:212] [ 1060: 1061] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.550313 786755 usertrap_amd64.go:122] [ 1060: 1061] Allocate a new trap: 0xc000604900 8 D0713 00:08:00.550326 786755 usertrap_amd64.go:225] [ 1060: 1061] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:08:00.550935 786755 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.550986 786755 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc000604900 9 D0713 00:08:00.551005 786755 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:08:00.551032 786755 usertrap_amd64.go:212] [ 1060: 1061] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.551041 786755 usertrap_amd64.go:122] [ 1060: 1061] Allocate a new trap: 0xc000604900 10 D0713 00:08:00.551052 786755 usertrap_amd64.go:225] [ 1060: 1061] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:08:00.551370 786755 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b6e0:sysno 24 D0713 00:08:00.551403 786755 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc000604900 11 D0713 00:08:00.551426 786755 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b6e0 trap addr 61370 ([184 24 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:08:00.566531 786755 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.566572 786755 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc000604900 12 D0713 00:08:00.566586 786755 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:08:00.581190 786755 usertrap_amd64.go:212] [ 1060: 1061] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.581249 786755 usertrap_amd64.go:122] [ 1060: 1061] Allocate a new trap: 0xc000604900 13 D0713 00:08:00.581268 786755 usertrap_amd64.go:225] [ 1060: 1061] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:08:00.581502 786755 usertrap_amd64.go:212] [ 1060: 1061] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.581527 786755 usertrap_amd64.go:122] [ 1060: 1061] Allocate a new trap: 0xc000604900 14 D0713 00:08:00.581536 786755 usertrap_amd64.go:225] [ 1060: 1061] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:08:00.581589 786755 task_signals.go:470] [ 1060: 1060] Notified of signal 23 D0713 00:08:00.581801 786755 task_signals.go:220] [ 1060: 1060] Signal 23: delivering to handler I0713 00:08:00.586232 786755 compat.go:120] Unsupported syscall process_vm_readv(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_readv for more information. D0713 00:08:00.586384 786755 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.586413 786755 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc000604900 15 D0713 00:08:00.586426 786755 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 00:08:00.586543 786755 task_exit.go:204] [ 1060: 1060] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.586576 786755 task_exit.go:204] [ 1060: 1060] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.586607 786755 task_signals.go:204] [ 1060: 1061] Signal 1060, PID: 1061, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.586633 786755 task_exit.go:204] [ 1060: 1061] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.586648 786755 task_exit.go:204] [ 1060: 1061] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.586654 786755 task_exit.go:204] [ 1060: 1061] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.586674 786755 task_signals.go:204] [ 1060: 1062] Signal 1060, PID: 1062, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.586692 786755 task_exit.go:204] [ 1060: 1062] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.586706 786755 task_exit.go:204] [ 1060: 1062] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.586711 786755 task_exit.go:204] [ 1060: 1062] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.586727 786755 task_signals.go:204] [ 1060: 1063] Signal 1060, PID: 1063, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.586737 786755 task_exit.go:204] [ 1060: 1063] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.586743 786755 task_exit.go:204] [ 1060: 1063] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.586748 786755 task_exit.go:204] [ 1060: 1063] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.587010 786755 task_signals.go:204] [ 1060: 1064] Signal 1060, PID: 1064, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.587032 786755 task_exit.go:204] [ 1060: 1064] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.588484 786755 task_exit.go:204] [ 1060: 1064] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.588514 786755 task_exit.go:204] [ 1060: 1064] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.588528 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.591238 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.591280 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.591491 786755 task_exit.go:204] [ 1060: 1060] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.591991 786755 task_stop.go:118] [ 6: 23] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.593299 786755 syscalls.go:262] [ 1065: 1065] Allocating stack with size of 8388608 bytes D0713 00:08:00.593409 786755 task_stop.go:138] [ 6: 23] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.594838 786755 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.595014 786755 usertrap_amd64.go:106] [ 1065: 1065] Map a usertrap vma at 66000 D0713 00:08:00.595115 786755 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc000604a50 1 D0713 00:08:00.595179 786755 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:08:00.595839 786755 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.595901 786755 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc000604a50 2 D0713 00:08:00.595959 786755 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:08:00.597148 786755 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.597193 786755 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc000604a50 3 D0713 00:08:00.597212 786755 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:08:00.604393 786755 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.604428 786755 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc000604a50 4 D0713 00:08:00.604440 786755 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:08:00.605955 786755 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.605987 786755 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc000604a50 5 D0713 00:08:00.605998 786755 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:08:00.606189 786755 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.606221 786755 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc000604a50 6 D0713 00:08:00.606230 786755 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:08:00.606831 786755 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.606883 786755 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc000604a50 7 D0713 00:08:00.606903 786755 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:08:00.607321 786755 usertrap_amd64.go:212] [ 1065: 1066] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.607358 786755 usertrap_amd64.go:122] [ 1065: 1066] Allocate a new trap: 0xc000604a50 8 D0713 00:08:00.607371 786755 usertrap_amd64.go:225] [ 1065: 1066] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:08:00.607903 786755 usertrap_amd64.go:212] [ 1065: 1066] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.607929 786755 usertrap_amd64.go:122] [ 1065: 1066] Allocate a new trap: 0xc000604a50 9 D0713 00:08:00.607940 786755 usertrap_amd64.go:225] [ 1065: 1066] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:08:00.608244 786755 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.608278 786755 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc000604a50 10 D0713 00:08:00.608288 786755 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:08:00.616001 786755 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.616034 786755 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc000604a50 11 D0713 00:08:00.616045 786755 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:08:00.629246 786755 usertrap_amd64.go:212] [ 1065: 1066] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.629266 786755 usertrap_amd64.go:122] [ 1065: 1066] Allocate a new trap: 0xc000604a50 12 D0713 00:08:00.629279 786755 usertrap_amd64.go:225] [ 1065: 1066] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:08:00.629387 786755 usertrap_amd64.go:212] [ 1065: 1066] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.629414 786755 usertrap_amd64.go:122] [ 1065: 1066] Allocate a new trap: 0xc000604a50 13 D0713 00:08:00.629422 786755 usertrap_amd64.go:225] [ 1065: 1066] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:08:00.629485 786755 task_signals.go:470] [ 1065: 1065] Notified of signal 23 D0713 00:08:00.629640 786755 task_signals.go:220] [ 1065: 1065] Signal 23: delivering to handler I0713 00:08:00.638423 786755 compat.go:120] Unsupported syscall process_vm_writev(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_writev for more information. D0713 00:08:00.638563 786755 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.638577 786755 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc000604a50 14 D0713 00:08:00.638589 786755 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:08:00.638797 786755 task_exit.go:204] [ 1065: 1065] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.638833 786755 task_exit.go:204] [ 1065: 1065] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.638873 786755 task_signals.go:204] [ 1065: 1067] Signal 1065, PID: 1067, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.638887 786755 task_exit.go:204] [ 1065: 1067] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.638896 786755 task_exit.go:204] [ 1065: 1067] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.638900 786755 task_exit.go:204] [ 1065: 1067] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.638920 786755 task_signals.go:204] [ 1065: 1068] Signal 1065, PID: 1068, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.638942 786755 task_exit.go:204] [ 1065: 1068] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.638954 786755 task_exit.go:204] [ 1065: 1068] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.638959 786755 task_exit.go:204] [ 1065: 1068] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.638970 786755 task_signals.go:204] [ 1065: 1069] Signal 1065, PID: 1069, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.638980 786755 task_exit.go:204] [ 1065: 1069] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.638987 786755 task_exit.go:204] [ 1065: 1069] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.638993 786755 task_exit.go:204] [ 1065: 1069] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.639038 786755 task_signals.go:204] [ 1065: 1066] Signal 1065, PID: 1066, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.639050 786755 task_exit.go:204] [ 1065: 1066] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.640266 786755 task_exit.go:204] [ 1065: 1066] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.640302 786755 task_exit.go:204] [ 1065: 1066] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.640316 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.640813 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.640851 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.641077 786755 task_exit.go:204] [ 1065: 1065] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.641971 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.643499 786755 syscalls.go:262] [ 1070: 1070] Allocating stack with size of 8388608 bytes D0713 00:08:00.643585 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.645153 786755 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.645199 786755 usertrap_amd64.go:106] [ 1070: 1070] Map a usertrap vma at 68000 D0713 00:08:00.645265 786755 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc000604c30 1 D0713 00:08:00.645292 786755 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:08:00.645755 786755 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.645800 786755 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc000604c30 2 D0713 00:08:00.645829 786755 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:08:00.646607 786755 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.646641 786755 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc000604c30 3 D0713 00:08:00.646656 786755 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:08:00.654028 786755 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.654060 786755 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc000604c30 4 D0713 00:08:00.654073 786755 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:08:00.655513 786755 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.655544 786755 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc000604c30 5 D0713 00:08:00.655560 786755 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:08:00.655676 786755 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.655709 786755 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc000604c30 6 D0713 00:08:00.655721 786755 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:08:00.656271 786755 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.656290 786755 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc000604c30 7 D0713 00:08:00.656302 786755 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:08:00.657007 786755 usertrap_amd64.go:212] [ 1070: 1071] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.657032 786755 usertrap_amd64.go:122] [ 1070: 1071] Allocate a new trap: 0xc000604c30 8 D0713 00:08:00.657047 786755 usertrap_amd64.go:225] [ 1070: 1071] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:08:00.657220 786755 usertrap_amd64.go:212] [ 1070: 1071] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.657256 786755 usertrap_amd64.go:122] [ 1070: 1071] Allocate a new trap: 0xc000604c30 9 D0713 00:08:00.657269 786755 usertrap_amd64.go:225] [ 1070: 1071] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:08:00.657346 786755 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.657378 786755 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc000604c30 10 D0713 00:08:00.657391 786755 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:08:00.658052 786755 usertrap_amd64.go:212] [ 1070: 1071] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.658079 786755 usertrap_amd64.go:122] [ 1070: 1071] Allocate a new trap: 0xc000604c30 11 D0713 00:08:00.658093 786755 usertrap_amd64.go:225] [ 1070: 1071] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:08:00.658127 786755 usertrap_amd64.go:212] [ 1070: 1071] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.658136 786755 usertrap_amd64.go:122] [ 1070: 1071] Allocate a new trap: 0xc000604c30 12 D0713 00:08:00.658145 786755 usertrap_amd64.go:225] [ 1070: 1071] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:08:00.658250 786755 task_signals.go:470] [ 1070: 1070] Notified of signal 23 D0713 00:08:00.658300 786755 task_signals.go:220] [ 1070: 1070] Signal 23: delivering to handler D0713 00:08:00.666351 786755 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.666380 786755 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc000604c30 13 D0713 00:08:00.666388 786755 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:08:00.669130 786755 task_signals.go:470] [ 1070: 1070] Notified of signal 23 D0713 00:08:00.669221 786755 task_signals.go:220] [ 1070: 1070] Signal 23: delivering to handler D0713 00:08:00.678079 786755 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.678113 786755 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc000604c30 14 D0713 00:08:00.678129 786755 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:08:00.678213 786755 task_exit.go:204] [ 1070: 1070] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.678242 786755 task_exit.go:204] [ 1070: 1070] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.678263 786755 task_signals.go:204] [ 1070: 1074] Signal 1070, PID: 1074, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.678288 786755 task_exit.go:204] [ 1070: 1074] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.678297 786755 task_exit.go:204] [ 1070: 1074] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.678304 786755 task_exit.go:204] [ 1070: 1074] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.678246 786755 task_signals.go:204] [ 1070: 1073] Signal 1070, PID: 1073, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.678322 786755 task_exit.go:204] [ 1070: 1073] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.678330 786755 task_signals.go:204] [ 1070: 1072] Signal 1070, PID: 1072, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.678350 786755 task_exit.go:204] [ 1070: 1073] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.678357 786755 task_exit.go:204] [ 1070: 1073] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.678315 786755 task_signals.go:204] [ 1070: 1071] Signal 1070, PID: 1071, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.678371 786755 task_exit.go:204] [ 1070: 1071] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.678380 786755 task_exit.go:204] [ 1070: 1071] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.678386 786755 task_exit.go:204] [ 1070: 1071] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.678396 786755 task_exit.go:204] [ 1070: 1072] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.680482 786755 task_exit.go:204] [ 1070: 1072] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.680513 786755 task_exit.go:204] [ 1070: 1072] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.680534 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.680572 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.680584 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.680652 786755 task_exit.go:204] [ 1070: 1070] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.681350 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.682777 786755 syscalls.go:262] [ 1075: 1075] Allocating stack with size of 8388608 bytes D0713 00:08:00.682972 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.684462 786755 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.684510 786755 usertrap_amd64.go:106] [ 1075: 1075] Map a usertrap vma at 67000 D0713 00:08:00.684652 786755 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc000604db0 1 D0713 00:08:00.684702 786755 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:08:00.685049 786755 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.685080 786755 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc000604db0 2 D0713 00:08:00.685091 786755 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:08:00.685728 786755 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.685759 786755 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc000604db0 3 D0713 00:08:00.685774 786755 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:08:00.692795 786755 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.692898 786755 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc000604db0 4 D0713 00:08:00.692922 786755 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:08:00.694380 786755 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.694429 786755 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc000604db0 5 D0713 00:08:00.694447 786755 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:08:00.694535 786755 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.694554 786755 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc000604db0 6 D0713 00:08:00.694564 786755 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:08:00.694846 786755 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.694860 786755 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc000604db0 7 D0713 00:08:00.694866 786755 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:08:00.695023 786755 usertrap_amd64.go:212] [ 1075: 1076] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.695052 786755 usertrap_amd64.go:122] [ 1075: 1076] Allocate a new trap: 0xc000604db0 8 D0713 00:08:00.695063 786755 usertrap_amd64.go:225] [ 1075: 1076] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:08:00.695328 786755 usertrap_amd64.go:212] [ 1075: 1076] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.695353 786755 usertrap_amd64.go:122] [ 1075: 1076] Allocate a new trap: 0xc000604db0 9 D0713 00:08:00.695361 786755 usertrap_amd64.go:225] [ 1075: 1076] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:08:00.695384 786755 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.695389 786755 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc000604db0 10 D0713 00:08:00.695393 786755 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:08:00.695567 786755 usertrap_amd64.go:212] [ 1075: 1076] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.695590 786755 usertrap_amd64.go:122] [ 1075: 1076] Allocate a new trap: 0xc000604db0 11 D0713 00:08:00.695600 786755 usertrap_amd64.go:225] [ 1075: 1076] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:08:00.695689 786755 usertrap_amd64.go:212] [ 1075: 1076] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.695722 786755 usertrap_amd64.go:122] [ 1075: 1076] Allocate a new trap: 0xc000604db0 12 D0713 00:08:00.695752 786755 usertrap_amd64.go:225] [ 1075: 1076] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:08:00.695887 786755 task_signals.go:470] [ 1075: 1078] Notified of signal 23 D0713 00:08:00.695944 786755 task_signals.go:179] [ 1075: 1078] Restarting syscall 202: interrupted by signal 23 D0713 00:08:00.695956 786755 task_signals.go:220] [ 1075: 1078] Signal 23: delivering to handler D0713 00:08:00.704222 786755 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.704262 786755 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc000604db0 13 D0713 00:08:00.704278 786755 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:08:00.706913 786755 task_signals.go:470] [ 1075: 1075] Notified of signal 23 D0713 00:08:00.706987 786755 task_signals.go:220] [ 1075: 1075] Signal 23: delivering to handler D0713 00:08:00.716621 786755 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.716671 786755 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc000604db0 14 D0713 00:08:00.716686 786755 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:08:00.716752 786755 task_exit.go:204] [ 1075: 1075] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.716791 786755 task_exit.go:204] [ 1075: 1075] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.716830 786755 task_signals.go:204] [ 1075: 1078] Signal 1075, PID: 1078, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.717027 786755 task_exit.go:204] [ 1075: 1078] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.717076 786755 task_exit.go:204] [ 1075: 1078] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.717088 786755 task_exit.go:204] [ 1075: 1078] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.716815 786755 task_signals.go:204] [ 1075: 1076] Signal 1075, PID: 1076, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.717114 786755 task_exit.go:204] [ 1075: 1076] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.717122 786755 task_exit.go:204] [ 1075: 1076] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.717130 786755 task_exit.go:204] [ 1075: 1076] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.716837 786755 task_signals.go:204] [ 1075: 1079] Signal 1075, PID: 1079, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.717150 786755 task_exit.go:204] [ 1075: 1079] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.717159 786755 task_exit.go:204] [ 1075: 1079] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.717164 786755 task_exit.go:204] [ 1075: 1079] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.716869 786755 task_signals.go:204] [ 1075: 1077] Signal 1075, PID: 1077, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.717193 786755 task_exit.go:204] [ 1075: 1077] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.718910 786755 task_exit.go:204] [ 1075: 1077] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.719050 786755 task_exit.go:204] [ 1075: 1077] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.719082 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.719111 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.719130 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.719215 786755 task_exit.go:204] [ 1075: 1075] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.719402 786755 task_signals.go:470] [ 6: 18] Notified of signal 23 D0713 00:08:00.719479 786755 task_signals.go:220] [ 6: 18] Signal 23: delivering to handler D0713 00:08:00.720834 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.722312 786755 syscalls.go:262] [ 1080: 1080] Allocating stack with size of 8388608 bytes D0713 00:08:00.722476 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.723799 786755 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.723845 786755 usertrap_amd64.go:106] [ 1080: 1080] Map a usertrap vma at 6a000 D0713 00:08:00.723907 786755 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc000873920 1 D0713 00:08:00.723932 786755 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:08:00.724448 786755 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.724469 786755 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc000873920 2 D0713 00:08:00.724476 786755 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:08:00.725264 786755 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.725301 786755 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc000873920 3 D0713 00:08:00.725316 786755 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:08:00.733102 786755 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.733123 786755 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc000873920 4 D0713 00:08:00.733136 786755 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:08:00.734299 786755 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.734324 786755 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc000873920 5 D0713 00:08:00.734337 786755 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:08:00.734562 786755 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.734576 786755 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc000873920 6 D0713 00:08:00.734586 786755 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:08:00.735304 786755 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.735327 786755 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc000873920 7 D0713 00:08:00.735336 786755 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:08:00.735550 786755 usertrap_amd64.go:212] [ 1080: 1081] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.735581 786755 usertrap_amd64.go:122] [ 1080: 1081] Allocate a new trap: 0xc000873920 8 D0713 00:08:00.735618 786755 usertrap_amd64.go:225] [ 1080: 1081] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:08:00.735791 786755 usertrap_amd64.go:212] [ 1080: 1081] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.735815 786755 usertrap_amd64.go:122] [ 1080: 1081] Allocate a new trap: 0xc000873920 9 D0713 00:08:00.735830 786755 usertrap_amd64.go:225] [ 1080: 1081] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:08:00.735873 786755 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.735889 786755 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc000873920 10 D0713 00:08:00.735897 786755 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:08:00.743908 786755 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.743949 786755 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc000873920 11 D0713 00:08:00.743972 786755 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:08:00.746335 786755 usertrap_amd64.go:212] [ 1080: 1081] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.746368 786755 usertrap_amd64.go:122] [ 1080: 1081] Allocate a new trap: 0xc000873920 12 D0713 00:08:00.746381 786755 usertrap_amd64.go:225] [ 1080: 1081] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:08:00.746407 786755 usertrap_amd64.go:212] [ 1080: 1081] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.746415 786755 usertrap_amd64.go:122] [ 1080: 1081] Allocate a new trap: 0xc000873920 13 D0713 00:08:00.746423 786755 usertrap_amd64.go:225] [ 1080: 1081] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:08:00.746442 786755 task_signals.go:470] [ 1080: 1080] Notified of signal 23 D0713 00:08:00.746534 786755 task_signals.go:220] [ 1080: 1080] Signal 23: delivering to handler D0713 00:08:00.754605 786755 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.754666 786755 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc000873920 14 D0713 00:08:00.754684 786755 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:08:00.754743 786755 task_exit.go:204] [ 1080: 1080] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.754783 786755 task_exit.go:204] [ 1080: 1080] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.754810 786755 task_signals.go:204] [ 1080: 1082] Signal 1080, PID: 1082, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.754804 786755 task_signals.go:204] [ 1080: 1084] Signal 1080, PID: 1084, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.754830 786755 task_exit.go:204] [ 1080: 1082] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.754809 786755 task_signals.go:204] [ 1080: 1081] Signal 1080, PID: 1081, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.754841 786755 task_signals.go:204] [ 1080: 1083] Signal 1080, PID: 1083, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.754856 786755 task_exit.go:204] [ 1080: 1082] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.754864 786755 task_exit.go:204] [ 1080: 1082] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.754881 786755 task_exit.go:204] [ 1080: 1081] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.754963 786755 task_exit.go:204] [ 1080: 1081] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.754985 786755 task_exit.go:204] [ 1080: 1081] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.755005 786755 task_exit.go:204] [ 1080: 1084] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.755059 786755 task_exit.go:204] [ 1080: 1084] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.755066 786755 task_exit.go:204] [ 1080: 1084] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.755078 786755 task_exit.go:204] [ 1080: 1083] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.756463 786755 task_exit.go:204] [ 1080: 1083] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.756495 786755 task_exit.go:204] [ 1080: 1083] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.756508 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.756535 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.756544 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.756658 786755 task_exit.go:204] [ 1080: 1080] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.757319 786755 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.758729 786755 syscalls.go:262] [ 1085: 1085] Allocating stack with size of 8388608 bytes D0713 00:08:00.758824 786755 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.760178 786755 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.760216 786755 usertrap_amd64.go:106] [ 1085: 1085] Map a usertrap vma at 62000 D0713 00:08:00.760319 786755 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc000e1f080 1 D0713 00:08:00.760350 786755 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:08:00.761267 786755 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.761324 786755 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc000e1f080 2 D0713 00:08:00.761339 786755 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:08:00.762360 786755 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.762387 786755 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc000e1f080 3 D0713 00:08:00.762398 786755 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:08:00.769976 786755 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.770020 786755 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc000e1f080 4 D0713 00:08:00.770045 786755 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:08:00.771336 786755 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.771363 786755 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc000e1f080 5 D0713 00:08:00.771374 786755 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:08:00.771443 786755 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.771454 786755 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc000e1f080 6 D0713 00:08:00.771459 786755 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:08:00.771622 786755 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.771634 786755 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc000e1f080 7 D0713 00:08:00.771639 786755 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:08:00.771783 786755 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.771810 786755 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc000e1f080 8 D0713 00:08:00.771821 786755 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:08:00.772014 786755 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.772040 786755 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc000e1f080 9 D0713 00:08:00.772051 786755 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:08:00.772063 786755 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.772068 786755 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc000e1f080 10 D0713 00:08:00.772075 786755 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:08:00.779940 786755 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.779969 786755 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc000e1f080 11 D0713 00:08:00.779981 786755 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:08:00.783594 786755 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.783687 786755 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc000e1f080 12 D0713 00:08:00.783746 786755 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:08:00.783802 786755 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.783819 786755 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc000e1f080 13 D0713 00:08:00.783828 786755 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:08:00.783891 786755 task_signals.go:470] [ 1085: 1085] Notified of signal 23 D0713 00:08:00.784015 786755 task_signals.go:220] [ 1085: 1085] Signal 23: delivering to handler D0713 00:08:00.791947 786755 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.791988 786755 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc000e1f080 14 D0713 00:08:00.791999 786755 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:08:00.792053 786755 task_exit.go:204] [ 1085: 1085] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.792073 786755 task_exit.go:204] [ 1085: 1085] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.792109 786755 task_signals.go:204] [ 1085: 1088] Signal 1085, PID: 1088, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.792122 786755 task_signals.go:204] [ 1085: 1087] Signal 1085, PID: 1087, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.792131 786755 task_signals.go:204] [ 1085: 1089] Signal 1085, PID: 1089, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.792104 786755 task_signals.go:204] [ 1085: 1086] Signal 1085, PID: 1086, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.792128 786755 task_exit.go:204] [ 1085: 1088] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.792158 786755 task_exit.go:204] [ 1085: 1088] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.792166 786755 task_exit.go:204] [ 1085: 1088] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.792183 786755 task_exit.go:204] [ 1085: 1087] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.792188 786755 task_exit.go:204] [ 1085: 1087] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.792192 786755 task_exit.go:204] [ 1085: 1087] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.792199 786755 task_exit.go:204] [ 1085: 1089] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.792212 786755 task_exit.go:204] [ 1085: 1089] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.792219 786755 task_exit.go:204] [ 1085: 1089] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.792227 786755 task_exit.go:204] [ 1085: 1086] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.793754 786755 task_exit.go:204] [ 1085: 1086] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.793791 786755 task_exit.go:204] [ 1085: 1086] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.793803 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.793829 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.793841 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.793939 786755 task_exit.go:204] [ 1085: 1085] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.794868 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.796253 786755 syscalls.go:262] [ 1090: 1090] Allocating stack with size of 8388608 bytes D0713 00:08:00.796352 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.796879 786755 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.796898 786755 usertrap_amd64.go:106] [ 1090: 1090] Map a usertrap vma at 65000 D0713 00:08:00.796982 786755 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc000ac7a40 1 D0713 00:08:00.797019 786755 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:08:00.797290 786755 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.797303 786755 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc000ac7a40 2 D0713 00:08:00.797313 786755 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:08:00.798057 786755 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.798074 786755 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc000ac7a40 3 D0713 00:08:00.798087 786755 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:08:00.807854 786755 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.807890 786755 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc000ac7a40 4 D0713 00:08:00.807909 786755 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:08:00.809364 786755 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.809402 786755 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc000ac7a40 5 D0713 00:08:00.809414 786755 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:08:00.809477 786755 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.809483 786755 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc000ac7a40 6 D0713 00:08:00.809490 786755 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:08:00.809840 786755 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.809859 786755 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc000ac7a40 7 D0713 00:08:00.809866 786755 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:08:00.810030 786755 usertrap_amd64.go:212] [ 1090: 1091] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.810048 786755 usertrap_amd64.go:122] [ 1090: 1091] Allocate a new trap: 0xc000ac7a40 8 D0713 00:08:00.810058 786755 usertrap_amd64.go:225] [ 1090: 1091] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:08:00.810301 786755 usertrap_amd64.go:212] [ 1090: 1091] Found the pattern at ip 46b6e0:sysno 24 D0713 00:08:00.810333 786755 usertrap_amd64.go:122] [ 1090: 1091] Allocate a new trap: 0xc000ac7a40 9 D0713 00:08:00.810351 786755 usertrap_amd64.go:225] [ 1090: 1091] Apply the binary patch addr 46b6e0 trap addr 652d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:08:00.810473 786755 usertrap_amd64.go:212] [ 1090: 1091] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.810496 786755 usertrap_amd64.go:122] [ 1090: 1091] Allocate a new trap: 0xc000ac7a40 10 D0713 00:08:00.810508 786755 usertrap_amd64.go:225] [ 1090: 1091] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:08:00.810601 786755 usertrap_amd64.go:212] [ 1090: 1091] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.810630 786755 usertrap_amd64.go:122] [ 1090: 1091] Allocate a new trap: 0xc000ac7a40 11 D0713 00:08:00.810640 786755 usertrap_amd64.go:225] [ 1090: 1091] Apply the binary patch addr 46af76 trap addr 65370 ([184 35 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:08:00.818906 786755 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.818943 786755 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc000ac7a40 12 D0713 00:08:00.818956 786755 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46af29 trap addr 653c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:08:00.822102 786755 usertrap_amd64.go:212] [ 1090: 1091] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.822128 786755 usertrap_amd64.go:122] [ 1090: 1091] Allocate a new trap: 0xc000ac7a40 13 D0713 00:08:00.822141 786755 usertrap_amd64.go:225] [ 1090: 1091] Apply the binary patch addr 46b020 trap addr 65410 ([184 39 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:08:00.822178 786755 usertrap_amd64.go:212] [ 1090: 1091] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.822195 786755 usertrap_amd64.go:122] [ 1090: 1091] Allocate a new trap: 0xc000ac7a40 14 D0713 00:08:00.822204 786755 usertrap_amd64.go:225] [ 1090: 1091] Apply the binary patch addr 46b04f trap addr 65460 ([184 234 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:08:00.822225 786755 task_signals.go:470] [ 1090: 1090] Notified of signal 23 D0713 00:08:00.822265 786755 task_signals.go:220] [ 1090: 1090] Signal 23: delivering to handler D0713 00:08:00.830431 786755 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.830458 786755 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc000ac7a40 15 D0713 00:08:00.830471 786755 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0713 00:08:00.830493 786755 task_exit.go:204] [ 1090: 1090] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.830514 786755 task_exit.go:204] [ 1090: 1090] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.830540 786755 task_signals.go:204] [ 1090: 1094] Signal 1090, PID: 1094, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.830561 786755 task_signals.go:204] [ 1090: 1091] Signal 1090, PID: 1091, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.830539 786755 task_signals.go:204] [ 1090: 1092] Signal 1090, PID: 1092, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.830540 786755 task_signals.go:204] [ 1090: 1093] Signal 1090, PID: 1093, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.830567 786755 task_exit.go:204] [ 1090: 1094] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.830619 786755 task_exit.go:204] [ 1090: 1094] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.830647 786755 task_exit.go:204] [ 1090: 1094] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.830672 786755 task_exit.go:204] [ 1090: 1091] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.830684 786755 task_exit.go:204] [ 1090: 1091] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.830691 786755 task_exit.go:204] [ 1090: 1091] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.830702 786755 task_exit.go:204] [ 1090: 1092] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.830737 786755 task_exit.go:204] [ 1090: 1092] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.830756 786755 task_exit.go:204] [ 1090: 1092] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.830784 786755 task_exit.go:204] [ 1090: 1093] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.832253 786755 task_exit.go:204] [ 1090: 1093] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.832287 786755 task_exit.go:204] [ 1090: 1093] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.832305 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.832336 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.832369 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.832433 786755 task_exit.go:204] [ 1090: 1090] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.834892 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.836083 786755 syscalls.go:262] [ 1095: 1095] Allocating stack with size of 8388608 bytes D0713 00:08:00.836188 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.837062 786755 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.837083 786755 usertrap_amd64.go:106] [ 1095: 1095] Map a usertrap vma at 61000 D0713 00:08:00.837152 786755 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc000604f00 1 D0713 00:08:00.837172 786755 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:08:00.839840 786755 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.839867 786755 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc000604f00 2 D0713 00:08:00.839878 786755 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:08:00.843362 786755 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.843374 786755 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc000604f00 3 D0713 00:08:00.843399 786755 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:08:00.850117 786755 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.850146 786755 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc000604f00 4 D0713 00:08:00.850157 786755 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:08:00.851777 786755 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.851828 786755 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc000604f00 5 D0713 00:08:00.851850 786755 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:08:00.851915 786755 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.851940 786755 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc000604f00 6 D0713 00:08:00.851960 786755 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:08:00.852449 786755 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.852506 786755 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc000604f00 7 D0713 00:08:00.852519 786755 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:08:00.852743 786755 usertrap_amd64.go:212] [ 1095: 1096] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.852757 786755 usertrap_amd64.go:122] [ 1095: 1096] Allocate a new trap: 0xc000604f00 8 D0713 00:08:00.852768 786755 usertrap_amd64.go:225] [ 1095: 1096] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:08:00.853095 786755 usertrap_amd64.go:212] [ 1095: 1096] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.853125 786755 usertrap_amd64.go:122] [ 1095: 1096] Allocate a new trap: 0xc000604f00 9 D0713 00:08:00.853138 786755 usertrap_amd64.go:225] [ 1095: 1096] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:08:00.853324 786755 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.853355 786755 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc000604f00 10 D0713 00:08:00.853368 786755 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:08:00.861896 786755 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.861927 786755 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc000604f00 11 D0713 00:08:00.861940 786755 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:08:00.864557 786755 usertrap_amd64.go:212] [ 1095: 1096] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.864586 786755 usertrap_amd64.go:122] [ 1095: 1096] Allocate a new trap: 0xc000604f00 12 D0713 00:08:00.864597 786755 usertrap_amd64.go:225] [ 1095: 1096] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:08:00.864646 786755 usertrap_amd64.go:212] [ 1095: 1096] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.864679 786755 usertrap_amd64.go:122] [ 1095: 1096] Allocate a new trap: 0xc000604f00 13 D0713 00:08:00.864690 786755 usertrap_amd64.go:225] [ 1095: 1096] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:08:00.864753 786755 task_signals.go:470] [ 1095: 1095] Notified of signal 23 D0713 00:08:00.864838 786755 task_signals.go:220] [ 1095: 1095] Signal 23: delivering to handler I0713 00:08:00.872615 786755 compat.go:120] Unsupported syscall quotactl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/quotactl for more information. D0713 00:08:00.872797 786755 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.872832 786755 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc000604f00 14 D0713 00:08:00.872846 786755 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:08:00.872910 786755 task_exit.go:204] [ 1095: 1095] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.872972 786755 task_exit.go:204] [ 1095: 1095] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.873014 786755 task_signals.go:204] [ 1095: 1096] Signal 1095, PID: 1096, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.873032 786755 task_exit.go:204] [ 1095: 1096] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.873041 786755 task_exit.go:204] [ 1095: 1096] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.873047 786755 task_exit.go:204] [ 1095: 1096] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.873072 786755 task_signals.go:204] [ 1095: 1097] Signal 1095, PID: 1097, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.873099 786755 task_exit.go:204] [ 1095: 1097] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.873108 786755 task_exit.go:204] [ 1095: 1097] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.873113 786755 task_exit.go:204] [ 1095: 1097] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.873129 786755 task_signals.go:204] [ 1095: 1098] Signal 1095, PID: 1098, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.873148 786755 task_exit.go:204] [ 1095: 1098] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.873156 786755 task_exit.go:204] [ 1095: 1098] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.873162 786755 task_exit.go:204] [ 1095: 1098] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.873192 786755 task_signals.go:204] [ 1095: 1099] Signal 1095, PID: 1099, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.873237 786755 task_exit.go:204] [ 1095: 1099] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.874762 786755 task_exit.go:204] [ 1095: 1099] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.874814 786755 task_exit.go:204] [ 1095: 1099] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.874835 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.874876 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.874895 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.874964 786755 task_exit.go:204] [ 1095: 1095] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.875617 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.877166 786755 syscalls.go:262] [ 1100: 1100] Allocating stack with size of 8388608 bytes D0713 00:08:00.877268 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.878963 786755 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.878995 786755 usertrap_amd64.go:106] [ 1100: 1100] Map a usertrap vma at 66000 D0713 00:08:00.879260 786755 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc000604fc0 1 D0713 00:08:00.879291 786755 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:08:00.880414 786755 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.880467 786755 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc000604fc0 2 D0713 00:08:00.880481 786755 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:08:00.881391 786755 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.881443 786755 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc000604fc0 3 D0713 00:08:00.881457 786755 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:08:00.888271 786755 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.888300 786755 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc000604fc0 4 D0713 00:08:00.888315 786755 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:08:00.889508 786755 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.889544 786755 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc000604fc0 5 D0713 00:08:00.889559 786755 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:08:00.889615 786755 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.889623 786755 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc000604fc0 6 D0713 00:08:00.889632 786755 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:08:00.889916 786755 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.889943 786755 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc000604fc0 7 D0713 00:08:00.889953 786755 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:08:00.890205 786755 usertrap_amd64.go:212] [ 1100: 1101] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.890231 786755 usertrap_amd64.go:122] [ 1100: 1101] Allocate a new trap: 0xc000604fc0 8 D0713 00:08:00.890242 786755 usertrap_amd64.go:225] [ 1100: 1101] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:08:00.890515 786755 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.890554 786755 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc000604fc0 9 D0713 00:08:00.890571 786755 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:08:00.890609 786755 usertrap_amd64.go:212] [ 1100: 1101] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.890617 786755 usertrap_amd64.go:122] [ 1100: 1101] Allocate a new trap: 0xc000604fc0 10 D0713 00:08:00.890688 786755 usertrap_amd64.go:225] [ 1100: 1101] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:08:00.893145 786755 sampler.go:191] Time: Adjusting syscall overhead down to 875 D0713 00:08:00.897994 786755 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.898019 786755 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc000604fc0 11 D0713 00:08:00.898029 786755 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:08:00.902165 786755 usertrap_amd64.go:212] [ 1100: 1101] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.902187 786755 usertrap_amd64.go:122] [ 1100: 1101] Allocate a new trap: 0xc000604fc0 12 D0713 00:08:00.902199 786755 usertrap_amd64.go:225] [ 1100: 1101] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:08:00.902405 786755 usertrap_amd64.go:212] [ 1100: 1101] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.902432 786755 usertrap_amd64.go:122] [ 1100: 1101] Allocate a new trap: 0xc000604fc0 13 D0713 00:08:00.902440 786755 usertrap_amd64.go:225] [ 1100: 1101] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:08:00.902486 786755 task_signals.go:470] [ 1100: 1100] Notified of signal 23 D0713 00:08:00.905032 786755 task_signals.go:220] [ 1100: 1100] Signal 23: delivering to handler I0713 00:08:00.911237 786755 compat.go:120] Unsupported syscall sys_443(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_443 for more information. D0713 00:08:00.911326 786755 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.911339 786755 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc000604fc0 14 D0713 00:08:00.911349 786755 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:08:00.911385 786755 task_exit.go:204] [ 1100: 1100] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.911420 786755 task_exit.go:204] [ 1100: 1100] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.911424 786755 task_signals.go:204] [ 1100: 1103] Signal 1100, PID: 1103, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.911443 786755 task_exit.go:204] [ 1100: 1103] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.911426 786755 task_signals.go:204] [ 1100: 1101] Signal 1100, PID: 1101, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.911453 786755 task_exit.go:204] [ 1100: 1103] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.911490 786755 task_exit.go:204] [ 1100: 1103] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.911516 786755 task_signals.go:204] [ 1100: 1102] Signal 1100, PID: 1102, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.911544 786755 task_exit.go:204] [ 1100: 1102] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.911558 786755 task_signals.go:204] [ 1100: 1104] Signal 1100, PID: 1104, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.911578 786755 task_exit.go:204] [ 1100: 1102] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.911582 786755 task_exit.go:204] [ 1100: 1102] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.911591 786755 task_exit.go:204] [ 1100: 1101] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.911597 786755 task_exit.go:204] [ 1100: 1101] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.911601 786755 task_exit.go:204] [ 1100: 1101] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.911607 786755 task_exit.go:204] [ 1100: 1104] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.913167 786755 task_exit.go:204] [ 1100: 1104] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.913186 786755 task_exit.go:204] [ 1100: 1104] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.913205 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.913264 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.913292 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.913374 786755 task_exit.go:204] [ 1100: 1100] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.914125 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.915531 786755 syscalls.go:262] [ 1105: 1105] Allocating stack with size of 8388608 bytes D0713 00:08:00.915621 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.918249 786755 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.918289 786755 usertrap_amd64.go:106] [ 1105: 1105] Map a usertrap vma at 6a000 D0713 00:08:00.918386 786755 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000e1f4d0 1 D0713 00:08:00.918416 786755 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:08:00.918779 786755 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.918802 786755 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000e1f4d0 2 D0713 00:08:00.918810 786755 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:08:00.919586 786755 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.919666 786755 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000e1f4d0 3 D0713 00:08:00.919691 786755 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:08:00.925944 786755 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.925979 786755 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000e1f4d0 4 D0713 00:08:00.925991 786755 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:08:00.927027 786755 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.927074 786755 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000e1f4d0 5 D0713 00:08:00.927094 786755 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:08:00.927163 786755 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.927173 786755 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000e1f4d0 6 D0713 00:08:00.927182 786755 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:08:00.927643 786755 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.927670 786755 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000e1f4d0 7 D0713 00:08:00.927680 786755 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:08:00.927914 786755 usertrap_amd64.go:212] [ 1105: 1106] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.927940 786755 usertrap_amd64.go:122] [ 1105: 1106] Allocate a new trap: 0xc000e1f4d0 8 D0713 00:08:00.927951 786755 usertrap_amd64.go:225] [ 1105: 1106] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:08:00.928208 786755 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.928302 786755 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000e1f4d0 9 D0713 00:08:00.928387 786755 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:08:00.928440 786755 usertrap_amd64.go:212] [ 1105: 1106] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.928463 786755 usertrap_amd64.go:122] [ 1105: 1106] Allocate a new trap: 0xc000e1f4d0 10 D0713 00:08:00.928473 786755 usertrap_amd64.go:225] [ 1105: 1106] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:08:00.936102 786755 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.936196 786755 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000e1f4d0 11 D0713 00:08:00.936239 786755 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:08:00.938907 786755 usertrap_amd64.go:212] [ 1105: 1106] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.938943 786755 usertrap_amd64.go:122] [ 1105: 1106] Allocate a new trap: 0xc000e1f4d0 12 D0713 00:08:00.938955 786755 usertrap_amd64.go:225] [ 1105: 1106] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:08:00.939036 786755 usertrap_amd64.go:212] [ 1105: 1106] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.939043 786755 usertrap_amd64.go:122] [ 1105: 1106] Allocate a new trap: 0xc000e1f4d0 13 D0713 00:08:00.939056 786755 usertrap_amd64.go:225] [ 1105: 1106] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:08:00.939076 786755 task_signals.go:470] [ 1105: 1105] Notified of signal 23 D0713 00:08:00.939159 786755 task_signals.go:220] [ 1105: 1105] Signal 23: delivering to handler D0713 00:08:00.947561 786755 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.947636 786755 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc000e1f4d0 14 D0713 00:08:00.947658 786755 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:08:00.947791 786755 task_exit.go:204] [ 1105: 1105] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.947839 786755 task_exit.go:204] [ 1105: 1105] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.947874 786755 task_signals.go:204] [ 1105: 1109] Signal 1105, PID: 1109, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.947857 786755 task_signals.go:204] [ 1105: 1106] Signal 1105, PID: 1106, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.947880 786755 task_signals.go:204] [ 1105: 1108] Signal 1105, PID: 1108, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.947890 786755 task_signals.go:204] [ 1105: 1107] Signal 1105, PID: 1107, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.947892 786755 task_exit.go:204] [ 1105: 1109] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.947933 786755 task_exit.go:204] [ 1105: 1109] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.947949 786755 task_exit.go:204] [ 1105: 1109] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.947971 786755 task_exit.go:204] [ 1105: 1106] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.947980 786755 task_exit.go:204] [ 1105: 1106] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.947986 786755 task_exit.go:204] [ 1105: 1106] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.947997 786755 task_exit.go:204] [ 1105: 1108] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.948004 786755 task_exit.go:204] [ 1105: 1108] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.948009 786755 task_exit.go:204] [ 1105: 1108] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.948018 786755 task_exit.go:204] [ 1105: 1107] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.949585 786755 task_exit.go:204] [ 1105: 1107] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.949616 786755 task_exit.go:204] [ 1105: 1107] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.949638 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.949689 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.949702 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.949814 786755 task_exit.go:204] [ 1105: 1105] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.950653 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.952332 786755 syscalls.go:262] [ 1110: 1110] Allocating stack with size of 8388608 bytes D0713 00:08:00.952463 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.954050 786755 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.954137 786755 usertrap_amd64.go:106] [ 1110: 1110] Map a usertrap vma at 61000 D0713 00:08:00.954291 786755 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc0009a2060 1 D0713 00:08:00.954350 786755 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:08:00.954799 786755 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.954830 786755 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc0009a2060 2 D0713 00:08:00.954850 786755 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:08:00.955591 786755 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.955634 786755 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc0009a2060 3 D0713 00:08:00.955656 786755 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:08:00.964558 786755 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:00.964590 786755 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc0009a2060 4 D0713 00:08:00.964603 786755 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:08:00.966150 786755 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:00.966225 786755 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc0009a2060 5 D0713 00:08:00.966245 786755 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:08:00.966314 786755 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b214:sysno 13 D0713 00:08:00.966328 786755 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc0009a2060 6 D0713 00:08:00.966338 786755 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:08:00.966834 786755 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:00.966854 786755 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc0009a2060 7 D0713 00:08:00.966866 786755 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:08:00.967112 786755 usertrap_amd64.go:212] [ 1110: 1111] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:00.967139 786755 usertrap_amd64.go:122] [ 1110: 1111] Allocate a new trap: 0xc0009a2060 8 D0713 00:08:00.967150 786755 usertrap_amd64.go:225] [ 1110: 1111] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:08:00.967551 786755 usertrap_amd64.go:212] [ 1110: 1111] Found the pattern at ip 46af76:sysno 35 D0713 00:08:00.967577 786755 usertrap_amd64.go:122] [ 1110: 1111] Allocate a new trap: 0xc0009a2060 9 D0713 00:08:00.967590 786755 usertrap_amd64.go:225] [ 1110: 1111] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:08:00.967604 786755 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:00.967614 786755 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc0009a2060 10 D0713 00:08:00.967623 786755 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:08:00.968571 786755 usertrap_amd64.go:212] [ 1110: 1111] Found the pattern at ip 46b020:sysno 39 D0713 00:08:00.968635 786755 usertrap_amd64.go:122] [ 1110: 1111] Allocate a new trap: 0xc0009a2060 11 D0713 00:08:00.968737 786755 usertrap_amd64.go:225] [ 1110: 1111] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:08:00.968806 786755 usertrap_amd64.go:212] [ 1110: 1111] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:00.968825 786755 usertrap_amd64.go:122] [ 1110: 1111] Allocate a new trap: 0xc0009a2060 12 D0713 00:08:00.968836 786755 usertrap_amd64.go:225] [ 1110: 1111] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:08:00.968880 786755 task_signals.go:470] [ 1110: 1110] Notified of signal 23 D0713 00:08:00.968928 786755 task_signals.go:220] [ 1110: 1110] Signal 23: delivering to handler D0713 00:08:00.977765 786755 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46af29:sysno 293 D0713 00:08:00.977807 786755 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc0009a2060 13 D0713 00:08:00.977823 786755 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:08:00.980823 786755 task_signals.go:470] [ 1110: 1110] Notified of signal 23 D0713 00:08:00.980977 786755 task_signals.go:220] [ 1110: 1110] Signal 23: delivering to handler D0713 00:08:00.981129 786755 task_signals.go:470] [ 1110: 1110] Notified of signal 23 D0713 00:08:00.981237 786755 task_signals.go:220] [ 1110: 1110] Signal 23: delivering to handler D0713 00:08:00.989537 786755 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:00.989583 786755 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc0009a2060 14 D0713 00:08:00.989604 786755 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:08:00.989687 786755 task_exit.go:204] [ 1110: 1110] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.989719 786755 task_exit.go:204] [ 1110: 1110] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.989744 786755 task_signals.go:204] [ 1110: 1113] Signal 1110, PID: 1113, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.989740 786755 task_signals.go:204] [ 1110: 1112] Signal 1110, PID: 1112, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.989761 786755 task_exit.go:204] [ 1110: 1113] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.989829 786755 task_exit.go:204] [ 1110: 1113] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.989848 786755 task_exit.go:204] [ 1110: 1113] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.989874 786755 task_signals.go:204] [ 1110: 1114] Signal 1110, PID: 1114, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.989893 786755 task_exit.go:204] [ 1110: 1114] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.989899 786755 task_exit.go:204] [ 1110: 1114] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.989903 786755 task_exit.go:204] [ 1110: 1114] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.989891 786755 task_signals.go:204] [ 1110: 1111] Signal 1110, PID: 1111, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:00.989916 786755 task_exit.go:204] [ 1110: 1111] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.989929 786755 task_exit.go:204] [ 1110: 1111] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.989934 786755 task_exit.go:204] [ 1110: 1111] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.989947 786755 task_exit.go:204] [ 1110: 1112] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:00.991502 786755 task_exit.go:204] [ 1110: 1112] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:00.991542 786755 task_exit.go:204] [ 1110: 1112] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.991559 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:00.991597 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:00.991619 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:00.991704 786755 task_exit.go:204] [ 1110: 1110] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:00.992412 786755 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.993787 786755 syscalls.go:262] [ 1115: 1115] Allocating stack with size of 8388608 bytes D0713 00:08:00.993882 786755 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:00.995097 786755 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:00.995145 786755 usertrap_amd64.go:106] [ 1115: 1115] Map a usertrap vma at 66000 D0713 00:08:00.995269 786755 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc0009a2420 1 D0713 00:08:00.995320 786755 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:08:00.995819 786755 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:00.995895 786755 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc0009a2420 2 D0713 00:08:00.995913 786755 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:08:00.996553 786755 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:00.996573 786755 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc0009a2420 3 D0713 00:08:00.996584 786755 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:08:01.005587 786755 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.005652 786755 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc0009a2420 4 D0713 00:08:01.005669 786755 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:08:01.006910 786755 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.006964 786755 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc0009a2420 5 D0713 00:08:01.006979 786755 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:08:01.007033 786755 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.007054 786755 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc0009a2420 6 D0713 00:08:01.007064 786755 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:08:01.007278 786755 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.007304 786755 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc0009a2420 7 D0713 00:08:01.007312 786755 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:08:01.007499 786755 usertrap_amd64.go:212] [ 1115: 1116] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.007526 786755 usertrap_amd64.go:122] [ 1115: 1116] Allocate a new trap: 0xc0009a2420 8 D0713 00:08:01.007538 786755 usertrap_amd64.go:225] [ 1115: 1116] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:08:01.007724 786755 usertrap_amd64.go:212] [ 1115: 1116] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.007745 786755 usertrap_amd64.go:122] [ 1115: 1116] Allocate a new trap: 0xc0009a2420 9 D0713 00:08:01.007754 786755 usertrap_amd64.go:225] [ 1115: 1116] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:08:01.007811 786755 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.007820 786755 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc0009a2420 10 D0713 00:08:01.007828 786755 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:08:01.016338 786755 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.016378 786755 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc0009a2420 11 D0713 00:08:01.016397 786755 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:08:01.019364 786755 usertrap_amd64.go:212] [ 1115: 1116] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.019417 786755 usertrap_amd64.go:122] [ 1115: 1116] Allocate a new trap: 0xc0009a2420 12 D0713 00:08:01.019434 786755 usertrap_amd64.go:225] [ 1115: 1116] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:08:01.019500 786755 usertrap_amd64.go:212] [ 1115: 1116] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.019522 786755 usertrap_amd64.go:122] [ 1115: 1116] Allocate a new trap: 0xc0009a2420 13 D0713 00:08:01.019531 786755 usertrap_amd64.go:225] [ 1115: 1116] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:08:01.019567 786755 task_signals.go:470] [ 1115: 1115] Notified of signal 23 D0713 00:08:01.019671 786755 task_signals.go:220] [ 1115: 1115] Signal 23: delivering to handler D0713 00:08:01.029036 786755 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.029081 786755 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc0009a2420 14 D0713 00:08:01.029094 786755 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:08:01.029156 786755 task_exit.go:204] [ 1115: 1115] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.029199 786755 task_exit.go:204] [ 1115: 1115] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.029201 786755 task_signals.go:204] [ 1115: 1117] Signal 1115, PID: 1117, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.029223 786755 task_exit.go:204] [ 1115: 1117] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.029223 786755 task_signals.go:204] [ 1115: 1118] Signal 1115, PID: 1118, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.029233 786755 task_exit.go:204] [ 1115: 1117] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.029238 786755 task_exit.go:204] [ 1115: 1117] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.029255 786755 task_exit.go:204] [ 1115: 1118] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.029259 786755 task_signals.go:204] [ 1115: 1119] Signal 1115, PID: 1119, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.029291 786755 task_exit.go:204] [ 1115: 1118] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.029299 786755 task_exit.go:204] [ 1115: 1118] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.029257 786755 task_signals.go:204] [ 1115: 1116] Signal 1115, PID: 1116, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.029312 786755 task_exit.go:204] [ 1115: 1119] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.029322 786755 task_exit.go:204] [ 1115: 1119] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.029328 786755 task_exit.go:204] [ 1115: 1119] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.029340 786755 task_exit.go:204] [ 1115: 1116] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.030844 786755 task_exit.go:204] [ 1115: 1116] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.032987 786755 task_exit.go:204] [ 1115: 1116] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.033041 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.033279 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.033428 786755 task_exit.go:204] [ 1115: 1115] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.034809 786755 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.036657 786755 syscalls.go:262] [ 1120: 1120] Allocating stack with size of 8388608 bytes D0713 00:08:01.036737 786755 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.037321 786755 task_signals.go:470] [ 6: 13] Notified of signal 23 D0713 00:08:01.037400 786755 task_signals.go:220] [ 6: 13] Signal 23: delivering to handler D0713 00:08:01.038389 786755 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.038438 786755 usertrap_amd64.go:106] [ 1120: 1120] Map a usertrap vma at 61000 D0713 00:08:01.038526 786755 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000bdbfb0 1 D0713 00:08:01.038574 786755 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:08:01.038914 786755 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.038942 786755 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000bdbfb0 2 D0713 00:08:01.038954 786755 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:08:01.039528 786755 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.039545 786755 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000bdbfb0 3 D0713 00:08:01.039553 786755 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:08:01.046891 786755 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.046928 786755 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000bdbfb0 4 D0713 00:08:01.046945 786755 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:08:01.048512 786755 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.048537 786755 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000bdbfb0 5 D0713 00:08:01.048566 786755 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:08:01.048619 786755 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.048633 786755 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000bdbfb0 6 D0713 00:08:01.048644 786755 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:08:01.048921 786755 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.048977 786755 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000bdbfb0 7 D0713 00:08:01.048993 786755 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:08:01.049381 786755 usertrap_amd64.go:212] [ 1120: 1121] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.049440 786755 usertrap_amd64.go:122] [ 1120: 1121] Allocate a new trap: 0xc000bdbfb0 8 D0713 00:08:01.049460 786755 usertrap_amd64.go:225] [ 1120: 1121] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:08:01.049645 786755 usertrap_amd64.go:212] [ 1120: 1121] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.049663 786755 usertrap_amd64.go:122] [ 1120: 1121] Allocate a new trap: 0xc000bdbfb0 9 D0713 00:08:01.049674 786755 usertrap_amd64.go:225] [ 1120: 1121] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:08:01.049784 786755 usertrap_amd64.go:212] [ 1120: 1123] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.049805 786755 usertrap_amd64.go:122] [ 1120: 1123] Allocate a new trap: 0xc000bdbfb0 10 D0713 00:08:01.049819 786755 usertrap_amd64.go:225] [ 1120: 1123] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:08:01.066871 786755 usertrap_amd64.go:212] [ 1120: 1121] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.066927 786755 usertrap_amd64.go:122] [ 1120: 1121] Allocate a new trap: 0xc000bdbfb0 11 D0713 00:08:01.066954 786755 usertrap_amd64.go:225] [ 1120: 1121] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:08:01.067361 786755 usertrap_amd64.go:212] [ 1120: 1121] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.067449 786755 usertrap_amd64.go:122] [ 1120: 1121] Allocate a new trap: 0xc000bdbfb0 12 D0713 00:08:01.067485 786755 usertrap_amd64.go:225] [ 1120: 1121] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:08:01.067577 786755 task_signals.go:470] [ 1120: 1120] Notified of signal 23 D0713 00:08:01.067644 786755 task_signals.go:220] [ 1120: 1120] Signal 23: delivering to handler D0713 00:08:01.069022 786755 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.069039 786755 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000bdbfb0 13 D0713 00:08:01.069051 786755 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:08:01.078414 786755 task_signals.go:470] [ 1120: 1120] Notified of signal 23 D0713 00:08:01.078544 786755 task_signals.go:220] [ 1120: 1120] Signal 23: delivering to handler D0713 00:08:01.080860 786755 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.080894 786755 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000bdbfb0 14 D0713 00:08:01.080916 786755 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:08:01.081096 786755 task_exit.go:204] [ 1120: 1120] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.081138 786755 task_exit.go:204] [ 1120: 1120] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.081139 786755 task_signals.go:204] [ 1120: 1122] Signal 1120, PID: 1122, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.081163 786755 task_signals.go:204] [ 1120: 1124] Signal 1120, PID: 1124, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.081169 786755 task_exit.go:204] [ 1120: 1122] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.081187 786755 task_signals.go:204] [ 1120: 1121] Signal 1120, PID: 1121, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.081200 786755 task_exit.go:204] [ 1120: 1122] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.081163 786755 task_signals.go:204] [ 1120: 1123] Signal 1120, PID: 1123, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.081207 786755 task_exit.go:204] [ 1120: 1122] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.081235 786755 task_exit.go:204] [ 1120: 1123] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.081260 786755 task_exit.go:204] [ 1120: 1123] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.081267 786755 task_exit.go:204] [ 1120: 1123] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.081324 786755 task_exit.go:204] [ 1120: 1124] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.081336 786755 task_exit.go:204] [ 1120: 1124] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.081351 786755 task_exit.go:204] [ 1120: 1124] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.081361 786755 task_exit.go:204] [ 1120: 1121] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.082673 786755 task_exit.go:204] [ 1120: 1121] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.082753 786755 task_exit.go:204] [ 1120: 1121] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.082794 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.083100 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:01.083119 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.083333 786755 task_exit.go:204] [ 1120: 1120] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.083900 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.085233 786755 syscalls.go:262] [ 1125: 1125] Allocating stack with size of 8388608 bytes D0713 00:08:01.085331 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.086882 786755 usertrap_amd64.go:212] [ 1125: 1125] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.086925 786755 usertrap_amd64.go:106] [ 1125: 1125] Map a usertrap vma at 64000 D0713 00:08:01.087003 786755 usertrap_amd64.go:122] [ 1125: 1125] Allocate a new trap: 0xc0009a24e0 1 D0713 00:08:01.087042 786755 usertrap_amd64.go:225] [ 1125: 1125] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:08:01.087393 786755 usertrap_amd64.go:212] [ 1125: 1125] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.087418 786755 usertrap_amd64.go:122] [ 1125: 1125] Allocate a new trap: 0xc0009a24e0 2 D0713 00:08:01.087428 786755 usertrap_amd64.go:225] [ 1125: 1125] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:08:01.088068 786755 usertrap_amd64.go:212] [ 1125: 1125] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.088091 786755 usertrap_amd64.go:122] [ 1125: 1125] Allocate a new trap: 0xc0009a24e0 3 D0713 00:08:01.088100 786755 usertrap_amd64.go:225] [ 1125: 1125] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:08:01.094485 786755 usertrap_amd64.go:212] [ 1125: 1125] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.094529 786755 usertrap_amd64.go:122] [ 1125: 1125] Allocate a new trap: 0xc0009a24e0 4 D0713 00:08:01.094544 786755 usertrap_amd64.go:225] [ 1125: 1125] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:08:01.095676 786755 usertrap_amd64.go:212] [ 1125: 1125] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.095705 786755 usertrap_amd64.go:122] [ 1125: 1125] Allocate a new trap: 0xc0009a24e0 5 D0713 00:08:01.095717 786755 usertrap_amd64.go:225] [ 1125: 1125] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:08:01.095756 786755 usertrap_amd64.go:212] [ 1125: 1125] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.095774 786755 usertrap_amd64.go:122] [ 1125: 1125] Allocate a new trap: 0xc0009a24e0 6 D0713 00:08:01.095782 786755 usertrap_amd64.go:225] [ 1125: 1125] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:08:01.096153 786755 usertrap_amd64.go:212] [ 1125: 1125] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.096187 786755 usertrap_amd64.go:122] [ 1125: 1125] Allocate a new trap: 0xc0009a24e0 7 D0713 00:08:01.096200 786755 usertrap_amd64.go:225] [ 1125: 1125] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:08:01.096361 786755 usertrap_amd64.go:212] [ 1125: 1126] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.096387 786755 usertrap_amd64.go:122] [ 1125: 1126] Allocate a new trap: 0xc0009a24e0 8 D0713 00:08:01.096396 786755 usertrap_amd64.go:225] [ 1125: 1126] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:08:01.096652 786755 usertrap_amd64.go:212] [ 1125: 1126] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.096683 786755 usertrap_amd64.go:122] [ 1125: 1126] Allocate a new trap: 0xc0009a24e0 9 D0713 00:08:01.096704 786755 usertrap_amd64.go:225] [ 1125: 1126] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:08:01.096724 786755 usertrap_amd64.go:212] [ 1125: 1125] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.096732 786755 usertrap_amd64.go:122] [ 1125: 1125] Allocate a new trap: 0xc0009a24e0 10 D0713 00:08:01.096740 786755 usertrap_amd64.go:225] [ 1125: 1125] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:08:01.096925 786755 usertrap_amd64.go:212] [ 1125: 1125] Found the pattern at ip 46b6e0:sysno 24 D0713 00:08:01.096980 786755 usertrap_amd64.go:122] [ 1125: 1125] Allocate a new trap: 0xc0009a24e0 11 D0713 00:08:01.096991 786755 usertrap_amd64.go:225] [ 1125: 1125] Apply the binary patch addr 46b6e0 trap addr 64370 ([184 24 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:08:01.104918 786755 usertrap_amd64.go:212] [ 1125: 1125] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.105015 786755 usertrap_amd64.go:122] [ 1125: 1125] Allocate a new trap: 0xc0009a24e0 12 D0713 00:08:01.105030 786755 usertrap_amd64.go:225] [ 1125: 1125] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:08:01.107774 786755 usertrap_amd64.go:212] [ 1125: 1126] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.107794 786755 usertrap_amd64.go:122] [ 1125: 1126] Allocate a new trap: 0xc0009a24e0 13 D0713 00:08:01.107807 786755 usertrap_amd64.go:225] [ 1125: 1126] Apply the binary patch addr 46b020 trap addr 64410 ([184 39 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:08:01.107840 786755 usertrap_amd64.go:212] [ 1125: 1126] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.107847 786755 usertrap_amd64.go:122] [ 1125: 1126] Allocate a new trap: 0xc0009a24e0 14 D0713 00:08:01.107854 786755 usertrap_amd64.go:225] [ 1125: 1126] Apply the binary patch addr 46b04f trap addr 64460 ([184 234 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:08:01.107870 786755 task_signals.go:470] [ 1125: 1125] Notified of signal 23 D0713 00:08:01.107983 786755 task_signals.go:220] [ 1125: 1125] Signal 23: delivering to handler D0713 00:08:01.116329 786755 usertrap_amd64.go:212] [ 1125: 1125] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.116368 786755 usertrap_amd64.go:122] [ 1125: 1125] Allocate a new trap: 0xc0009a24e0 15 D0713 00:08:01.116382 786755 usertrap_amd64.go:225] [ 1125: 1125] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0713 00:08:01.116443 786755 task_exit.go:204] [ 1125: 1125] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.116502 786755 task_signals.go:204] [ 1125: 1127] Signal 1125, PID: 1127, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.116526 786755 task_exit.go:204] [ 1125: 1125] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.116546 786755 task_signals.go:204] [ 1125: 1129] Signal 1125, PID: 1129, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.116559 786755 task_signals.go:204] [ 1125: 1126] Signal 1125, PID: 1126, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.116574 786755 task_exit.go:204] [ 1125: 1129] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.116621 786755 task_signals.go:204] [ 1125: 1128] Signal 1125, PID: 1128, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.116642 786755 task_exit.go:204] [ 1125: 1129] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.116649 786755 task_exit.go:204] [ 1125: 1129] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.116662 786755 task_exit.go:204] [ 1125: 1127] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.116667 786755 task_exit.go:204] [ 1125: 1127] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.116671 786755 task_exit.go:204] [ 1125: 1127] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.116677 786755 task_exit.go:204] [ 1125: 1126] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.116681 786755 task_exit.go:204] [ 1125: 1126] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.116684 786755 task_exit.go:204] [ 1125: 1126] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.116691 786755 task_exit.go:204] [ 1125: 1128] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.118104 786755 task_exit.go:204] [ 1125: 1128] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.118126 786755 task_exit.go:204] [ 1125: 1128] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.118137 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.118164 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:01.118188 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.118352 786755 task_exit.go:204] [ 1125: 1125] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.118957 786755 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.120230 786755 syscalls.go:262] [ 1130: 1130] Allocating stack with size of 8388608 bytes D0713 00:08:01.120320 786755 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.121473 786755 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.121513 786755 usertrap_amd64.go:106] [ 1130: 1130] Map a usertrap vma at 6a000 D0713 00:08:01.121592 786755 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc00282e270 1 D0713 00:08:01.121620 786755 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:08:01.122017 786755 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.122044 786755 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc00282e270 2 D0713 00:08:01.122059 786755 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:08:01.122541 786755 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.122567 786755 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc00282e270 3 D0713 00:08:01.122576 786755 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:08:01.127972 786755 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.128010 786755 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc00282e270 4 D0713 00:08:01.128032 786755 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:08:01.129132 786755 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.129211 786755 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc00282e270 5 D0713 00:08:01.129238 786755 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:08:01.129433 786755 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.129446 786755 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc00282e270 6 D0713 00:08:01.129457 786755 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:08:01.129651 786755 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.129669 786755 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc00282e270 7 D0713 00:08:01.129678 786755 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:08:01.129826 786755 usertrap_amd64.go:212] [ 1130: 1131] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.129846 786755 usertrap_amd64.go:122] [ 1130: 1131] Allocate a new trap: 0xc00282e270 8 D0713 00:08:01.129856 786755 usertrap_amd64.go:225] [ 1130: 1131] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:08:01.130025 786755 usertrap_amd64.go:212] [ 1130: 1131] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.130225 786755 usertrap_amd64.go:122] [ 1130: 1131] Allocate a new trap: 0xc00282e270 9 D0713 00:08:01.130251 786755 usertrap_amd64.go:225] [ 1130: 1131] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:08:01.130264 786755 usertrap_amd64.go:212] [ 1130: 1132] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.130291 786755 usertrap_amd64.go:122] [ 1130: 1132] Allocate a new trap: 0xc00282e270 10 D0713 00:08:01.130309 786755 usertrap_amd64.go:225] [ 1130: 1132] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:08:01.130807 786755 usertrap_amd64.go:212] [ 1130: 1131] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.130833 786755 usertrap_amd64.go:122] [ 1130: 1131] Allocate a new trap: 0xc00282e270 11 D0713 00:08:01.130845 786755 usertrap_amd64.go:225] [ 1130: 1131] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:08:01.130897 786755 usertrap_amd64.go:212] [ 1130: 1131] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.130923 786755 usertrap_amd64.go:122] [ 1130: 1131] Allocate a new trap: 0xc00282e270 12 D0713 00:08:01.130932 786755 usertrap_amd64.go:225] [ 1130: 1131] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:08:01.130953 786755 task_signals.go:470] [ 1130: 1130] Notified of signal 23 D0713 00:08:01.131035 786755 task_signals.go:220] [ 1130: 1130] Signal 23: delivering to handler D0713 00:08:01.137687 786755 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.137749 786755 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc00282e270 13 D0713 00:08:01.137768 786755 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:08:01.141530 786755 task_signals.go:470] [ 1130: 1130] Notified of signal 23 D0713 00:08:01.141615 786755 task_signals.go:220] [ 1130: 1130] Signal 23: delivering to handler D0713 00:08:01.149194 786755 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.149230 786755 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc00282e270 14 D0713 00:08:01.149249 786755 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:08:01.149315 786755 task_exit.go:204] [ 1130: 1130] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.149350 786755 task_exit.go:204] [ 1130: 1130] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.149353 786755 task_signals.go:204] [ 1130: 1133] Signal 1130, PID: 1133, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.149376 786755 task_signals.go:204] [ 1130: 1132] Signal 1130, PID: 1132, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.149391 786755 task_exit.go:204] [ 1130: 1133] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.149395 786755 task_signals.go:204] [ 1130: 1134] Signal 1130, PID: 1134, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.149426 786755 task_exit.go:204] [ 1130: 1133] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.149454 786755 task_exit.go:204] [ 1130: 1133] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.149366 786755 task_signals.go:204] [ 1130: 1131] Signal 1130, PID: 1131, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.149500 786755 task_exit.go:204] [ 1130: 1131] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.149520 786755 task_exit.go:204] [ 1130: 1131] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.149528 786755 task_exit.go:204] [ 1130: 1131] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.149541 786755 task_exit.go:204] [ 1130: 1132] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.149570 786755 task_exit.go:204] [ 1130: 1132] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.149579 786755 task_exit.go:204] [ 1130: 1132] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.149593 786755 task_exit.go:204] [ 1130: 1134] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.151014 786755 task_exit.go:204] [ 1130: 1134] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.151055 786755 task_exit.go:204] [ 1130: 1134] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.151072 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.151105 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:01.151117 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.151311 786755 task_exit.go:204] [ 1130: 1130] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.152245 786755 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.153768 786755 syscalls.go:262] [ 1135: 1135] Allocating stack with size of 8388608 bytes D0713 00:08:01.153905 786755 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.155084 786755 usertrap_amd64.go:212] [ 1135: 1135] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.155132 786755 usertrap_amd64.go:106] [ 1135: 1135] Map a usertrap vma at 68000 D0713 00:08:01.155209 786755 usertrap_amd64.go:122] [ 1135: 1135] Allocate a new trap: 0xc00099ac60 1 D0713 00:08:01.155234 786755 usertrap_amd64.go:225] [ 1135: 1135] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:08:01.155542 786755 usertrap_amd64.go:212] [ 1135: 1135] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.155563 786755 usertrap_amd64.go:122] [ 1135: 1135] Allocate a new trap: 0xc00099ac60 2 D0713 00:08:01.155578 786755 usertrap_amd64.go:225] [ 1135: 1135] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:08:01.156127 786755 usertrap_amd64.go:212] [ 1135: 1135] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.156150 786755 usertrap_amd64.go:122] [ 1135: 1135] Allocate a new trap: 0xc00099ac60 3 D0713 00:08:01.156162 786755 usertrap_amd64.go:225] [ 1135: 1135] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:08:01.164678 786755 usertrap_amd64.go:212] [ 1135: 1135] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.164714 786755 usertrap_amd64.go:122] [ 1135: 1135] Allocate a new trap: 0xc00099ac60 4 D0713 00:08:01.164728 786755 usertrap_amd64.go:225] [ 1135: 1135] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:08:01.166528 786755 usertrap_amd64.go:212] [ 1135: 1135] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.166550 786755 usertrap_amd64.go:122] [ 1135: 1135] Allocate a new trap: 0xc00099ac60 5 D0713 00:08:01.166561 786755 usertrap_amd64.go:225] [ 1135: 1135] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:08:01.166599 786755 usertrap_amd64.go:212] [ 1135: 1135] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.166606 786755 usertrap_amd64.go:122] [ 1135: 1135] Allocate a new trap: 0xc00099ac60 6 D0713 00:08:01.166613 786755 usertrap_amd64.go:225] [ 1135: 1135] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:08:01.166819 786755 usertrap_amd64.go:212] [ 1135: 1135] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.166831 786755 usertrap_amd64.go:122] [ 1135: 1135] Allocate a new trap: 0xc00099ac60 7 D0713 00:08:01.166840 786755 usertrap_amd64.go:225] [ 1135: 1135] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:08:01.166996 786755 usertrap_amd64.go:212] [ 1135: 1136] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.167010 786755 usertrap_amd64.go:122] [ 1135: 1136] Allocate a new trap: 0xc00099ac60 8 D0713 00:08:01.167021 786755 usertrap_amd64.go:225] [ 1135: 1136] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:08:01.167162 786755 usertrap_amd64.go:212] [ 1135: 1136] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.167177 786755 usertrap_amd64.go:122] [ 1135: 1136] Allocate a new trap: 0xc00099ac60 9 D0713 00:08:01.167199 786755 usertrap_amd64.go:225] [ 1135: 1136] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:08:01.167299 786755 usertrap_amd64.go:212] [ 1135: 1135] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.167320 786755 usertrap_amd64.go:122] [ 1135: 1135] Allocate a new trap: 0xc00099ac60 10 D0713 00:08:01.167332 786755 usertrap_amd64.go:225] [ 1135: 1135] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:08:01.176465 786755 usertrap_amd64.go:212] [ 1135: 1135] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.176484 786755 usertrap_amd64.go:122] [ 1135: 1135] Allocate a new trap: 0xc00099ac60 11 D0713 00:08:01.176494 786755 usertrap_amd64.go:225] [ 1135: 1135] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:08:01.179639 786755 usertrap_amd64.go:212] [ 1135: 1136] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.179675 786755 usertrap_amd64.go:122] [ 1135: 1136] Allocate a new trap: 0xc00099ac60 12 D0713 00:08:01.179687 786755 usertrap_amd64.go:225] [ 1135: 1136] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:08:01.179806 786755 usertrap_amd64.go:212] [ 1135: 1136] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.179826 786755 usertrap_amd64.go:122] [ 1135: 1136] Allocate a new trap: 0xc00099ac60 13 D0713 00:08:01.179834 786755 usertrap_amd64.go:225] [ 1135: 1136] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:08:01.179885 786755 task_signals.go:470] [ 1135: 1135] Notified of signal 23 D0713 00:08:01.179934 786755 task_signals.go:179] [ 1135: 1135] Restarting syscall 202: interrupted by signal 23 D0713 00:08:01.179955 786755 task_signals.go:220] [ 1135: 1135] Signal 23: delivering to handler D0713 00:08:01.187364 786755 usertrap_amd64.go:212] [ 1135: 1135] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.187435 786755 usertrap_amd64.go:122] [ 1135: 1135] Allocate a new trap: 0xc00099ac60 14 D0713 00:08:01.187451 786755 usertrap_amd64.go:225] [ 1135: 1135] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:08:01.187508 786755 task_exit.go:204] [ 1135: 1135] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.187538 786755 task_exit.go:204] [ 1135: 1135] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.187582 786755 task_signals.go:204] [ 1135: 1136] Signal 1135, PID: 1136, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.187605 786755 task_exit.go:204] [ 1135: 1136] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.187611 786755 task_exit.go:204] [ 1135: 1136] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.187624 786755 task_exit.go:204] [ 1135: 1136] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.187639 786755 task_signals.go:204] [ 1135: 1137] Signal 1135, PID: 1137, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.187654 786755 task_exit.go:204] [ 1135: 1137] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.187659 786755 task_exit.go:204] [ 1135: 1137] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.187663 786755 task_exit.go:204] [ 1135: 1137] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.187675 786755 task_signals.go:204] [ 1135: 1138] Signal 1135, PID: 1138, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.187688 786755 task_exit.go:204] [ 1135: 1138] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.187693 786755 task_exit.go:204] [ 1135: 1138] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.187696 786755 task_exit.go:204] [ 1135: 1138] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.187715 786755 task_signals.go:204] [ 1135: 1139] Signal 1135, PID: 1139, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.187729 786755 task_exit.go:204] [ 1135: 1139] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.189065 786755 task_exit.go:204] [ 1135: 1139] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.189094 786755 task_exit.go:204] [ 1135: 1139] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.189105 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.189195 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:01.189238 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.189407 786755 task_exit.go:204] [ 1135: 1135] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.190079 786755 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.191585 786755 syscalls.go:262] [ 1140: 1140] Allocating stack with size of 8388608 bytes D0713 00:08:01.191706 786755 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.192814 786755 usertrap_amd64.go:212] [ 1140: 1140] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.192857 786755 usertrap_amd64.go:106] [ 1140: 1140] Map a usertrap vma at 63000 D0713 00:08:01.193037 786755 usertrap_amd64.go:122] [ 1140: 1140] Allocate a new trap: 0xc0004b92c0 1 D0713 00:08:01.193078 786755 usertrap_amd64.go:225] [ 1140: 1140] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:08:01.193452 786755 usertrap_amd64.go:212] [ 1140: 1140] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.193473 786755 usertrap_amd64.go:122] [ 1140: 1140] Allocate a new trap: 0xc0004b92c0 2 D0713 00:08:01.193480 786755 usertrap_amd64.go:225] [ 1140: 1140] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:08:01.194268 786755 usertrap_amd64.go:212] [ 1140: 1140] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.194289 786755 usertrap_amd64.go:122] [ 1140: 1140] Allocate a new trap: 0xc0004b92c0 3 D0713 00:08:01.194301 786755 usertrap_amd64.go:225] [ 1140: 1140] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:08:01.200109 786755 usertrap_amd64.go:212] [ 1140: 1140] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.200177 786755 usertrap_amd64.go:122] [ 1140: 1140] Allocate a new trap: 0xc0004b92c0 4 D0713 00:08:01.200206 786755 usertrap_amd64.go:225] [ 1140: 1140] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:08:01.201554 786755 usertrap_amd64.go:212] [ 1140: 1140] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.201584 786755 usertrap_amd64.go:122] [ 1140: 1140] Allocate a new trap: 0xc0004b92c0 5 D0713 00:08:01.201596 786755 usertrap_amd64.go:225] [ 1140: 1140] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:08:01.201650 786755 usertrap_amd64.go:212] [ 1140: 1140] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.201663 786755 usertrap_amd64.go:122] [ 1140: 1140] Allocate a new trap: 0xc0004b92c0 6 D0713 00:08:01.201669 786755 usertrap_amd64.go:225] [ 1140: 1140] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:08:01.202026 786755 usertrap_amd64.go:212] [ 1140: 1140] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.202036 786755 usertrap_amd64.go:122] [ 1140: 1140] Allocate a new trap: 0xc0004b92c0 7 D0713 00:08:01.202042 786755 usertrap_amd64.go:225] [ 1140: 1140] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:08:01.202186 786755 usertrap_amd64.go:212] [ 1140: 1141] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.202194 786755 usertrap_amd64.go:122] [ 1140: 1141] Allocate a new trap: 0xc0004b92c0 8 D0713 00:08:01.202200 786755 usertrap_amd64.go:225] [ 1140: 1141] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:08:01.202328 786755 usertrap_amd64.go:212] [ 1140: 1141] Found the pattern at ip 46b6e0:sysno 24 D0713 00:08:01.202350 786755 usertrap_amd64.go:122] [ 1140: 1141] Allocate a new trap: 0xc0004b92c0 9 D0713 00:08:01.202362 786755 usertrap_amd64.go:225] [ 1140: 1141] Apply the binary patch addr 46b6e0 trap addr 632d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:08:01.202445 786755 usertrap_amd64.go:212] [ 1140: 1140] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.202456 786755 usertrap_amd64.go:122] [ 1140: 1140] Allocate a new trap: 0xc0004b92c0 10 D0713 00:08:01.202466 786755 usertrap_amd64.go:225] [ 1140: 1140] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:08:01.202515 786755 usertrap_amd64.go:212] [ 1140: 1141] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.202524 786755 usertrap_amd64.go:122] [ 1140: 1141] Allocate a new trap: 0xc0004b92c0 11 D0713 00:08:01.202533 786755 usertrap_amd64.go:225] [ 1140: 1141] Apply the binary patch addr 46af76 trap addr 63370 ([184 35 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:08:01.202859 786755 usertrap_amd64.go:212] [ 1140: 1141] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.202872 786755 usertrap_amd64.go:122] [ 1140: 1141] Allocate a new trap: 0xc0004b92c0 12 D0713 00:08:01.202880 786755 usertrap_amd64.go:225] [ 1140: 1141] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:08:01.202934 786755 usertrap_amd64.go:212] [ 1140: 1141] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.202947 786755 usertrap_amd64.go:122] [ 1140: 1141] Allocate a new trap: 0xc0004b92c0 13 D0713 00:08:01.202953 786755 usertrap_amd64.go:225] [ 1140: 1141] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:08:01.202968 786755 task_signals.go:470] [ 1140: 1140] Notified of signal 23 D0713 00:08:01.202982 786755 task_signals.go:220] [ 1140: 1140] Signal 23: delivering to handler D0713 00:08:01.210043 786755 usertrap_amd64.go:212] [ 1140: 1140] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.210069 786755 usertrap_amd64.go:122] [ 1140: 1140] Allocate a new trap: 0xc0004b92c0 14 D0713 00:08:01.210078 786755 usertrap_amd64.go:225] [ 1140: 1140] Apply the binary patch addr 46af29 trap addr 63460 ([184 37 1 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:08:01.213481 786755 task_signals.go:470] [ 1140: 1140] Notified of signal 23 D0713 00:08:01.213592 786755 task_signals.go:220] [ 1140: 1140] Signal 23: delivering to handler D0713 00:08:01.223080 786755 usertrap_amd64.go:212] [ 1140: 1140] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.223134 786755 usertrap_amd64.go:122] [ 1140: 1140] Allocate a new trap: 0xc0004b92c0 15 D0713 00:08:01.223151 786755 usertrap_amd64.go:225] [ 1140: 1140] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0713 00:08:01.223230 786755 task_exit.go:204] [ 1140: 1140] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.223281 786755 task_exit.go:204] [ 1140: 1140] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.223314 786755 task_signals.go:204] [ 1140: 1141] Signal 1140, PID: 1141, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.223327 786755 task_exit.go:204] [ 1140: 1141] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.223334 786755 task_exit.go:204] [ 1140: 1141] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.223355 786755 task_exit.go:204] [ 1140: 1141] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.223373 786755 task_signals.go:204] [ 1140: 1142] Signal 1140, PID: 1142, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.223385 786755 task_exit.go:204] [ 1140: 1142] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.223393 786755 task_exit.go:204] [ 1140: 1142] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.223400 786755 task_exit.go:204] [ 1140: 1142] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.223412 786755 task_signals.go:204] [ 1140: 1143] Signal 1140, PID: 1143, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.223422 786755 task_exit.go:204] [ 1140: 1143] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.226782 786755 task_exit.go:204] [ 1140: 1143] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.226876 786755 task_exit.go:204] [ 1140: 1143] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.226902 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.226954 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:01.226978 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.227355 786755 task_exit.go:204] [ 1140: 1140] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.228167 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.229666 786755 syscalls.go:262] [ 1144: 1144] Allocating stack with size of 8388608 bytes D0713 00:08:01.229817 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.231717 786755 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.231753 786755 usertrap_amd64.go:106] [ 1144: 1144] Map a usertrap vma at 69000 D0713 00:08:01.231834 786755 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc000e1f9e0 1 D0713 00:08:01.231871 786755 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:08:01.232321 786755 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.232392 786755 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc000e1f9e0 2 D0713 00:08:01.232408 786755 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:08:01.233101 786755 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.233158 786755 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc000e1f9e0 3 D0713 00:08:01.233239 786755 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:08:01.240006 786755 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.240041 786755 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc000e1f9e0 4 D0713 00:08:01.240058 786755 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:08:01.241235 786755 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.241264 786755 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc000e1f9e0 5 D0713 00:08:01.241280 786755 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:08:01.241366 786755 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.241384 786755 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc000e1f9e0 6 D0713 00:08:01.241393 786755 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:08:01.241639 786755 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.241662 786755 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc000e1f9e0 7 D0713 00:08:01.241675 786755 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:08:01.241861 786755 usertrap_amd64.go:212] [ 1144: 1145] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.241890 786755 usertrap_amd64.go:122] [ 1144: 1145] Allocate a new trap: 0xc000e1f9e0 8 D0713 00:08:01.241908 786755 usertrap_amd64.go:225] [ 1144: 1145] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:08:01.242191 786755 usertrap_amd64.go:212] [ 1144: 1145] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.242236 786755 usertrap_amd64.go:122] [ 1144: 1145] Allocate a new trap: 0xc000e1f9e0 9 D0713 00:08:01.242252 786755 usertrap_amd64.go:225] [ 1144: 1145] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:08:01.242347 786755 usertrap_amd64.go:212] [ 1144: 1147] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.242579 786755 usertrap_amd64.go:122] [ 1144: 1147] Allocate a new trap: 0xc000e1f9e0 10 D0713 00:08:01.242591 786755 usertrap_amd64.go:225] [ 1144: 1147] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:08:01.250963 786755 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.250999 786755 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc000e1f9e0 11 D0713 00:08:01.251013 786755 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:08:01.253515 786755 usertrap_amd64.go:212] [ 1144: 1145] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.253545 786755 usertrap_amd64.go:122] [ 1144: 1145] Allocate a new trap: 0xc000e1f9e0 12 D0713 00:08:01.253557 786755 usertrap_amd64.go:225] [ 1144: 1145] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:08:01.253609 786755 usertrap_amd64.go:212] [ 1144: 1145] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.253616 786755 usertrap_amd64.go:122] [ 1144: 1145] Allocate a new trap: 0xc000e1f9e0 13 D0713 00:08:01.253624 786755 usertrap_amd64.go:225] [ 1144: 1145] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:08:01.253643 786755 task_signals.go:470] [ 1144: 1144] Notified of signal 23 D0713 00:08:01.253745 786755 task_signals.go:220] [ 1144: 1144] Signal 23: delivering to handler I0713 00:08:01.262304 786755 compat.go:120] Unsupported syscall remap_file_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/remap_file_pages for more information. D0713 00:08:01.262431 786755 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.262453 786755 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc000e1f9e0 14 D0713 00:08:01.262470 786755 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:08:01.262521 786755 task_exit.go:204] [ 1144: 1144] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.262577 786755 task_exit.go:204] [ 1144: 1144] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.262609 786755 task_signals.go:204] [ 1144: 1145] Signal 1144, PID: 1145, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.262633 786755 task_exit.go:204] [ 1144: 1145] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.262642 786755 task_exit.go:204] [ 1144: 1145] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.262648 786755 task_exit.go:204] [ 1144: 1145] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.262665 786755 task_signals.go:204] [ 1144: 1147] Signal 1144, PID: 1147, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.262687 786755 task_exit.go:204] [ 1144: 1147] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.262695 786755 task_exit.go:204] [ 1144: 1147] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.262703 786755 task_exit.go:204] [ 1144: 1147] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.262717 786755 task_signals.go:204] [ 1144: 1148] Signal 1144, PID: 1148, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.262738 786755 task_exit.go:204] [ 1144: 1148] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.262746 786755 task_signals.go:204] [ 1144: 1146] Signal 1144, PID: 1146, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.262765 786755 task_exit.go:204] [ 1144: 1148] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.262796 786755 task_exit.go:204] [ 1144: 1148] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.262808 786755 task_exit.go:204] [ 1144: 1146] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.264337 786755 task_exit.go:204] [ 1144: 1146] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.264360 786755 task_exit.go:204] [ 1144: 1146] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.264376 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.264418 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:01.264425 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.264671 786755 task_exit.go:204] [ 1144: 1144] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.265362 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.281353 786755 syscalls.go:262] [ 1149: 1149] Allocating stack with size of 8388608 bytes D0713 00:08:01.278663 786755 task_signals.go:481] [ 6: 18] No task notified of signal 23 D0713 00:08:01.283752 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.284253 786755 task_signals.go:220] [ 6: 18] Signal 23: delivering to handler D0713 00:08:01.289405 786755 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.289493 786755 usertrap_amd64.go:106] [ 1149: 1149] Map a usertrap vma at 63000 D0713 00:08:01.289594 786755 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc000e1e030 1 D0713 00:08:01.289634 786755 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:08:01.290042 786755 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.290093 786755 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc000e1e030 2 D0713 00:08:01.290113 786755 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:08:01.291039 786755 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.291073 786755 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc000e1e030 3 D0713 00:08:01.291084 786755 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:08:01.302519 786755 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.302576 786755 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc000e1e030 4 D0713 00:08:01.302592 786755 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:08:01.303927 786755 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.303962 786755 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc000e1e030 5 D0713 00:08:01.303972 786755 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:08:01.304022 786755 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.304049 786755 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc000e1e030 6 D0713 00:08:01.304057 786755 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:08:01.304531 786755 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.304564 786755 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc000e1e030 7 D0713 00:08:01.304573 786755 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:08:01.304826 786755 usertrap_amd64.go:212] [ 1149: 1150] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.304855 786755 usertrap_amd64.go:122] [ 1149: 1150] Allocate a new trap: 0xc000e1e030 8 D0713 00:08:01.304890 786755 usertrap_amd64.go:225] [ 1149: 1150] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:08:01.305280 786755 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.305345 786755 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc000e1e030 9 D0713 00:08:01.305405 786755 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:08:01.305467 786755 usertrap_amd64.go:212] [ 1149: 1150] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.305517 786755 usertrap_amd64.go:122] [ 1149: 1150] Allocate a new trap: 0xc000e1e030 10 D0713 00:08:01.305536 786755 usertrap_amd64.go:225] [ 1149: 1150] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:08:01.313579 786755 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.313632 786755 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc000e1e030 11 D0713 00:08:01.313651 786755 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:08:01.316212 786755 usertrap_amd64.go:212] [ 1149: 1150] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.316233 786755 usertrap_amd64.go:122] [ 1149: 1150] Allocate a new trap: 0xc000e1e030 12 D0713 00:08:01.316248 786755 usertrap_amd64.go:225] [ 1149: 1150] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:08:01.316271 786755 usertrap_amd64.go:212] [ 1149: 1150] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.316277 786755 usertrap_amd64.go:122] [ 1149: 1150] Allocate a new trap: 0xc000e1e030 13 D0713 00:08:01.316284 786755 usertrap_amd64.go:225] [ 1149: 1150] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:08:01.316302 786755 task_signals.go:470] [ 1149: 1149] Notified of signal 23 D0713 00:08:01.316339 786755 task_signals.go:220] [ 1149: 1149] Signal 23: delivering to handler D0713 00:08:01.325329 786755 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.325389 786755 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc000e1e030 14 D0713 00:08:01.325410 786755 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:08:01.325530 786755 task_exit.go:204] [ 1149: 1149] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.325609 786755 task_exit.go:204] [ 1149: 1149] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.325650 786755 task_signals.go:204] [ 1149: 1153] Signal 1149, PID: 1153, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.325651 786755 task_signals.go:204] [ 1149: 1151] Signal 1149, PID: 1151, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.325670 786755 task_exit.go:204] [ 1149: 1153] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.325685 786755 task_exit.go:204] [ 1149: 1153] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.325690 786755 task_exit.go:204] [ 1149: 1153] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.325705 786755 task_exit.go:204] [ 1149: 1151] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.325742 786755 task_exit.go:204] [ 1149: 1151] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.325746 786755 task_exit.go:204] [ 1149: 1151] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.325756 786755 task_signals.go:204] [ 1149: 1152] Signal 1149, PID: 1152, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.325764 786755 task_exit.go:204] [ 1149: 1152] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.325768 786755 task_exit.go:204] [ 1149: 1152] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.325772 786755 task_exit.go:204] [ 1149: 1152] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.325779 786755 task_signals.go:204] [ 1149: 1150] Signal 1149, PID: 1150, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.325786 786755 task_exit.go:204] [ 1149: 1150] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.327349 786755 task_exit.go:204] [ 1149: 1150] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.327375 786755 task_exit.go:204] [ 1149: 1150] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.327391 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.327465 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:01.327478 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.327684 786755 task_exit.go:204] [ 1149: 1149] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.328749 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.330461 786755 syscalls.go:262] [ 1154: 1154] Allocating stack with size of 8388608 bytes D0713 00:08:01.330623 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.331785 786755 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.331831 786755 usertrap_amd64.go:106] [ 1154: 1154] Map a usertrap vma at 64000 D0713 00:08:01.331950 786755 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc00099a180 1 D0713 00:08:01.331973 786755 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:08:01.332347 786755 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.332398 786755 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc00099a180 2 D0713 00:08:01.332416 786755 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:08:01.333428 786755 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.333459 786755 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc00099a180 3 D0713 00:08:01.333473 786755 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:08:01.340006 786755 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.340034 786755 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc00099a180 4 D0713 00:08:01.340045 786755 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:08:01.341212 786755 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.341245 786755 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc00099a180 5 D0713 00:08:01.341257 786755 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:08:01.341302 786755 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.341310 786755 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc00099a180 6 D0713 00:08:01.341318 786755 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:08:01.341865 786755 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.341885 786755 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc00099a180 7 D0713 00:08:01.341897 786755 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:08:01.342127 786755 usertrap_amd64.go:212] [ 1154: 1155] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.342140 786755 usertrap_amd64.go:122] [ 1154: 1155] Allocate a new trap: 0xc00099a180 8 D0713 00:08:01.342149 786755 usertrap_amd64.go:225] [ 1154: 1155] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:08:01.342411 786755 usertrap_amd64.go:212] [ 1154: 1155] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.342424 786755 usertrap_amd64.go:122] [ 1154: 1155] Allocate a new trap: 0xc00099a180 9 D0713 00:08:01.342433 786755 usertrap_amd64.go:225] [ 1154: 1155] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:08:01.342535 786755 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.342566 786755 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc00099a180 10 D0713 00:08:01.342577 786755 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:08:01.342757 786755 usertrap_amd64.go:212] [ 1154: 1157] Found the pattern at ip 46b6e0:sysno 24 D0713 00:08:01.342775 786755 usertrap_amd64.go:122] [ 1154: 1157] Allocate a new trap: 0xc00099a180 11 D0713 00:08:01.342784 786755 usertrap_amd64.go:225] [ 1154: 1157] Apply the binary patch addr 46b6e0 trap addr 64370 ([184 24 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:08:01.343331 786755 usertrap_amd64.go:212] [ 1154: 1155] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.343358 786755 usertrap_amd64.go:122] [ 1154: 1155] Allocate a new trap: 0xc00099a180 12 D0713 00:08:01.343368 786755 usertrap_amd64.go:225] [ 1154: 1155] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:08:01.343492 786755 usertrap_amd64.go:212] [ 1154: 1155] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.343514 786755 usertrap_amd64.go:122] [ 1154: 1155] Allocate a new trap: 0xc00099a180 13 D0713 00:08:01.343524 786755 usertrap_amd64.go:225] [ 1154: 1155] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:08:01.343543 786755 task_signals.go:470] [ 1154: 1154] Notified of signal 23 D0713 00:08:01.343607 786755 task_signals.go:220] [ 1154: 1154] Signal 23: delivering to handler D0713 00:08:01.350566 786755 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.350605 786755 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc00099a180 14 D0713 00:08:01.350619 786755 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46af29 trap addr 64460 ([184 37 1 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:08:01.353877 786755 task_signals.go:470] [ 1154: 1154] Notified of signal 23 D0713 00:08:01.353942 786755 task_signals.go:220] [ 1154: 1154] Signal 23: delivering to handler D0713 00:08:01.361729 786755 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.361767 786755 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc00099a180 15 D0713 00:08:01.361782 786755 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0713 00:08:01.361892 786755 task_exit.go:204] [ 1154: 1154] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.361934 786755 task_exit.go:204] [ 1154: 1154] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.361950 786755 task_signals.go:204] [ 1154: 1155] Signal 1154, PID: 1155, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.361990 786755 task_signals.go:204] [ 1154: 1156] Signal 1154, PID: 1156, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.361973 786755 task_signals.go:204] [ 1154: 1157] Signal 1154, PID: 1157, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.362006 786755 task_exit.go:204] [ 1154: 1155] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.361973 786755 task_signals.go:204] [ 1154: 1158] Signal 1154, PID: 1158, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.362034 786755 task_exit.go:204] [ 1154: 1158] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.362061 786755 task_exit.go:204] [ 1154: 1158] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.362078 786755 task_exit.go:204] [ 1154: 1158] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.362100 786755 task_exit.go:204] [ 1154: 1155] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.362117 786755 task_exit.go:204] [ 1154: 1155] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.362138 786755 task_exit.go:204] [ 1154: 1156] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.362156 786755 task_exit.go:204] [ 1154: 1156] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.362164 786755 task_exit.go:204] [ 1154: 1156] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.362182 786755 task_exit.go:204] [ 1154: 1157] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.365089 786755 task_exit.go:204] [ 1154: 1157] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.365158 786755 task_exit.go:204] [ 1154: 1157] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.365184 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.365234 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:01.365258 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.365460 786755 task_exit.go:204] [ 1154: 1154] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.366025 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.367962 786755 syscalls.go:262] [ 1159: 1159] Allocating stack with size of 8388608 bytes D0713 00:08:01.368088 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.370877 786755 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.370972 786755 usertrap_amd64.go:106] [ 1159: 1159] Map a usertrap vma at 6a000 D0713 00:08:01.371151 786755 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0004b9200 1 D0713 00:08:01.371207 786755 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:08:01.371756 786755 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.371785 786755 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0004b9200 2 D0713 00:08:01.371797 786755 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:08:01.372513 786755 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.372529 786755 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0004b9200 3 D0713 00:08:01.372539 786755 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:08:01.380595 786755 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.380634 786755 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0004b9200 4 D0713 00:08:01.380647 786755 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:08:01.382021 786755 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.382073 786755 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0004b9200 5 D0713 00:08:01.382088 786755 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:08:01.382131 786755 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.382138 786755 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0004b9200 6 D0713 00:08:01.382144 786755 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:08:01.382515 786755 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.382536 786755 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0004b9200 7 D0713 00:08:01.382544 786755 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:08:01.382752 786755 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.382780 786755 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc0004b9200 8 D0713 00:08:01.382791 786755 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:08:01.383024 786755 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.383045 786755 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc0004b9200 9 D0713 00:08:01.383053 786755 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:08:01.383147 786755 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.383194 786755 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc0004b9200 10 D0713 00:08:01.383210 786755 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46b020 trap addr 6a320 ([184 39 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:08:01.383351 786755 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.383371 786755 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc0004b9200 11 D0713 00:08:01.383382 786755 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46b04f trap addr 6a370 ([184 234 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:08:01.383408 786755 task_signals.go:470] [ 1159: 1159] Notified of signal 23 D0713 00:08:01.383567 786755 task_signals.go:220] [ 1159: 1159] Signal 23: delivering to handler D0713 00:08:01.383636 786755 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.383651 786755 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0004b9200 12 D0713 00:08:01.383660 786755 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b57c trap addr 6a3c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:08:01.392801 786755 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.392832 786755 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0004b9200 13 D0713 00:08:01.392842 786755 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:08:01.394839 786755 task_signals.go:470] [ 1159: 1159] Notified of signal 23 D0713 00:08:01.395448 786755 task_signals.go:220] [ 1159: 1159] Signal 23: delivering to handler D0713 00:08:01.403915 786755 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.403956 786755 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0004b9200 14 D0713 00:08:01.403972 786755 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:08:01.404023 786755 task_exit.go:204] [ 1159: 1159] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.404051 786755 task_exit.go:204] [ 1159: 1159] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.404075 786755 task_signals.go:204] [ 1159: 1162] Signal 1159, PID: 1162, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.404100 786755 task_exit.go:204] [ 1159: 1162] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.404106 786755 task_exit.go:204] [ 1159: 1162] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.404111 786755 task_exit.go:204] [ 1159: 1162] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.404065 786755 task_signals.go:204] [ 1159: 1161] Signal 1159, PID: 1161, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.404130 786755 task_signals.go:204] [ 1159: 1163] Signal 1159, PID: 1163, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.404140 786755 task_exit.go:204] [ 1159: 1161] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.404149 786755 task_signals.go:204] [ 1159: 1160] Signal 1159, PID: 1160, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.404167 786755 task_exit.go:204] [ 1159: 1160] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.404173 786755 task_exit.go:204] [ 1159: 1160] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.404178 786755 task_exit.go:204] [ 1159: 1160] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.404187 786755 task_exit.go:204] [ 1159: 1163] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.404224 786755 task_exit.go:204] [ 1159: 1161] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.404259 786755 task_exit.go:204] [ 1159: 1161] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.405895 786755 task_exit.go:204] [ 1159: 1163] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.405926 786755 task_exit.go:204] [ 1159: 1163] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.405950 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.405981 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:01.405992 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.406127 786755 task_exit.go:204] [ 1159: 1159] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.406691 786755 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.408094 786755 syscalls.go:262] [ 1164: 1164] Allocating stack with size of 8388608 bytes D0713 00:08:01.408198 786755 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.410210 786755 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.410243 786755 usertrap_amd64.go:106] [ 1164: 1164] Map a usertrap vma at 64000 D0713 00:08:01.410321 786755 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc0004b92f0 1 D0713 00:08:01.410356 786755 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:08:01.410729 786755 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.410748 786755 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc0004b92f0 2 D0713 00:08:01.410756 786755 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:08:01.411363 786755 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.411386 786755 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc0004b92f0 3 D0713 00:08:01.411396 786755 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:08:01.417919 786755 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.417944 786755 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc0004b92f0 4 D0713 00:08:01.417954 786755 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:08:01.418880 786755 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.418900 786755 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc0004b92f0 5 D0713 00:08:01.418907 786755 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:08:01.421112 786755 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.421135 786755 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc0004b92f0 6 D0713 00:08:01.421142 786755 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:08:01.423199 786755 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.423229 786755 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc0004b92f0 7 D0713 00:08:01.423242 786755 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:08:01.423402 786755 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.423414 786755 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc0004b92f0 8 D0713 00:08:01.423423 786755 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:08:01.423699 786755 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.423712 786755 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc0004b92f0 9 D0713 00:08:01.423723 786755 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:08:01.423734 786755 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.423743 786755 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc0004b92f0 10 D0713 00:08:01.423751 786755 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:08:01.431691 786755 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.431717 786755 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc0004b92f0 11 D0713 00:08:01.431729 786755 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:08:01.434210 786755 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.434251 786755 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc0004b92f0 12 D0713 00:08:01.434261 786755 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:08:01.434312 786755 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.434325 786755 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc0004b92f0 13 D0713 00:08:01.434330 786755 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:08:01.434343 786755 task_signals.go:470] [ 1164: 1164] Notified of signal 23 D0713 00:08:01.434379 786755 task_signals.go:220] [ 1164: 1164] Signal 23: delivering to handler D0713 00:08:01.444324 786755 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.444397 786755 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc0004b92f0 14 D0713 00:08:01.444418 786755 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:08:01.444490 786755 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.444523 786755 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.444567 786755 task_signals.go:204] [ 1164: 1165] Signal 1164, PID: 1165, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.444599 786755 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.444610 786755 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.444616 786755 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.444646 786755 task_signals.go:204] [ 1164: 1166] Signal 1164, PID: 1166, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.444657 786755 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.444666 786755 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.444671 786755 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.444687 786755 task_signals.go:204] [ 1164: 1167] Signal 1164, PID: 1167, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.444706 786755 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.444715 786755 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.444722 786755 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.444758 786755 task_signals.go:204] [ 1164: 1168] Signal 1164, PID: 1168, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.444769 786755 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.446396 786755 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.446433 786755 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.446452 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.448401 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:01.448438 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.450918 786755 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.451828 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.453622 786755 syscalls.go:262] [ 1169: 1169] Allocating stack with size of 8388608 bytes D0713 00:08:01.453722 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.455090 786755 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.455131 786755 usertrap_amd64.go:106] [ 1169: 1169] Map a usertrap vma at 69000 D0713 00:08:01.455212 786755 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0004b9590 1 D0713 00:08:01.455247 786755 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:08:01.455553 786755 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.455576 786755 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0004b9590 2 D0713 00:08:01.455594 786755 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:08:01.456392 786755 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.456422 786755 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0004b9590 3 D0713 00:08:01.456434 786755 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:08:01.462722 786755 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.462777 786755 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0004b9590 4 D0713 00:08:01.462809 786755 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:08:01.467526 786755 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.467612 786755 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0004b9590 5 D0713 00:08:01.467638 786755 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:08:01.467687 786755 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.467702 786755 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0004b9590 6 D0713 00:08:01.467709 786755 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:08:01.467890 786755 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.467913 786755 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0004b9590 7 D0713 00:08:01.467920 786755 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:08:01.468151 786755 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.468174 786755 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc0004b9590 8 D0713 00:08:01.468226 786755 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:08:01.468495 786755 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.468559 786755 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc0004b9590 9 D0713 00:08:01.468596 786755 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:08:01.468820 786755 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.468854 786755 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0004b9590 10 D0713 00:08:01.468868 786755 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:08:01.476568 786755 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.476635 786755 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0004b9590 11 D0713 00:08:01.476650 786755 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:08:01.480336 786755 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.480417 786755 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc0004b9590 12 D0713 00:08:01.480440 786755 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:08:01.480471 786755 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.480477 786755 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc0004b9590 13 D0713 00:08:01.480496 786755 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:08:01.480585 786755 task_signals.go:470] [ 1169: 1169] Notified of signal 23 D0713 00:08:01.480662 786755 task_signals.go:220] [ 1169: 1169] Signal 23: delivering to handler D0713 00:08:01.490616 786755 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.490677 786755 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0004b9590 14 D0713 00:08:01.490706 786755 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:08:01.490764 786755 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.490795 786755 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.490813 786755 task_signals.go:204] [ 1169: 1170] Signal 1169, PID: 1170, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.490826 786755 task_signals.go:204] [ 1169: 1173] Signal 1169, PID: 1173, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.490854 786755 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.490828 786755 task_signals.go:204] [ 1169: 1171] Signal 1169, PID: 1171, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.490875 786755 task_signals.go:204] [ 1169: 1172] Signal 1169, PID: 1172, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.490891 786755 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.490897 786755 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.490916 786755 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.490938 786755 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.490945 786755 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.490955 786755 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.490961 786755 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.490965 786755 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.490973 786755 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.492335 786755 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.492368 786755 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.492404 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.493074 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:01.493106 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.493299 786755 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.493920 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.495563 786755 syscalls.go:262] [ 1174: 1174] Allocating stack with size of 8388608 bytes D0713 00:08:01.495690 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.496595 786755 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.496636 786755 usertrap_amd64.go:106] [ 1174: 1174] Map a usertrap vma at 62000 D0713 00:08:01.496713 786755 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00099a450 1 D0713 00:08:01.496752 786755 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:08:01.497104 786755 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.497129 786755 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00099a450 2 D0713 00:08:01.497140 786755 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:08:01.497895 786755 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.498005 786755 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00099a450 3 D0713 00:08:01.498027 786755 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:08:01.505213 786755 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.505252 786755 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00099a450 4 D0713 00:08:01.505271 786755 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:08:01.506384 786755 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.506471 786755 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00099a450 5 D0713 00:08:01.506545 786755 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:08:01.506610 786755 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.506620 786755 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00099a450 6 D0713 00:08:01.506630 786755 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:08:01.506886 786755 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.506913 786755 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00099a450 7 D0713 00:08:01.506920 786755 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:08:01.507073 786755 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.507087 786755 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc00099a450 8 D0713 00:08:01.507093 786755 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:08:01.507346 786755 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.507373 786755 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00099a450 9 D0713 00:08:01.507383 786755 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:08:01.507408 786755 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.507416 786755 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc00099a450 10 D0713 00:08:01.507424 786755 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:08:01.508090 786755 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.508152 786755 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc00099a450 11 D0713 00:08:01.508178 786755 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:08:01.508213 786755 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.508219 786755 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc00099a450 12 D0713 00:08:01.508233 786755 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:08:01.508286 786755 task_signals.go:470] [ 1174: 1174] Notified of signal 23 D0713 00:08:01.508318 786755 task_signals.go:220] [ 1174: 1174] Signal 23: delivering to handler executing program D0713 00:08:01.516173 786755 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.516223 786755 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00099a450 13 D0713 00:08:01.516240 786755 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:08:01.519081 786755 task_signals.go:470] [ 1174: 1174] Notified of signal 23 D0713 00:08:01.519177 786755 task_signals.go:220] [ 1174: 1174] Signal 23: delivering to handler D0713 00:08:01.529767 786755 task_signals.go:470] [ 1174: 1174] Notified of signal 23 D0713 00:08:01.529945 786755 task_signals.go:220] [ 1174: 1174] Signal 23: delivering to handler D0713 00:08:01.532732 786755 sys_signal.go:495] [ 1174: 1174] Restart block missing in restart_syscall(2). Did ptrace inject a return value of ERESTART_RESTARTBLOCK? D0713 00:08:01.532833 786755 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.532845 786755 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00099a450 14 D0713 00:08:01.532858 786755 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:08:01.532921 786755 task_exit.go:204] [ 1174: 1174] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.533004 786755 task_signals.go:204] [ 1174: 1177] Signal 1174, PID: 1177, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.533004 786755 task_signals.go:204] [ 1174: 1176] Signal 1174, PID: 1176, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.533041 786755 task_signals.go:204] [ 1174: 1178] Signal 1174, PID: 1178, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.533070 786755 task_exit.go:204] [ 1174: 1174] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.533091 786755 task_signals.go:204] [ 1174: 1175] Signal 1174, PID: 1175, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.533123 786755 task_exit.go:204] [ 1174: 1177] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.533203 786755 task_exit.go:204] [ 1174: 1177] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.533221 786755 task_exit.go:204] [ 1174: 1177] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.533253 786755 task_exit.go:204] [ 1174: 1175] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.533301 786755 task_exit.go:204] [ 1174: 1175] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.533320 786755 task_exit.go:204] [ 1174: 1175] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.533332 786755 task_exit.go:204] [ 1174: 1176] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.533389 786755 task_exit.go:204] [ 1174: 1176] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.533405 786755 task_exit.go:204] [ 1174: 1176] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.533417 786755 task_exit.go:204] [ 1174: 1178] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.535274 786755 task_exit.go:204] [ 1174: 1178] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.535312 786755 task_exit.go:204] [ 1174: 1178] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.535331 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.535360 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:01.535416 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.535573 786755 task_exit.go:204] [ 1174: 1174] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.536333 786755 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.537681 786755 syscalls.go:262] [ 1179: 1179] Allocating stack with size of 8388608 bytes D0713 00:08:01.537883 786755 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.539558 786755 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.539594 786755 usertrap_amd64.go:106] [ 1179: 1179] Map a usertrap vma at 68000 D0713 00:08:01.539807 786755 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0004b9aa0 1 D0713 00:08:01.539864 786755 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:08:01.540331 786755 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.540358 786755 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0004b9aa0 2 D0713 00:08:01.540371 786755 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:08:01.541016 786755 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.541038 786755 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0004b9aa0 3 D0713 00:08:01.541050 786755 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:08:01.548702 786755 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.548764 786755 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0004b9aa0 4 D0713 00:08:01.548785 786755 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:08:01.550209 786755 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.550264 786755 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0004b9aa0 5 D0713 00:08:01.550279 786755 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:08:01.550329 786755 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.550348 786755 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0004b9aa0 6 D0713 00:08:01.550357 786755 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:08:01.551095 786755 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.551128 786755 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0004b9aa0 7 D0713 00:08:01.551141 786755 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:08:01.551447 786755 usertrap_amd64.go:212] [ 1179: 1180] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.551462 786755 usertrap_amd64.go:122] [ 1179: 1180] Allocate a new trap: 0xc0004b9aa0 8 D0713 00:08:01.551475 786755 usertrap_amd64.go:225] [ 1179: 1180] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:08:01.551932 786755 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.551981 786755 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0004b9aa0 9 D0713 00:08:01.552006 786755 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:08:01.552081 786755 usertrap_amd64.go:212] [ 1179: 1180] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.552127 786755 usertrap_amd64.go:122] [ 1179: 1180] Allocate a new trap: 0xc0004b9aa0 10 D0713 00:08:01.552365 786755 usertrap_amd64.go:225] [ 1179: 1180] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:08:01.562438 786755 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.562471 786755 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0004b9aa0 11 D0713 00:08:01.562485 786755 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:08:01.562562 786755 usertrap_amd64.go:212] [ 1179: 1180] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.562572 786755 usertrap_amd64.go:122] [ 1179: 1180] Allocate a new trap: 0xc0004b9aa0 12 D0713 00:08:01.562582 786755 usertrap_amd64.go:225] [ 1179: 1180] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:08:01.562616 786755 usertrap_amd64.go:212] [ 1179: 1180] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.562624 786755 usertrap_amd64.go:122] [ 1179: 1180] Allocate a new trap: 0xc0004b9aa0 13 D0713 00:08:01.562631 786755 usertrap_amd64.go:225] [ 1179: 1180] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:08:01.562730 786755 task_signals.go:470] [ 1179: 1179] Notified of signal 23 D0713 00:08:01.562785 786755 task_signals.go:220] [ 1179: 1179] Signal 23: delivering to handler D0713 00:08:01.573589 786755 task_signals.go:470] [ 1179: 1179] Notified of signal 23 D0713 00:08:01.573856 786755 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.574395 786755 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0004b9aa0 14 D0713 00:08:01.574422 786755 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:08:01.574452 786755 task_signals.go:220] [ 1179: 1179] Signal 23: delivering to handler D0713 00:08:01.574539 786755 task_exit.go:204] [ 1179: 1179] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.574585 786755 task_signals.go:204] [ 1179: 1180] Signal 1179, PID: 1180, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.574606 786755 task_signals.go:204] [ 1179: 1182] Signal 1179, PID: 1182, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.574625 786755 task_signals.go:204] [ 1179: 1181] Signal 1179, PID: 1181, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.574636 786755 task_signals.go:204] [ 1179: 1183] Signal 1179, PID: 1183, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.574646 786755 task_exit.go:204] [ 1179: 1179] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.574672 786755 task_signals.go:204] [ 1179: 1184] Signal 1179, PID: 1184, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.574692 786755 task_exit.go:204] [ 1179: 1184] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.574701 786755 task_exit.go:204] [ 1179: 1184] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.574705 786755 task_exit.go:204] [ 1179: 1184] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.574731 786755 task_exit.go:204] [ 1179: 1180] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.574757 786755 task_exit.go:204] [ 1179: 1180] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.574772 786755 task_exit.go:204] [ 1179: 1180] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.574783 786755 task_exit.go:204] [ 1179: 1182] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.574824 786755 task_exit.go:204] [ 1179: 1182] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.574833 786755 task_exit.go:204] [ 1179: 1182] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.574860 786755 task_exit.go:204] [ 1179: 1181] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.574879 786755 task_exit.go:204] [ 1179: 1181] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.574886 786755 task_exit.go:204] [ 1179: 1181] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.574903 786755 task_exit.go:204] [ 1179: 1183] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.576447 786755 task_exit.go:204] [ 1179: 1183] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.576477 786755 task_exit.go:204] [ 1179: 1183] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.576494 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.576552 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:01.576601 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.576861 786755 task_exit.go:204] [ 1179: 1179] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.577503 786755 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.578822 786755 syscalls.go:262] [ 1185: 1185] Allocating stack with size of 8388608 bytes D0713 00:08:01.578974 786755 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.580158 786755 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.580261 786755 usertrap_amd64.go:106] [ 1185: 1185] Map a usertrap vma at 64000 D0713 00:08:01.580443 786755 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc000604b40 1 D0713 00:08:01.580477 786755 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:08:01.580820 786755 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.580844 786755 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc000604b40 2 D0713 00:08:01.580854 786755 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:08:01.581418 786755 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.581490 786755 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc000604b40 3 D0713 00:08:01.581515 786755 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:08:01.587567 786755 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.587617 786755 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc000604b40 4 D0713 00:08:01.587631 786755 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:08:01.588882 786755 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.588909 786755 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc000604b40 5 D0713 00:08:01.588922 786755 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:08:01.588992 786755 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.589011 786755 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc000604b40 6 D0713 00:08:01.589022 786755 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:08:01.589619 786755 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.589644 786755 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc000604b40 7 D0713 00:08:01.589656 786755 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:08:01.589891 786755 usertrap_amd64.go:212] [ 1185: 1186] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.589917 786755 usertrap_amd64.go:122] [ 1185: 1186] Allocate a new trap: 0xc000604b40 8 D0713 00:08:01.589932 786755 usertrap_amd64.go:225] [ 1185: 1186] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:08:01.590233 786755 usertrap_amd64.go:212] [ 1185: 1186] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.590262 786755 usertrap_amd64.go:122] [ 1185: 1186] Allocate a new trap: 0xc000604b40 9 D0713 00:08:01.590275 786755 usertrap_amd64.go:225] [ 1185: 1186] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:08:01.590403 786755 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.590428 786755 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc000604b40 10 D0713 00:08:01.590439 786755 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:08:01.598371 786755 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.598410 786755 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc000604b40 11 D0713 00:08:01.598426 786755 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:08:01.601484 786755 usertrap_amd64.go:212] [ 1185: 1186] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.601527 786755 usertrap_amd64.go:122] [ 1185: 1186] Allocate a new trap: 0xc000604b40 12 D0713 00:08:01.601543 786755 usertrap_amd64.go:225] [ 1185: 1186] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:08:01.601586 786755 usertrap_amd64.go:212] [ 1185: 1186] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.601599 786755 usertrap_amd64.go:122] [ 1185: 1186] Allocate a new trap: 0xc000604b40 13 D0713 00:08:01.601607 786755 usertrap_amd64.go:225] [ 1185: 1186] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:08:01.601626 786755 task_signals.go:470] [ 1185: 1185] Notified of signal 23 D0713 00:08:01.601701 786755 task_signals.go:220] [ 1185: 1185] Signal 23: delivering to handler D0713 00:08:01.614211 786755 usertrap_amd64.go:212] [ 1185: 1185] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.614269 786755 usertrap_amd64.go:122] [ 1185: 1185] Allocate a new trap: 0xc000604b40 14 D0713 00:08:01.614279 786755 task_signals.go:470] [ 1185: 1185] Notified of signal 23 D0713 00:08:01.614293 786755 usertrap_amd64.go:225] [ 1185: 1185] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:08:01.614330 786755 task_signals.go:220] [ 1185: 1185] Signal 23: delivering to handler D0713 00:08:01.614423 786755 task_exit.go:204] [ 1185: 1185] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.614483 786755 task_signals.go:204] [ 1185: 1187] Signal 1185, PID: 1187, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.614532 786755 task_signals.go:204] [ 1185: 1189] Signal 1185, PID: 1189, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.614526 786755 task_signals.go:204] [ 1185: 1186] Signal 1185, PID: 1186, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.614553 786755 task_exit.go:204] [ 1185: 1185] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.614601 786755 task_signals.go:204] [ 1185: 1188] Signal 1185, PID: 1188, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.614624 786755 task_exit.go:204] [ 1185: 1188] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.614635 786755 task_exit.go:204] [ 1185: 1188] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.614647 786755 task_exit.go:204] [ 1185: 1188] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.614658 786755 task_exit.go:204] [ 1185: 1187] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.614668 786755 task_exit.go:204] [ 1185: 1187] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.614672 786755 task_exit.go:204] [ 1185: 1187] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.614679 786755 task_exit.go:204] [ 1185: 1189] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.614689 786755 task_exit.go:204] [ 1185: 1189] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.614692 786755 task_exit.go:204] [ 1185: 1189] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.614698 786755 task_exit.go:204] [ 1185: 1186] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.616230 786755 task_exit.go:204] [ 1185: 1186] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.616264 786755 task_exit.go:204] [ 1185: 1186] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.616279 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.616310 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.616580 786755 task_exit.go:204] [ 1185: 1185] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.617284 786755 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.618590 786755 syscalls.go:262] [ 1190: 1190] Allocating stack with size of 8388608 bytes D0713 00:08:01.618702 786755 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.619511 786755 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.619557 786755 usertrap_amd64.go:106] [ 1190: 1190] Map a usertrap vma at 6a000 D0713 00:08:01.619700 786755 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc000604c90 1 D0713 00:08:01.619778 786755 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:08:01.620122 786755 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.620151 786755 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc000604c90 2 D0713 00:08:01.620166 786755 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:08:01.620802 786755 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.620829 786755 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc000604c90 3 D0713 00:08:01.620840 786755 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:08:01.627505 786755 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.627557 786755 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc000604c90 4 D0713 00:08:01.627576 786755 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:08:01.630351 786755 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.630375 786755 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc000604c90 5 D0713 00:08:01.630385 786755 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:08:01.630421 786755 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.630425 786755 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc000604c90 6 D0713 00:08:01.630430 786755 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:08:01.630630 786755 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.630650 786755 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc000604c90 7 D0713 00:08:01.630658 786755 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:08:01.630841 786755 usertrap_amd64.go:212] [ 1190: 1191] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.630858 786755 usertrap_amd64.go:122] [ 1190: 1191] Allocate a new trap: 0xc000604c90 8 D0713 00:08:01.630869 786755 usertrap_amd64.go:225] [ 1190: 1191] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:08:01.631029 786755 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.631038 786755 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc000604c90 9 D0713 00:08:01.631046 786755 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:08:01.632509 786755 usertrap_amd64.go:212] [ 1190: 1191] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.632536 786755 usertrap_amd64.go:122] [ 1190: 1191] Allocate a new trap: 0xc000604c90 10 D0713 00:08:01.632547 786755 usertrap_amd64.go:225] [ 1190: 1191] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:08:01.643580 786755 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.643644 786755 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc000604c90 11 D0713 00:08:01.643660 786755 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:08:01.649263 786755 usertrap_amd64.go:212] [ 1190: 1191] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.649711 786755 usertrap_amd64.go:122] [ 1190: 1191] Allocate a new trap: 0xc000604c90 12 D0713 00:08:01.649810 786755 usertrap_amd64.go:225] [ 1190: 1191] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:08:01.650087 786755 usertrap_amd64.go:212] [ 1190: 1191] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.650143 786755 usertrap_amd64.go:122] [ 1190: 1191] Allocate a new trap: 0xc000604c90 13 D0713 00:08:01.650161 786755 usertrap_amd64.go:225] [ 1190: 1191] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:08:01.650231 786755 task_signals.go:470] [ 1190: 1190] Notified of signal 23 D0713 00:08:01.650541 786755 task_signals.go:220] [ 1190: 1190] Signal 23: delivering to handler D0713 00:08:01.656765 786755 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.656806 786755 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc000604c90 14 D0713 00:08:01.656823 786755 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:08:01.656860 786755 task_exit.go:204] [ 1190: 1190] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.656910 786755 task_exit.go:204] [ 1190: 1190] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.656987 786755 task_signals.go:204] [ 1190: 1191] Signal 1190, PID: 1191, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.657009 786755 task_exit.go:204] [ 1190: 1191] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.657018 786755 task_exit.go:204] [ 1190: 1191] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.657024 786755 task_exit.go:204] [ 1190: 1191] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.657050 786755 task_signals.go:204] [ 1190: 1192] Signal 1190, PID: 1192, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.657062 786755 task_exit.go:204] [ 1190: 1192] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.657069 786755 task_exit.go:204] [ 1190: 1192] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.657074 786755 task_exit.go:204] [ 1190: 1192] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.657090 786755 task_signals.go:204] [ 1190: 1194] Signal 1190, PID: 1194, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.657115 786755 task_exit.go:204] [ 1190: 1194] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.657215 786755 task_signals.go:204] [ 1190: 1193] Signal 1190, PID: 1193, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.657253 786755 task_exit.go:204] [ 1190: 1194] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.657278 786755 task_exit.go:204] [ 1190: 1194] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.657304 786755 task_exit.go:204] [ 1190: 1193] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.658899 786755 task_exit.go:204] [ 1190: 1193] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.658986 786755 task_exit.go:204] [ 1190: 1193] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.659089 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.663047 786755 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:08:01.663081 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.663216 786755 task_exit.go:204] [ 1190: 1190] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.663928 786755 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.665337 786755 syscalls.go:262] [ 1195: 1195] Allocating stack with size of 8388608 bytes D0713 00:08:01.665437 786755 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.668056 786755 usertrap_amd64.go:212] [ 1195: 1195] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.668097 786755 usertrap_amd64.go:106] [ 1195: 1195] Map a usertrap vma at 64000 D0713 00:08:01.668157 786755 usertrap_amd64.go:122] [ 1195: 1195] Allocate a new trap: 0xc00099acc0 1 D0713 00:08:01.668192 786755 usertrap_amd64.go:225] [ 1195: 1195] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:08:01.668392 786755 usertrap_amd64.go:212] [ 1195: 1195] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.668414 786755 usertrap_amd64.go:122] [ 1195: 1195] Allocate a new trap: 0xc00099acc0 2 D0713 00:08:01.668425 786755 usertrap_amd64.go:225] [ 1195: 1195] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:08:01.669062 786755 usertrap_amd64.go:212] [ 1195: 1195] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.669089 786755 usertrap_amd64.go:122] [ 1195: 1195] Allocate a new trap: 0xc00099acc0 3 D0713 00:08:01.669102 786755 usertrap_amd64.go:225] [ 1195: 1195] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:08:01.674620 786755 usertrap_amd64.go:212] [ 1195: 1195] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.674714 786755 usertrap_amd64.go:122] [ 1195: 1195] Allocate a new trap: 0xc00099acc0 4 D0713 00:08:01.674798 786755 usertrap_amd64.go:225] [ 1195: 1195] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:08:01.676172 786755 usertrap_amd64.go:212] [ 1195: 1195] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.676198 786755 usertrap_amd64.go:122] [ 1195: 1195] Allocate a new trap: 0xc00099acc0 5 D0713 00:08:01.676210 786755 usertrap_amd64.go:225] [ 1195: 1195] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:08:01.676357 786755 usertrap_amd64.go:212] [ 1195: 1195] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.676377 786755 usertrap_amd64.go:122] [ 1195: 1195] Allocate a new trap: 0xc00099acc0 6 D0713 00:08:01.676388 786755 usertrap_amd64.go:225] [ 1195: 1195] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:08:01.676621 786755 usertrap_amd64.go:212] [ 1195: 1195] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.676638 786755 usertrap_amd64.go:122] [ 1195: 1195] Allocate a new trap: 0xc00099acc0 7 D0713 00:08:01.676651 786755 usertrap_amd64.go:225] [ 1195: 1195] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:08:01.676827 786755 usertrap_amd64.go:212] [ 1195: 1196] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.676857 786755 usertrap_amd64.go:122] [ 1195: 1196] Allocate a new trap: 0xc00099acc0 8 D0713 00:08:01.676867 786755 usertrap_amd64.go:225] [ 1195: 1196] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:08:01.677037 786755 usertrap_amd64.go:212] [ 1195: 1195] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.677091 786755 usertrap_amd64.go:122] [ 1195: 1195] Allocate a new trap: 0xc00099acc0 9 D0713 00:08:01.677104 786755 usertrap_amd64.go:225] [ 1195: 1195] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:08:01.677127 786755 usertrap_amd64.go:212] [ 1195: 1196] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.677134 786755 usertrap_amd64.go:122] [ 1195: 1196] Allocate a new trap: 0xc00099acc0 10 D0713 00:08:01.677142 786755 usertrap_amd64.go:225] [ 1195: 1196] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:08:01.677258 786755 usertrap_amd64.go:212] [ 1195: 1196] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.677277 786755 usertrap_amd64.go:122] [ 1195: 1196] Allocate a new trap: 0xc00099acc0 11 D0713 00:08:01.677288 786755 usertrap_amd64.go:225] [ 1195: 1196] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:08:01.677326 786755 usertrap_amd64.go:212] [ 1195: 1197] Found the pattern at ip 46b6e0:sysno 24 D0713 00:08:01.677352 786755 usertrap_amd64.go:122] [ 1195: 1197] Allocate a new trap: 0xc00099acc0 12 D0713 00:08:01.677362 786755 usertrap_amd64.go:225] [ 1195: 1197] Apply the binary patch addr 46b6e0 trap addr 643c0 ([184 24 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:08:01.677404 786755 usertrap_amd64.go:212] [ 1195: 1196] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.677417 786755 usertrap_amd64.go:122] [ 1195: 1196] Allocate a new trap: 0xc00099acc0 13 D0713 00:08:01.677431 786755 usertrap_amd64.go:225] [ 1195: 1196] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:08:01.677449 786755 task_signals.go:470] [ 1195: 1198] Notified of signal 23 D0713 00:08:01.677470 786755 task_signals.go:179] [ 1195: 1198] Restarting syscall 202: interrupted by signal 23 D0713 00:08:01.677483 786755 task_signals.go:220] [ 1195: 1198] Signal 23: delivering to handler D0713 00:08:01.677784 786755 task_signals.go:470] [ 1195: 1195] Notified of signal 23 D0713 00:08:01.677862 786755 task_signals.go:220] [ 1195: 1195] Signal 23: delivering to handler D0713 00:08:01.686190 786755 usertrap_amd64.go:212] [ 1195: 1195] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.686234 786755 usertrap_amd64.go:122] [ 1195: 1195] Allocate a new trap: 0xc00099acc0 14 D0713 00:08:01.686249 786755 usertrap_amd64.go:225] [ 1195: 1195] Apply the binary patch addr 46af29 trap addr 64460 ([184 37 1 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:08:01.689620 786755 task_signals.go:470] [ 1195: 1195] Notified of signal 23 D0713 00:08:01.689744 786755 task_signals.go:220] [ 1195: 1195] Signal 23: delivering to handler D0713 00:08:01.699275 786755 usertrap_amd64.go:212] [ 1195: 1195] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.699351 786755 usertrap_amd64.go:122] [ 1195: 1195] Allocate a new trap: 0xc00099acc0 15 D0713 00:08:01.699371 786755 usertrap_amd64.go:225] [ 1195: 1195] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0713 00:08:01.699481 786755 task_exit.go:204] [ 1195: 1195] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.699551 786755 task_exit.go:204] [ 1195: 1195] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.699578 786755 task_signals.go:204] [ 1195: 1198] Signal 1195, PID: 1198, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.699577 786755 task_signals.go:204] [ 1195: 1196] Signal 1195, PID: 1196, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.699606 786755 task_exit.go:204] [ 1195: 1198] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.699645 786755 task_signals.go:204] [ 1195: 1199] Signal 1195, PID: 1199, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.699731 786755 task_signals.go:204] [ 1195: 1197] Signal 1195, PID: 1197, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.699750 786755 task_exit.go:204] [ 1195: 1198] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.699757 786755 task_exit.go:204] [ 1195: 1198] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.699771 786755 task_exit.go:204] [ 1195: 1196] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.699779 786755 task_exit.go:204] [ 1195: 1196] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.699785 786755 task_exit.go:204] [ 1195: 1196] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.699794 786755 task_exit.go:204] [ 1195: 1199] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.699813 786755 task_exit.go:204] [ 1195: 1199] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.699819 786755 task_exit.go:204] [ 1195: 1199] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.699833 786755 task_exit.go:204] [ 1195: 1197] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.701656 786755 task_exit.go:204] [ 1195: 1197] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.701718 786755 task_exit.go:204] [ 1195: 1197] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.701739 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.705713 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:01.705768 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.706301 786755 task_exit.go:204] [ 1195: 1195] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.707525 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.709215 786755 syscalls.go:262] [ 1200: 1200] Allocating stack with size of 8388608 bytes D0713 00:08:01.709400 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.711377 786755 usertrap_amd64.go:212] [ 1200: 1200] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.711451 786755 usertrap_amd64.go:106] [ 1200: 1200] Map a usertrap vma at 67000 D0713 00:08:01.711567 786755 usertrap_amd64.go:122] [ 1200: 1200] Allocate a new trap: 0xc000e1ed50 1 D0713 00:08:01.711612 786755 usertrap_amd64.go:225] [ 1200: 1200] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:08:01.712039 786755 usertrap_amd64.go:212] [ 1200: 1200] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.712095 786755 usertrap_amd64.go:122] [ 1200: 1200] Allocate a new trap: 0xc000e1ed50 2 D0713 00:08:01.712114 786755 usertrap_amd64.go:225] [ 1200: 1200] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:08:01.713683 786755 usertrap_amd64.go:212] [ 1200: 1200] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.713714 786755 usertrap_amd64.go:122] [ 1200: 1200] Allocate a new trap: 0xc000e1ed50 3 D0713 00:08:01.713728 786755 usertrap_amd64.go:225] [ 1200: 1200] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:08:01.725551 786755 usertrap_amd64.go:212] [ 1200: 1200] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.725618 786755 usertrap_amd64.go:122] [ 1200: 1200] Allocate a new trap: 0xc000e1ed50 4 D0713 00:08:01.725641 786755 usertrap_amd64.go:225] [ 1200: 1200] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:08:01.728453 786755 usertrap_amd64.go:212] [ 1200: 1200] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.728570 786755 usertrap_amd64.go:122] [ 1200: 1200] Allocate a new trap: 0xc000e1ed50 5 D0713 00:08:01.728644 786755 usertrap_amd64.go:225] [ 1200: 1200] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:08:01.728727 786755 usertrap_amd64.go:212] [ 1200: 1200] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.728745 786755 usertrap_amd64.go:122] [ 1200: 1200] Allocate a new trap: 0xc000e1ed50 6 D0713 00:08:01.728752 786755 usertrap_amd64.go:225] [ 1200: 1200] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:08:01.729239 786755 usertrap_amd64.go:212] [ 1200: 1200] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.729319 786755 usertrap_amd64.go:122] [ 1200: 1200] Allocate a new trap: 0xc000e1ed50 7 D0713 00:08:01.729391 786755 usertrap_amd64.go:225] [ 1200: 1200] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:08:01.729843 786755 usertrap_amd64.go:212] [ 1200: 1201] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.729891 786755 usertrap_amd64.go:122] [ 1200: 1201] Allocate a new trap: 0xc000e1ed50 8 D0713 00:08:01.729918 786755 usertrap_amd64.go:225] [ 1200: 1201] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:08:01.730195 786755 usertrap_amd64.go:212] [ 1200: 1201] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.730225 786755 usertrap_amd64.go:122] [ 1200: 1201] Allocate a new trap: 0xc000e1ed50 9 D0713 00:08:01.730242 786755 usertrap_amd64.go:225] [ 1200: 1201] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:08:01.730451 786755 usertrap_amd64.go:212] [ 1200: 1200] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.730474 786755 usertrap_amd64.go:122] [ 1200: 1200] Allocate a new trap: 0xc000e1ed50 10 D0713 00:08:01.730484 786755 usertrap_amd64.go:225] [ 1200: 1200] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:08:01.739686 786755 usertrap_amd64.go:212] [ 1200: 1200] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.739734 786755 usertrap_amd64.go:122] [ 1200: 1200] Allocate a new trap: 0xc000e1ed50 11 D0713 00:08:01.739753 786755 usertrap_amd64.go:225] [ 1200: 1200] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:08:01.745167 786755 usertrap_amd64.go:212] [ 1200: 1201] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.745223 786755 usertrap_amd64.go:122] [ 1200: 1201] Allocate a new trap: 0xc000e1ed50 12 D0713 00:08:01.745242 786755 usertrap_amd64.go:225] [ 1200: 1201] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:08:01.745289 786755 usertrap_amd64.go:212] [ 1200: 1201] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.745299 786755 usertrap_amd64.go:122] [ 1200: 1201] Allocate a new trap: 0xc000e1ed50 13 D0713 00:08:01.745308 786755 usertrap_amd64.go:225] [ 1200: 1201] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:08:01.745368 786755 task_signals.go:470] [ 1200: 1200] Notified of signal 23 D0713 00:08:01.745495 786755 task_signals.go:220] [ 1200: 1200] Signal 23: delivering to handler D0713 00:08:01.758153 786755 task_signals.go:470] [ 1200: 1200] Notified of signal 23 D0713 00:08:01.758365 786755 task_signals.go:220] [ 1200: 1200] Signal 23: delivering to handler D0713 00:08:01.758637 786755 task_signals.go:470] [ 1200: 1200] Notified of signal 23 D0713 00:08:01.758728 786755 task_signals.go:220] [ 1200: 1200] Signal 23: delivering to handler D0713 00:08:01.760529 786755 task_signals.go:470] [ 1200: 1200] Notified of signal 23 D0713 00:08:01.760663 786755 task_signals.go:220] [ 1200: 1200] Signal 23: delivering to handler D0713 00:08:01.761605 786755 usertrap_amd64.go:212] [ 1200: 1200] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.761640 786755 usertrap_amd64.go:122] [ 1200: 1200] Allocate a new trap: 0xc000e1ed50 14 D0713 00:08:01.761655 786755 usertrap_amd64.go:225] [ 1200: 1200] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:08:01.761780 786755 task_exit.go:204] [ 1200: 1200] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.761820 786755 task_exit.go:204] [ 1200: 1200] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.761857 786755 task_signals.go:204] [ 1200: 1201] Signal 1200, PID: 1201, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.761875 786755 task_exit.go:204] [ 1200: 1201] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.761893 786755 task_exit.go:204] [ 1200: 1201] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.761900 786755 task_exit.go:204] [ 1200: 1201] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.761930 786755 task_signals.go:204] [ 1200: 1202] Signal 1200, PID: 1202, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.761958 786755 task_exit.go:204] [ 1200: 1202] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.761971 786755 task_exit.go:204] [ 1200: 1202] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.761976 786755 task_exit.go:204] [ 1200: 1202] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.761934 786755 task_signals.go:204] [ 1200: 1204] Signal 1200, PID: 1204, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.761990 786755 task_exit.go:204] [ 1200: 1204] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.761998 786755 task_exit.go:204] [ 1200: 1204] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.762014 786755 task_exit.go:204] [ 1200: 1204] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.761903 786755 task_signals.go:204] [ 1200: 1203] Signal 1200, PID: 1203, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.762027 786755 task_exit.go:204] [ 1200: 1203] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.763610 786755 task_exit.go:204] [ 1200: 1203] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.763635 786755 task_exit.go:204] [ 1200: 1203] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.763650 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.765328 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:01.765382 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.765454 786755 task_exit.go:204] [ 1200: 1200] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.766019 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.767783 786755 syscalls.go:262] [ 1205: 1205] Allocating stack with size of 8388608 bytes D0713 00:08:01.767888 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.769199 786755 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.769315 786755 usertrap_amd64.go:106] [ 1205: 1205] Map a usertrap vma at 69000 D0713 00:08:01.769490 786755 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc0004b9e90 1 D0713 00:08:01.769540 786755 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:08:01.770526 786755 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.770558 786755 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc0004b9e90 2 D0713 00:08:01.770572 786755 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:08:01.771521 786755 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.771551 786755 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc0004b9e90 3 D0713 00:08:01.771565 786755 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:08:01.779979 786755 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.780047 786755 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc0004b9e90 4 D0713 00:08:01.780066 786755 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:08:01.781275 786755 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.781303 786755 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc0004b9e90 5 D0713 00:08:01.781318 786755 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:08:01.781385 786755 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.781393 786755 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc0004b9e90 6 D0713 00:08:01.781402 786755 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:08:01.781635 786755 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.781655 786755 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc0004b9e90 7 D0713 00:08:01.781666 786755 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:08:01.781880 786755 usertrap_amd64.go:212] [ 1205: 1206] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.781907 786755 usertrap_amd64.go:122] [ 1205: 1206] Allocate a new trap: 0xc0004b9e90 8 D0713 00:08:01.781916 786755 usertrap_amd64.go:225] [ 1205: 1206] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:08:01.782131 786755 usertrap_amd64.go:212] [ 1205: 1206] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.782151 786755 usertrap_amd64.go:122] [ 1205: 1206] Allocate a new trap: 0xc0004b9e90 9 D0713 00:08:01.782161 786755 usertrap_amd64.go:225] [ 1205: 1206] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:08:01.782222 786755 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.782245 786755 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc0004b9e90 10 D0713 00:08:01.782255 786755 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:08:01.792730 786755 usertrap_amd64.go:212] [ 1205: 1206] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.792760 786755 usertrap_amd64.go:122] [ 1205: 1206] Allocate a new trap: 0xc0004b9e90 11 D0713 00:08:01.792771 786755 usertrap_amd64.go:225] [ 1205: 1206] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:08:01.792795 786755 usertrap_amd64.go:212] [ 1205: 1206] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.792813 786755 usertrap_amd64.go:122] [ 1205: 1206] Allocate a new trap: 0xc0004b9e90 12 D0713 00:08:01.792823 786755 usertrap_amd64.go:225] [ 1205: 1206] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:08:01.792859 786755 task_signals.go:470] [ 1205: 1205] Notified of signal 23 D0713 00:08:01.792936 786755 task_signals.go:220] [ 1205: 1205] Signal 23: delivering to handler D0713 00:08:01.796160 786755 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.796199 786755 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc0004b9e90 13 D0713 00:08:01.796217 786755 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:08:01.805693 786755 task_signals.go:470] [ 1205: 1205] Notified of signal 23 D0713 00:08:01.805838 786755 task_signals.go:220] [ 1205: 1205] Signal 23: delivering to handler D0713 00:08:01.809397 786755 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46ae44:sysno 231 D0713 00:08:01.809436 786755 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc0004b9e90 14 D0713 00:08:01.809451 786755 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:08:01.809531 786755 task_exit.go:204] [ 1205: 1205] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.809571 786755 task_exit.go:204] [ 1205: 1205] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.809601 786755 task_signals.go:204] [ 1205: 1208] Signal 1205, PID: 1208, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.809633 786755 task_exit.go:204] [ 1205: 1208] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.809631 786755 task_signals.go:204] [ 1205: 1206] Signal 1205, PID: 1206, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.809649 786755 task_exit.go:204] [ 1205: 1208] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.809656 786755 task_exit.go:204] [ 1205: 1208] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.809670 786755 task_exit.go:204] [ 1205: 1206] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.809679 786755 task_exit.go:204] [ 1205: 1206] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.809689 786755 task_exit.go:204] [ 1205: 1206] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.809643 786755 task_signals.go:204] [ 1205: 1207] Signal 1205, PID: 1207, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.809716 786755 task_exit.go:204] [ 1205: 1207] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.809762 786755 task_exit.go:204] [ 1205: 1207] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.809784 786755 task_exit.go:204] [ 1205: 1207] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.809826 786755 task_signals.go:204] [ 1205: 1209] Signal 1205, PID: 1209, TID: 0, fault addr: 0x9: terminating thread group D0713 00:08:01.809933 786755 task_exit.go:204] [ 1205: 1209] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:08:01.811595 786755 task_exit.go:204] [ 1205: 1209] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:08:01.811660 786755 task_exit.go:204] [ 1205: 1209] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.811684 786755 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:08:01.811739 786755 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:08:01.811776 786755 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:08:01.812000 786755 task_exit.go:204] [ 1205: 1205] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:08:01.812844 786755 task_stop.go:118] [ 6: 18] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.814452 786755 syscalls.go:262] [ 1210: 1210] Allocating stack with size of 8388608 bytes D0713 00:08:01.814578 786755 task_stop.go:138] [ 6: 18] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:08:01.816414 786755 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46b70f:sysno 204 D0713 00:08:01.816454 786755 usertrap_amd64.go:106] [ 1210: 1210] Map a usertrap vma at 62000 D0713 00:08:01.816582 786755 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc0009a2360 1 D0713 00:08:01.816625 786755 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:08:01.816936 786755 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46ae93:sysno 257 D0713 00:08:01.816995 786755 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc0009a2360 2 D0713 00:08:01.817009 786755 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:08:01.817621 786755 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46b41d:sysno 9 D0713 00:08:01.817644 786755 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc0009a2360 3 D0713 00:08:01.817655 786755 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:08:01.825517 786755 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46b1d3:sysno 14 D0713 00:08:01.825631 786755 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc0009a2360 4 D0713 00:08:01.825664 786755 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:08:01.827200 786755 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46afa0:sysno 186 D0713 00:08:01.827260 786755 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc0009a2360 5 D0713 00:08:01.827297 786755 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:08:01.827483 786755 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46b214:sysno 13 D0713 00:08:01.827517 786755 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc0009a2360 6 D0713 00:08:01.827533 786755 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:08:01.828066 786755 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46b5eb:sysno 56 D0713 00:08:01.828145 786755 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc0009a2360 7 D0713 00:08:01.828178 786755 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:08:01.828498 786755 usertrap_amd64.go:212] [ 1210: 1211] Found the pattern at ip 46b60c:sysno 186 D0713 00:08:01.828529 786755 usertrap_amd64.go:122] [ 1210: 1211] Allocate a new trap: 0xc0009a2360 8 D0713 00:08:01.828544 786755 usertrap_amd64.go:225] [ 1210: 1211] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:08:01.828975 786755 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46b57c:sysno 202 D0713 00:08:01.828998 786755 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc0009a2360 9 D0713 00:08:01.829013 786755 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:08:01.829039 786755 usertrap_amd64.go:212] [ 1210: 1211] Found the pattern at ip 46af76:sysno 35 D0713 00:08:01.829046 786755 usertrap_amd64.go:122] [ 1210: 1211] Allocate a new trap: 0xc0009a2360 10 D0713 00:08:01.829054 786755 usertrap_amd64.go:225] [ 1210: 1211] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:08:01.838325 786755 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46af29:sysno 293 D0713 00:08:01.838369 786755 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc0009a2360 11 D0713 00:08:01.838383 786755 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:08:01.841407 786755 usertrap_amd64.go:212] [ 1210: 1211] Found the pattern at ip 46b020:sysno 39 D0713 00:08:01.841442 786755 usertrap_amd64.go:122] [ 1210: 1211] Allocate a new trap: 0xc0009a2360 12 D0713 00:08:01.841459 786755 usertrap_amd64.go:225] [ 1210: 1211] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:08:01.843428 786755 usertrap_amd64.go:212] [ 1210: 1211] Found the pattern at ip 46b04f:sysno 234 D0713 00:08:01.843466 786755 usertrap_amd64.go:122] [ 1210: 1211] Allocate a new trap: 0xc0009a2360 13 D0713 00:08:01.843481 786755 usertrap_amd64.go:225] [ 1210: 1211] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:08:01.843532 786755 task_signals.go:470] [ 1210: 1210] Notified of signal 23 D0713 00:08:01.843563 786755 task_signals.go:220] [ 1210: 1210] Signal 23: delivering to handler D0713 00:08:01.850056 786755 task_signals.go:309] [ 1210: 1210] failed to restore from a signal frame: bad address D0713 00:08:01.850142 786755 task_signals.go:470] [ 1210: 1210] Notified of signal 11 D0713 00:08:01.850166 786755 task_signals.go:220] [ 1210: 1210] Signal 11: delivering to handler W0713 00:08:01.881511 786696 sandbox.go:1111] Wait RPC to container "ci-gvisor-systrap-1-cover-test-1" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. W0713 00:08:01.881479 786916 util.go:64] FATAL ERROR: waiting on pid 6: waiting on PID 6 in sandbox "ci-gvisor-systrap-1-cover-test-1": urpc method "containerManager.WaitPID" failed: EOF waiting on pid 6: waiting on PID 6 in sandbox "ci-gvisor-systrap-1-cover-test-1": urpc method "containerManager.WaitPID" failed: EOF W0713 00:08:01.881647 786916 main.go:274] Failure to execute command, err: 1 D0713 00:08:01.892661 1 connection.go:127] sock read failed, closing connection: EOF I0713 00:08:01.892753 1 gofer.go:319] All lisafs servers exited. I0713 00:08:01.892775 1 main.go:265] Exiting with status: 0 D0713 00:08:01.897132 786696 container.go:771] Destroy container, cid: ci-gvisor-systrap-1-cover-test-1 D0713 00:08:01.897251 786696 container.go:1007] Destroying container, cid: ci-gvisor-systrap-1-cover-test-1 D0713 00:08:01.897270 786696 sandbox.go:1403] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-cover-test-1 D0713 00:08:01.897280 786696 sandbox.go:1153] Destroying sandbox "ci-gvisor-systrap-1-cover-test-1" D0713 00:08:01.897395 786696 container.go:1021] Killing gofer for container, cid: ci-gvisor-systrap-1-cover-test-1, PID: 786745 D0713 00:08:01.908775 786696 cgroup.go:549] Deleting cgroup "ci-gvisor-systrap-1-cover-test-1" D0713 00:08:01.908882 786696 cgroup.go:557] Removing cgroup controller for key="net_cls" path="/sys/fs/cgroup/net_cls/ci-gvisor-systrap-1-cover-test-1" D0713 00:08:01.909066 786696 cgroup.go:557] Removing cgroup controller for key="devices" path="/sys/fs/cgroup/devices/ci-gvisor-systrap-1-cover-test-1" D0713 00:08:01.909106 786696 cgroup.go:557] Removing cgroup controller for key="cpuset" path="/sys/fs/cgroup/cpuset/ci-gvisor-systrap-1-cover-test-1" D0713 00:08:01.909148 786696 cgroup.go:557] Removing cgroup controller for key="cpuacct" path="/sys/fs/cgroup/cpuacct/ci-gvisor-systrap-1-cover-test-1" D0713 00:08:01.909247 786696 cgroup.go:557] Removing cgroup controller for key="systemd" path="/sys/fs/cgroup/systemd/ci-gvisor-systrap-1-cover-test-1" D0713 00:08:01.909263 786696 cgroup.go:557] Removing cgroup controller for key="pids" path="/sys/fs/cgroup/pids/ci-gvisor-systrap-1-cover-test-1" D0713 00:08:01.909273 786696 cgroup.go:557] Removing cgroup controller for key="perf_event" path="/sys/fs/cgroup/perf_event/ci-gvisor-systrap-1-cover-test-1" D0713 00:08:01.909290 786696 cgroup.go:557] Removing cgroup controller for key="blkio" path="/sys/fs/cgroup/blkio/ci-gvisor-systrap-1-cover-test-1" D0713 00:08:01.909331 786696 cgroup.go:557] Removing cgroup controller for key="cpu" path="/sys/fs/cgroup/cpu/ci-gvisor-systrap-1-cover-test-1" D0713 00:08:01.909647 786696 cgroup.go:557] Removing cgroup controller for key="memory" path="/sys/fs/cgroup/memory/ci-gvisor-systrap-1-cover-test-1" D0713 00:08:01.909877 786696 cgroup.go:557] Removing cgroup controller for key="net_prio" path="/sys/fs/cgroup/net_prio/ci-gvisor-systrap-1-cover-test-1" D0713 00:08:01.909904 786696 cgroup.go:557] Removing cgroup controller for key="freezer" path="/sys/fs/cgroup/freezer/ci-gvisor-systrap-1-cover-test-1" D0713 00:08:01.909927 786696 cgroup.go:557] Removing cgroup controller for key="rdma" path="/sys/fs/cgroup/rdma/ci-gvisor-systrap-1-cover-test-1" I0713 00:08:01.910299 786696 main.go:265] Exiting with status: 9 VM DIAGNOSIS: I0713 00:08:01.962870 787306 main.go:230] *************************** I0713 00:08:01.962963 787306 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-cover-test-1] I0713 00:08:01.963013 787306 main.go:232] Version 0.0.0 I0713 00:08:01.963032 787306 main.go:233] GOOS: linux I0713 00:08:01.963052 787306 main.go:234] GOARCH: amd64 I0713 00:08:01.963079 787306 main.go:235] PID: 787306 I0713 00:08:01.963109 787306 main.go:236] UID: 0, GID: 0 I0713 00:08:01.963129 787306 main.go:237] Configuration: I0713 00:08:01.963155 787306 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root I0713 00:08:01.963183 787306 main.go:239] Platform: systrap I0713 00:08:01.963202 787306 main.go:240] FileAccess: shared I0713 00:08:01.963252 787306 main.go:241] Directfs: true I0713 00:08:01.963277 787306 main.go:242] Overlay: none I0713 00:08:01.963304 787306 main.go:243] Network: sandbox, logging: false I0713 00:08:01.963333 787306 main.go:244] Strace: false, max size: 1024, syscalls: I0713 00:08:01.963359 787306 main.go:245] IOURING: false I0713 00:08:01.963387 787306 main.go:246] Debug: true I0713 00:08:01.963419 787306 main.go:247] Systemd: false I0713 00:08:01.963446 787306 main.go:248] *************************** D0713 00:08:01.963517 787306 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-cover-test-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 00:08:01.963667 787306 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-cover-test-1": file does not exist loading container "ci-gvisor-systrap-1-cover-test-1": file does not exist W0713 00:08:01.963767 787306 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-num-network-channels=3" "-gso=false" "-net-raw" "-watchdog-action=panic" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-cover-test-1"]: exit status 128 I0713 00:08:01.962870 787306 main.go:230] *************************** I0713 00:08:01.962963 787306 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-cover-test-1] I0713 00:08:01.963013 787306 main.go:232] Version 0.0.0 I0713 00:08:01.963032 787306 main.go:233] GOOS: linux I0713 00:08:01.963052 787306 main.go:234] GOARCH: amd64 I0713 00:08:01.963079 787306 main.go:235] PID: 787306 I0713 00:08:01.963109 787306 main.go:236] UID: 0, GID: 0 I0713 00:08:01.963129 787306 main.go:237] Configuration: I0713 00:08:01.963155 787306 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root I0713 00:08:01.963183 787306 main.go:239] Platform: systrap I0713 00:08:01.963202 787306 main.go:240] FileAccess: shared I0713 00:08:01.963252 787306 main.go:241] Directfs: true I0713 00:08:01.963277 787306 main.go:242] Overlay: none I0713 00:08:01.963304 787306 main.go:243] Network: sandbox, logging: false I0713 00:08:01.963333 787306 main.go:244] Strace: false, max size: 1024, syscalls: I0713 00:08:01.963359 787306 main.go:245] IOURING: false I0713 00:08:01.963387 787306 main.go:246] Debug: true I0713 00:08:01.963419 787306 main.go:247] Systemd: false I0713 00:08:01.963446 787306 main.go:248] *************************** D0713 00:08:01.963517 787306 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-cover-test-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 00:08:01.963667 787306 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-cover-test-1": file does not exist loading container "ci-gvisor-systrap-1-cover-test-1": file does not exist W0713 00:08:01.963767 787306 main.go:274] Failure to execute command, err: 1 [11531647.355824] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.376295] exe[342993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.396210] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.417266] exe[342763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11532345.155341] warn_bad_vsyscall: 25 callbacks suppressed [11532345.155345] exe[382188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532345.269530] exe[382766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532345.386757] exe[382474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532767.935456] exe[384598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11532768.011945] exe[342758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11532768.091418] exe[363806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11534667.144948] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.236329] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.267961] exe[403010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.372458] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.408027] exe[400419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534894.914638] exe[383063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beadbee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.957554] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.977138] exe[386963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.997745] exe[383054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.019118] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.038723] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.059007] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.079097] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.098979] exe[386963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.118890] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11535893.406581] warn_bad_vsyscall: 25 callbacks suppressed [11535893.406585] exe[518174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.458729] exe[498396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.521164] exe[517163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.575499] exe[517648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11536070.313225] exe[517933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.380260] exe[515339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.442300] exe[515436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.505325] exe[517933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536370.456183] exe[527170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.586537] exe[514004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53fbc858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.694198] exe[527281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.737448] exe[527170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11537650.136338] exe[430654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11537650.412774] exe[548543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11537651.379743] exe[544871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11539350.089743] exe[592292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fee1a62839 cs:33 sp:7f3bb8f66858 ax:0 si:55fee1abb062 di:ffffffffff600000 [11539649.231607] exe[597310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539649.290920] exe[596254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539649.347494] exe[596254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539977.040247] exe[600851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622cbba1839 cs:33 sp:7ef62f826858 ax:0 si:5622cbbfa070 di:ffffffffff600000 [11540511.026519] exe[600753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605abe9b839 cs:33 sp:7ea0b2c49858 ax:0 si:5605abef4062 di:ffffffffff600000 [11540577.627218] exe[580995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb471858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11540577.675057] exe[580995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb471858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11540577.720870] exe[580996] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb450858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11541137.236749] exe[631001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8df4a8839 cs:33 sp:7ec367e7b858 ax:0 si:55d8df501070 di:ffffffffff600000 [11541804.084586] exe[636938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11541807.009172] exe[573192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11541807.193016] exe[624964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11542822.267208] exe[615762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.447533] exe[615762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.599315] exe[608247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.654857] exe[608085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff2b858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542974.046947] exe[681952] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4cbdf3839 cs:33 sp:7ec21f245858 ax:0 si:55f4cbe4c070 di:ffffffffff600000 [11542975.617308] exe[681959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bdb6b73839 cs:33 sp:7ea1e721f858 ax:0 si:55bdb6bcc070 di:ffffffffff600000 [11543003.003275] exe[680745] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f039ea839 cs:33 sp:7f52e9f8c858 ax:0 si:560f03a43070 di:ffffffffff600000 [11543004.857028] exe[674098] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5cc9b839 cs:33 sp:7fc8cf3fe858 ax:0 si:564a5ccf4070 di:ffffffffff600000 [11543241.124326] exe[653510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543241.246077] exe[670164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543242.057149] exe[665681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543265.859323] exe[669905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.014563] exe[673318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.109923] exe[655556] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.226266] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.340307] exe[666615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.438645] exe[653578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.550820] exe[653447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.639930] exe[668546] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543527.564952] exe[682036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d85dfee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.843021] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.872086] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.901814] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.928287] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.960260] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.001419] exe[686062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.037270] exe[686072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.072724] exe[684288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.101714] exe[684288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11544123.311129] warn_bad_vsyscall: 43 callbacks suppressed [11544123.311132] exe[696458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.485832] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.545188] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.727586] exe[694132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544124.057735] exe[696402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.305506] exe[651414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.507382] exe[669629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.623230] exe[695057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544124.735692] exe[694132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544124.863236] exe[665545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544128.352152] warn_bad_vsyscall: 20 callbacks suppressed [11544128.352155] exe[671775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544128.511425] exe[696712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.375128] exe[653165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.536371] exe[653165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.698008] exe[653586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.893888] exe[668891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544130.031510] exe[696458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544130.130359] exe[673044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544130.235880] exe[668891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544130.352844] exe[672186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.353612] warn_bad_vsyscall: 24 callbacks suppressed [11544133.353615] exe[668506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.473154] exe[668506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.609419] exe[668533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.901016] exe[696718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.174452] exe[666489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.475583] exe[668888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.623602] exe[651414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.772637] exe[696477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.888566] exe[670834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.988750] exe[697893] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544138.414937] warn_bad_vsyscall: 63 callbacks suppressed [11544138.414941] exe[691644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.523964] exe[680995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.625852] exe[696345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.629193] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.773793] exe[694608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.889988] exe[671086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.995711] exe[656008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.279460] exe[653157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.285732] exe[651351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.852350] exe[702011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.530343] warn_bad_vsyscall: 21 callbacks suppressed [11544143.530346] exe[669928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.650402] exe[651695] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.841742] exe[691644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.870995] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.902268] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.948343] exe[691663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.989607] exe[691663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.024048] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.054902] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.087224] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544148.632017] warn_bad_vsyscall: 172 callbacks suppressed [11544148.632020] exe[669150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.794259] exe[668957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.989109] exe[668900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.994476] exe[668888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.214390] exe[700441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.375421] exe[677325] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.743745] exe[651266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.292722] exe[694622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.474228] exe[681023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.637207] exe[681023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544153.658144] warn_bad_vsyscall: 27 callbacks suppressed [11544153.658148] exe[653423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.777426] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.903906] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.947438] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.109460] exe[660365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.158525] exe[653490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.258820] exe[651422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.391447] exe[669928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.603018] exe[653409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.651409] exe[653440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544158.817051] warn_bad_vsyscall: 88 callbacks suppressed [11544158.817054] exe[694623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.075950] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.301459] exe[696410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.392503] exe[694615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.536699] exe[694622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.643218] exe[693490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.745653] exe[687494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.834437] exe[669163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544159.940422] exe[693510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544160.043187] exe[673283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.101141] warn_bad_vsyscall: 21 callbacks suppressed [11544164.101144] exe[668876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.241344] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.416813] exe[696415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.572347] exe[653157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.661162] exe[700444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.764040] exe[665928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.860384] exe[665956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.967054] exe[651351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544165.069729] exe[696446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544165.167820] exe[667801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.171621] warn_bad_vsyscall: 29 callbacks suppressed [11544169.171624] exe[666533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.209223] exe[694404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.345652] exe[694608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.449276] exe[666863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.579999] exe[652022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.628929] exe[681862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.748025] exe[694768] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.754710] exe[651361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544170.115853] exe[695045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544170.211267] exe[694614] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544487.006009] warn_bad_vsyscall: 7 callbacks suppressed [11544487.006013] exe[698657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56475d423839 cs:33 sp:7f017362b858 ax:0 si:56475d47c070 di:ffffffffff600000 [11544487.270484] exe[700399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563181efe839 cs:33 sp:7ebe85da1858 ax:0 si:563181f57070 di:ffffffffff600000 [11544511.054844] exe[643613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55671700d839 cs:33 sp:7fda3ebc7858 ax:0 si:556717066070 di:ffffffffff600000 [11544534.538680] exe[711402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650b2e68839 cs:33 sp:7ed2418f9858 ax:0 si:5650b2ec1070 di:ffffffffff600000 [11544541.236335] exe[714082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec31b7839 cs:33 sp:7f29fcf9d858 ax:0 si:563ec3210070 di:ffffffffff600000 [11544549.596877] exe[709232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d85df858 ax:0 si:55f2a8264070 di:ffffffffff600000 [11544550.342713] exe[712067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cd4032839 cs:33 sp:7fe3bd6b3858 ax:0 si:564cd408b070 di:ffffffffff600000 [11544636.437853] exe[540397] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df21791839 cs:33 sp:7f199a286858 ax:0 si:55df217ea070 di:ffffffffff600000 [11544650.761105] exe[680687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353ec858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.648325] exe[680729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353ec858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.692536] exe[680687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353cb858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.806399] exe[654057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353cb858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544684.382904] exe[599414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f284d4839 cs:33 sp:7f961e482858 ax:0 si:556f2852d070 di:ffffffffff600000 [11544687.601444] exe[605347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557bb1bb839 cs:33 sp:7eccd13f5858 ax:0 si:5557bb214070 di:ffffffffff600000 [11545051.986254] exe[681960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4cbdf3839 cs:33 sp:7ec21f245858 ax:0 si:55f4cbe4c070 di:ffffffffff600000 [11545064.270053] exe[698660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b51fb0839 cs:33 sp:7f9c7caaf858 ax:0 si:560b52009070 di:ffffffffff600000 [11545068.988305] exe[688573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564928b3b839 cs:33 sp:7ff955622858 ax:0 si:564928b94070 di:ffffffffff600000 [11545109.002939] exe[700093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5cc9b839 cs:33 sp:7fc8cf3fe858 ax:0 si:564a5ccf4070 di:ffffffffff600000 [11545257.023788] exe[699969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858858 ax:0 si:56468e7be070 di:ffffffffff600000 [11545310.043985] exe[730419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079858 ax:0 si:559d6ffcd070 di:ffffffffff600000 [11545747.024880] exe[668885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.207869] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.208393] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.369587] exe[698981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.086072] exe[694611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.276578] exe[655585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.440844] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.661991] exe[651380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.864051] exe[691659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.032545] exe[669495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.180256] exe[668971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.327971] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.464233] exe[653467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.608138] exe[694611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.724053] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.821867] exe[673278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545752.940728] exe[695059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545753.257832] exe[690707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545753.288251] exe[694599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.081142] warn_bad_vsyscall: 180 callbacks suppressed [11545757.081146] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.214468] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.680818] exe[660360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545757.976248] exe[669152] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.152711] exe[673009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db06858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.411760] exe[666512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.527446] exe[666632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.650734] exe[670178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.653643] exe[696363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.792891] exe[666858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.314186] warn_bad_vsyscall: 20 callbacks suppressed [11545762.314189] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.467684] exe[670066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.649946] exe[673641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.943504] exe[660379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.043408] exe[669128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.327908] exe[669526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.366578] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.522288] exe[669522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545764.352902] exe[696365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545764.927217] exe[668856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.329883] warn_bad_vsyscall: 19 callbacks suppressed [11545767.329886] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.356567] exe[696345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.513570] exe[697884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.562772] exe[670199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.711961] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545767.846666] exe[673281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545767.887751] exe[673284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.020071] exe[666647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.057366] exe[666647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.194079] exe[677299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545895.545245] warn_bad_vsyscall: 20 callbacks suppressed [11545895.545249] exe[720805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858ee8 ax:0 si:200001c0 di:ffffffffff600000 [11545895.697993] exe[720805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858ee8 ax:0 si:200001c0 di:ffffffffff600000 [11545895.785536] exe[721585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c837ee8 ax:0 si:200001c0 di:ffffffffff600000 [11546263.751083] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cde2ee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546264.760352] exe[750487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cd5eee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546264.909919] exe[733995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cde2ee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546785.957834] exe[722877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11546786.864503] exe[719747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11546787.823769] exe[718998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11547088.502200] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547088.547606] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547088.594335] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.508654] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.559999] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.608707] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.659695] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.718362] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.781423] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.831867] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.888097] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.977889] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547100.030632] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547104.513495] warn_bad_vsyscall: 291 callbacks suppressed [11547104.513499] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.539086] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.559309] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.578791] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.599547] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.620080] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.640504] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.659820] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.679561] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.700181] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547109.524219] warn_bad_vsyscall: 177 callbacks suppressed [11547109.524223] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.571444] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.623374] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.666991] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.687953] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.739406] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.781901] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.828639] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.849421] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.897272] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.703281] warn_bad_vsyscall: 176 callbacks suppressed [11547226.703285] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.750753] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.799595] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.236010] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.275452] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.317150] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.312120] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.354274] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.397972] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.426494] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.481647] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.534048] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547286.183628] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.224975] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.249969] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.292623] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547292.084095] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547292.127160] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547292.168264] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.584508] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.638463] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.658311] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.678417] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.699893] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.719994] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.740570] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.761543] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.782276] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.803395] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.755488] warn_bad_vsyscall: 32 callbacks suppressed [11547304.755491] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.820801] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.870285] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547305.231833] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547306.080890] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547306.932040] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.868022] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.927403] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.983135] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547309.035076] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.512279] warn_bad_vsyscall: 3 callbacks suppressed [11547312.512283] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.573549] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.593042] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.613765] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.634451] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.654831] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.674844] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.695789] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.716034] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.735650] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.072811] warn_bad_vsyscall: 25 callbacks suppressed [11547323.072814] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.126130] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.168909] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.169422] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.577119] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.618137] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.659742] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.430811] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.470418] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.471364] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.540794] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.575387] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.234296] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.287869] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.341084] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547333.150024] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547333.197367] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.613691] warn_bad_vsyscall: 1 callbacks suppressed [11547359.613695] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.673012] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.722811] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.747468] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.889779] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.945222] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.980565] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547371.026574] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547381.799394] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.864307] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.906009] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.933118] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547384.896734] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547384.942724] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547385.004823] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547394.986983] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547395.029433] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547395.072479] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.899409] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.945764] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.998894] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547402.412281] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.457209] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.458646] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.539688] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.539824] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547414.727517] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.524355] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.575392] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.624984] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.681183] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.722741] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.761925] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.879392] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.921135] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.960705] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.692664] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.746736] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.780646] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.157398] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.227524] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.267610] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.241019] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.314637] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.354549] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.400116] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.441352] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.461983] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.499263] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.711900] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.766945] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.815670] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.678890] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.727877] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.747719] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.767929] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.788113] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.807588] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.826881] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.107205] warn_bad_vsyscall: 63 callbacks suppressed [11547478.107208] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.164816] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.204636] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.384520] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.441631] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.483337] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.658315] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547498.516799] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.368994] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.390429] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.411047] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.430939] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.452865] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547504.945209] warn_bad_vsyscall: 28 callbacks suppressed [11547504.945212] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547504.998022] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547505.038001] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.867524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.912298] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.955068] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.977045] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547536.142402] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547536.183582] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547536.217323] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.569508] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.614546] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.663836] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547538.951959] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.000244] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.081981] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.997217] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547564.887928] warn_bad_vsyscall: 69 callbacks suppressed [11547564.887932] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547564.979509] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.178943] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.229576] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.296841] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.055098] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.108833] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.156638] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.185291] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.306678] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.358066] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.406256] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.036059] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.086889] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.108968] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.156744] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.880353] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.931926] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.953668] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.989459] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.559099] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.600969] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.648685] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.670795] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.298350] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.336522] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.375194] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547619.302393] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547619.356222] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547619.395199] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547628.124097] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.175121] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.195646] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.242715] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.055190] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.102818] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.146651] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.408345] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.450251] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.489444] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.515277] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.494419] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.543322] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.564399] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.602948] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.605910] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.679150] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.726624] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547662.729392] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547662.772014] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547662.817232] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547666.997387] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547667.036554] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547667.076179] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547671.948193] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547671.996557] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547672.038514] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547672.039086] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547673.715197] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.774874] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.796267] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.836633] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547696.173266] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.232828] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.255864] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.294590] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.314254] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.335246] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.355631] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.376818] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.396933] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.417149] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.297493] warn_bad_vsyscall: 65 callbacks suppressed [11547715.297496] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.351733] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.396006] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.417741] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.369570] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.412168] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.433703] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.476531] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.185928] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.229580] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.267114] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.034535] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.079956] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.081096] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.142656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.827814] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.871810] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.895490] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.935407] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.937018] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.115105] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.155340] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.179243] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.226345] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.556996] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.594141] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.641491] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.738092] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.785040] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.827300] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.849354] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.631390] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.672124] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.713813] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.715026] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.110481] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.167223] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.188945] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.209538] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.229116] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.248124] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547785.250849] warn_bad_vsyscall: 39 callbacks suppressed [11547785.250853] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.017175] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.058414] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.098809] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.452423] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.491354] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.530741] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.157406] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.405882] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.569025] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.689830] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.730995] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.770001] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.771515] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547812.197802] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547812.267933] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547812.268869] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547813.941768] warn_bad_vsyscall: 5 callbacks suppressed [11547813.941772] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547813.985351] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.023826] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.283366] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.373377] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.430322] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.428583] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.479106] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.517226] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547821.217341] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.304135] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.358901] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.381326] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.403008] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.917629] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547822.010021] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.374491] warn_bad_vsyscall: 6 callbacks suppressed [11547838.374495] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.433268] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.487754] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.517159] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.542981] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.594031] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.633861] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547847.990984] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.047899] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.090172] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.278529] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.318322] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.357865] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.656438] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.696366] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.730899] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547851.240037] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.042222] warn_bad_vsyscall: 2 callbacks suppressed [11547866.042225] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.098981] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.161778] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.079020] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.130030] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.184976] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.225662] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.268419] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.320362] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.047221] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.096888] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.137370] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.386318] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.432437] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.486510] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547884.683356] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547884.762816] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547884.813991] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.189876] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.254562] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.293397] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547903.407887] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.447383] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.470252] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.506155] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.721533] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.782550] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.820577] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.096045] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.142337] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.161621] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547911.216020] warn_bad_vsyscall: 64 callbacks suppressed [11547911.216024] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547911.267332] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547911.307191] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547912.057581] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.095772] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.097086] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.157993] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547913.388972] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547913.423889] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547913.465344] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547924.521450] warn_bad_vsyscall: 5 callbacks suppressed [11547924.521454] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.577796] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.602125] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.641611] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.133391] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.194823] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.197273] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.263427] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.418619] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.475719] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.543133] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.125423] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.228337] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.688513] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.730652] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.766521] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.807188] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.851432] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.871960] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.914064] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.259541] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.337004] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.398917] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.978258] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.026688] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.029306] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.092103] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.100263] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.144346] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.174814] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.211169] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.832995] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.876208] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.898352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.934693] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.414771] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.456497] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.496767] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.291929] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.329604] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.369969] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.372328] warn_bad_vsyscall: 3 callbacks suppressed [11547989.372332] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.421337] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.465823] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.485942] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.841813] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.890432] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.943125] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.261522] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.301370] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.342764] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.299293] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.345532] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.381167] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.818109] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.874942] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.929681] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548017.498804] exe[756718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.546061] exe[755951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.589351] exe[755959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.635935] exe[756718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dfd5ee8 ax:0 si:20000680 di:ffffffffff600000 [11548019.396684] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548019.444824] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548019.480770] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.067924] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.105876] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.106597] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.730218] warn_bad_vsyscall: 5 callbacks suppressed [11548023.730221] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.775332] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.815656] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.219256] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.300235] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.347676] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548044.947538] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548044.999970] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548045.040895] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548045.069553] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.004537] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.049080] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.113890] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.137352] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548077.206282] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.251934] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.274716] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.295013] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.315325] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.336012] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.357843] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.377872] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.398283] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.418613] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548097.528517] warn_bad_vsyscall: 57 callbacks suppressed [11548097.528521] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.576429] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.633295] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.634854] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.133965] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.176503] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.214588] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.215240] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.412752] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.462777] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548104.996660] warn_bad_vsyscall: 1 callbacks suppressed [11548104.996663] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548105.850076] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548106.696238] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.157724] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.208597] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.261372] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.343202] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.382779] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.426112] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.403368] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.452789] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.499910] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548137.417742] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548137.522190] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548139.936100] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548139.988256] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548140.016505] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548140.070003] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.445818] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.511715] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.553978] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.286390] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.334009] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.375931] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548175.546300] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.589700] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.629037] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.651488] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548179.585264] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.631159] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.650585] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.670448] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.691290] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.711967] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.732380] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.752068] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.772801] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.793448] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548193.872059] warn_bad_vsyscall: 61 callbacks suppressed [11548193.872063] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548193.952821] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548201.928684] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548201.996448] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548202.037007] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.156027] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.196959] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.219143] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.258912] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.281350] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.546657] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.589787] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.627425] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.699725] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.745535] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.788742] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.471018] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.514946] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.515574] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.585099] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.038187] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.079907] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.127070] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.182158] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.221914] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.242963] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.281592] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.367833] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.410279] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.431732] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.485658] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.287473] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.328228] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.378594] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.674482] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.723577] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.769676] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.411340] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.454118] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.496501] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.637682] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.680537] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.717881] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.175744] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.244740] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.289491] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.347827] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.386962] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.432610] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.452510] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.472049] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.493392] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.514001] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.534326] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.555439] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.575831] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548299.591661] warn_bad_vsyscall: 28 callbacks suppressed [11548299.591664] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548299.716645] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.218082] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.333278] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.369844] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.445978] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.012030] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.078579] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.134946] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.388423] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.442059] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.509579] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.182613] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.228614] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.249852] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.270396] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.080494] warn_bad_vsyscall: 69 callbacks suppressed [11548311.080498] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.131994] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.183761] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.207733] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548326.195752] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.033861] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.883771] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.718811] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.764692] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.802193] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.003147] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.061042] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.083321] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.123123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.557059] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.614792] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.654451] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.900936] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.950630] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548350.007839] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.826680] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.880328] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.934074] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.272328] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.322197] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.361580] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.288522] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.327273] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.370594] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.489698] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.541048] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.609626] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.631505] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.250609] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.296008] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.297139] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.354078] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.375823] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.830961] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.909476] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.972469] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.174820] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.216089] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548391.283262] warn_bad_vsyscall: 1 callbacks suppressed [11548391.283264] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.329989] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.374640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548393.205978] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.255260] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.299080] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.344484] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.405320] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.464950] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.467363] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.255243] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.318628] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.319151] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.399578] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.401766] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.568699] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.919607] warn_bad_vsyscall: 3 callbacks suppressed [11548416.919610] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.966950] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.989006] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548417.034408] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.811451] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.860253] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.886942] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.928112] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.778887] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.820893] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.842334] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880084] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880903] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.508111] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.601445] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.602653] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.704447] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.705345] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.826999] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872284] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872375] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.986065] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.258456] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.300258] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.349378] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548474.517614] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.564789] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.587128] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.638151] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548480.604311] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.644087] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.687806] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.689290] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548484.123787] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.180672] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.239780] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548493.278360] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328236] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328600] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.390304] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.833382] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.961149] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548509.063948] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548520.613294] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.659518] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.708570] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548526.299866] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.339536] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.402244] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.425302] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.894709] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.938050] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.982622] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.450297] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.505520] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.528534] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.568597] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548544.956800] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.013667] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.033643] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.085490] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548549.234345] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.282824] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.329949] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.534109] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.597324] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.621011] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.681465] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.886217] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.950142] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.998720] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.869926] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.934033] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.955035] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.014796] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.296125] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.353392] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.399746] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548570.911499] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.669130] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.735195] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.776546] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.660338] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.699761] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.746611] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.932572] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.972071] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.994399] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548597.034578] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.022991] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.090767] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.091012] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177700] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177834] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.557153] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.606340] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.653245] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.686798] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.776155] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.819898] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.872777] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.809818] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.860562] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.902531] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.707415] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.760809] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.817281] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.837170] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.856971] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.880580] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.901934] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.921867] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.942728] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.963710] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.234572] warn_bad_vsyscall: 60 callbacks suppressed [11548659.234577] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.319640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.375122] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.395917] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.877517] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.920825] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.942925] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.984794] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548666.639541] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.680685] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.721252] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548685.149430] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.193561] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.234314] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.259938] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.046303] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.090192] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.111864] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.155942] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.597615] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.643566] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.512636] warn_bad_vsyscall: 2 callbacks suppressed [11548693.512640] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.587898] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.622954] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.672410] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.860094] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.898007] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.935962] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.083950] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.139793] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.183343] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.433839] warn_bad_vsyscall: 4 callbacks suppressed [11548701.433843] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.486929] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.525603] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.154317] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.196722] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.240576] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.261222] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.863192] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.911865] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.965656] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.905248] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.941691] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.983975] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.279943] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.327248] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.389725] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.413266] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.107500] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.162576] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.212182] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.593451] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.640310] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.696914] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.087707] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.134560] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.378944] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.423937] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.443330] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.463024] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.482763] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.505914] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.525847] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.546368] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.567195] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.587657] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.371230] warn_bad_vsyscall: 29 callbacks suppressed [11548765.371234] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.416207] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.456858] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.014315] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.053783] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.097156] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548783.841479] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.890700] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.932657] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.698534] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.744861] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.765479] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.802565] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.823701] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548816.611166] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.660003] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.708264] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.616862] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.656506] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.686639] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.730645] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.103497] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.175520] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.217584] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.239654] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.380393] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419346] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419914] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.482312] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.504801] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.673651] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548838.107208] warn_bad_vsyscall: 69 callbacks suppressed [11548838.107211] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.166865] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.212798] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.234075] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.515015] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573192] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573250] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.637396] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.856419] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.903599] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.043501] warn_bad_vsyscall: 3 callbacks suppressed [11548851.043505] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.091113] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.134490] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.651270] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.696335] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.749606] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.916650] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.958708] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548852.000342] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.093160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.147244] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.168810] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.275323] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.795133] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.856035] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.904442] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.933821] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.146784] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.215461] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.263431] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.250299] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.301702] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.322428] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.363670] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.387918] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.562614] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.605694] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.627575] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.667298] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.692069] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.739223] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.784533] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.785479] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.861757] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548914.066544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548920.546376] warn_bad_vsyscall: 3 callbacks suppressed [11548920.546380] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.598743] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.656217] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.789652] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.873526] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.930080] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.662584] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.704522] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.747412] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548941.905328] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.002937] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.026135] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.047304] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.070126] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.093651] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.118417] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.138954] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.161818] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.197908] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548947.008863] warn_bad_vsyscall: 29 callbacks suppressed [11548947.008867] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.117286] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.212764] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.279648] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.345439] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.439123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.226947] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.265920] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.306266] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.023857] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.083854] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.084666] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.162482] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.182136] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.202273] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.225957] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.248936] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.269819] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.291316] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.814852] warn_bad_vsyscall: 61 callbacks suppressed [11548984.814855] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.924203] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548999.981207] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.031437] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.075008] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.490779] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.548739] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.596976] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.622828] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549003.408072] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.450273] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.493544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549011.127750] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.168732] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.204428] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.584759] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.637945] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.661027] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.703124] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.880815] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.931172] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.980221] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.112241] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.159181] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.184471] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.234060] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.289213] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.338880] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.384608] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.697534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.734874] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.790174] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.722197] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.769295] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.813981] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.670371] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.708511] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.749962] exe[743908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.269200] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.317692] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.341079] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.380507] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.807867] warn_bad_vsyscall: 1 callbacks suppressed [11549067.807871] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.870608] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.908220] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.669345] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.711360] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.754534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.604356] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.659869] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.706198] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549089.981820] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.040241] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.062834] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.120102] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549094.367870] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.417816] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.462962] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549096.771134] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.818012] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.868139] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549098.287705] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.335253] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.362160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.411664] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549102.265611] exe[812626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.316062] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.367142] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549103.277443] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.327611] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.372667] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.373629] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549106.101121] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.158749] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.214409] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.203702] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.313805] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.832041] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.896096] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.936191] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.147625] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.194975] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.239317] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.666464] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.709186] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.769134] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.396423] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.447035] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.470585] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.507121] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.469316] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.516733] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.561202] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.841101] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.883653] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.906352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.946285] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.885765] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.938026] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.963555] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.014465] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.831133] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.882033] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.884100] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.956006] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.456966] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.503734] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.962386] warn_bad_vsyscall: 1 callbacks suppressed [11549182.962389] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.012121] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.059746] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.080637] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.284008] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.367576] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.445261] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549193.339186] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.395517] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.461816] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.489679] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.663958] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.712460] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.763669] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.788181] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549207.982095] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.032318] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.053090] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.095858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549213.428629] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.465578] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.503510] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549215.928549] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549216.000149] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549217.237542] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.283499] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.346633] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549219.657475] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.701623] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.741378] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.937988] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.993970] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.015601] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.066260] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.088244] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.744875] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.802594] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.852978] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.853165] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.897681] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.919524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.957057] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549272.386964] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.430873] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.472074] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549284.010961] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.056302] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.080381] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.131020] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.676878] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.732251] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.778232] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549305.996414] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.039916] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.087233] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.108856] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549312.155430] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.212534] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.318757] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549322.225490] exe[762988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562bd7b3c839 cs:33 sp:7fa30ef1dee8 ax:0 si:20000040 di:ffffffffff600000 [11549322.630226] exe[764150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfd46d0839 cs:33 sp:7faa79d58ee8 ax:0 si:20000040 di:ffffffffff600000 [11549324.167848] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.225685] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.290963] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.248247] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.295182] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.339907] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549332.992606] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.032076] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.055923] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.100145] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549335.966184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.011362] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.012156] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.070502] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.114461] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.160317] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549338.584854] warn_bad_vsyscall: 2 callbacks suppressed [11549338.584858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.635465] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.677495] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.698822] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549340.992026] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.047021] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.090860] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.757473] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.798199] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.800483] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549348.007006] warn_bad_vsyscall: 1 callbacks suppressed [11549348.007011] exe[810081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549348.123020] exe[791686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549350.842435] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901911] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901928] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.014907] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.053068] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.180049] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.331135] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.395122] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.416889] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549364.967687] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.283036] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.311226] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.607785] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.633332] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.913539] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.952794] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549371.002201] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.234160] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.271594] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.294407] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.333242] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.357403] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.827451] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.879499] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.902128] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.944274] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.945164] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.055187] exe[801669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed61f88839 cs:33 sp:7fe8832e6ee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.056978] exe[807650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565118c94839 cs:33 sp:7f5e3a4beee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.354001] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.404830] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.452731] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549390.994794] warn_bad_vsyscall: 3 callbacks suppressed [11549390.994799] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.055906] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.103464] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.731184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.798921] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.850231] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549421.224700] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.287217] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.330715] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.332297] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.364793] exe[733349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079ee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.644237] exe[777007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564419386839 cs:33 sp:7f341debdee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.652842] exe[812391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b98a4cd839 cs:33 sp:7fdb944daee8 ax:0 si:20000040 di:ffffffffff600000 [11549422.842044] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.891535] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.931486] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.356143] warn_bad_vsyscall: 6 callbacks suppressed [11549426.356147] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.409055] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.429411] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.469059] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.492130] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.953107] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.002112] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.051579] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.052798] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.523865] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.574374] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.617270] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.644076] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.542912] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.586509] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.635656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.656472] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.333222] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.385051] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.407654] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.463938] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.486314] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.506017] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549450.523743] warn_bad_vsyscall: 66 callbacks suppressed [11549450.523747] exe[813165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13bc63839 cs:33 sp:7fab0d06fee8 ax:0 si:20000040 di:ffffffffff600000 [11549450.715540] exe[807311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9a7633839 cs:33 sp:7f1120b17ee8 ax:0 si:20000040 di:ffffffffff600000 [11549455.474323] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.517320] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.539071] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.582910] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549462.474386] exe[756116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1de600839 cs:33 sp:7fba5c050ee8 ax:0 si:20000040 di:ffffffffff600000 [11549462.926878] exe[794394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559edb8a0839 cs:33 sp:7f1c503e2ee8 ax:0 si:20000040 di:ffffffffff600000 [11549466.434155] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.490814] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.533742] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.534602] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.211071] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.252741] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.291120] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.295633] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.635585] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.677652] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.719660] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.867443] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.908983] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.909927] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.964262] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.495137] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.790729] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.859182] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.290345] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.357829] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.426947] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549593.412229] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549593.562650] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.243778] exe[812951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c749ce839 cs:33 sp:7ea297e86ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.710759] exe[828296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c970632839 cs:33 sp:7ec3ceeb7ee8 ax:0 si:20000040 di:ffffffffff600000 [11549714.981109] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549715.749772] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.546233] exe[814844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5b0f9a839 cs:33 sp:7fc5bfbfeee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.735375] exe[814714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b554191839 cs:33 sp:7f6febbf8ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.362481] exe[783694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.735183] exe[800231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549816.546602] exe[821122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549817.188403] exe[822913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549840.206573] exe[828178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcd7d54839 cs:33 sp:7eba87823ee8 ax:0 si:20000040 di:ffffffffff600000 [11549842.390425] exe[822623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41ee8 ax:0 si:20000040 di:ffffffffff600000 [11549851.814988] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549851.979785] exe[834049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037235] exe[831079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9be858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037247] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549869.928825] exe[833586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d7fa8b839 cs:33 sp:7fd723b3eee8 ax:0 si:20000040 di:ffffffffff600000 [11549870.243345] exe[834928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56062534e839 cs:33 sp:7f0757548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549959.675292] exe[797744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558fc8494839 cs:33 sp:7f29d40d3ee8 ax:0 si:20000040 di:ffffffffff600000 [11549964.327083] exe[816565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d710109839 cs:33 sp:7f42012e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11550011.778578] exe[785408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.328909] exe[777936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.464501] exe[784143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550449.411992] exe[840751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d4deee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.543051] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.570209] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.601466] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.628501] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.655874] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.684944] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.711295] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.738186] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.768990] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11551293.287525] warn_bad_vsyscall: 57 callbacks suppressed [11551293.287528] exe[872567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.432824] exe[872441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64d6ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.635840] exe[878590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551350.987871] exe[802426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.133434] exe[801154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.264861] exe[800782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551739.212650] exe[891790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.358004] exe[874588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.423302] exe[876706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11552746.340520] exe[917620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552746.540849] exe[917777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552749.324099] exe[916114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11553787.312373] exe[918824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd909c3bee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.233139] exe[932505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097feee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.702294] exe[918368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097bcee8 ax:0 si:20000300 di:ffffffffff600000 [11556405.744028] exe[973340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.888821] exe[974236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.889344] exe[972981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.769888] exe[966210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.770120] exe[966208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556828.744398] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556828.924558] exe[26205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.059181] exe[13280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.100292] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556926.028445] exe[987233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8fe9a7839 cs:33 sp:7f1b02da7858 ax:0 si:55d8fea00070 di:ffffffffff600000 [11556931.514747] exe[2731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecfc56a839 cs:33 sp:7efc33043858 ax:0 si:55ecfc5c3070 di:ffffffffff600000 [11556932.678559] exe[32873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c147b8d839 cs:33 sp:7f3ef85dc858 ax:0 si:55c147be6070 di:ffffffffff600000 [11556950.820318] exe[29772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561443faf839 cs:33 sp:7f0e531fe858 ax:0 si:561444008070 di:ffffffffff600000 [11557024.979366] exe[990140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557025.945778] exe[989269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557026.183320] exe[36260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556217b32839 cs:33 sp:7fddcd279858 ax:0 si:556217b8b070 di:ffffffffff600000 [11557026.761986] exe[18772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1290fa839 cs:33 sp:7fc527cc9858 ax:0 si:55e129153070 di:ffffffffff600000 [11557029.543342] exe[10486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4073da839 cs:33 sp:7ee9c91fe858 ax:0 si:55a407433070 di:ffffffffff600000 [11557029.565342] exe[955869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f019e21839 cs:33 sp:7ec4f6665858 ax:0 si:55f019e7a070 di:ffffffffff600000 [11557070.452747] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557071.382941] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557079.659895] exe[37699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557079.763841] exe[37791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557081.617680] exe[31464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557081.699452] exe[32275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557085.755120] exe[978697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557086.768436] exe[984524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557092.839673] exe[19916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb78120839 cs:33 sp:7fb79022c858 ax:0 si:55bb78179070 di:ffffffffff600000 [11557105.272126] exe[16964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558fd61d839 cs:33 sp:7fb861029858 ax:0 si:5558fd676070 di:ffffffffff600000 [11557125.514096] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557127.078867] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557154.900378] exe[36166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557159.639958] exe[39906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557221.493537] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557226.224888] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557248.504217] exe[43502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557250.866532] exe[43487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557522.293434] exe[57221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.454602] exe[43299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f0d858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.576325] exe[56829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11558001.442748] exe[17430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.578829] exe[36871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.610672] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.923774] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558002.987979] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.102566] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.246645] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.372957] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.494809] exe[20846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.643478] exe[20903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11560610.686110] warn_bad_vsyscall: 8 callbacks suppressed [11560610.686113] exe[99111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560610.846189] exe[96849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560611.008067] exe[96916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcd2858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560620.483506] exe[100810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11561057.499685] exe[98831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.289038] exe[108411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3eff858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.393219] exe[101690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561923.921251] exe[152411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3feee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.060175] exe[152385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.128957] exe[154085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11562242.603414] exe[164541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.658947] exe[164509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.726852] exe[164557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562318.141986] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.185850] exe[165157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.230040] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562508.870615] exe[162696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562508.954821] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee79778e858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.041779] exe[152279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.053797] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.099380] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.158846] exe[154196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.222873] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.299400] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.361377] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.442875] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562513.886961] warn_bad_vsyscall: 78 callbacks suppressed [11562513.886964] exe[153246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562513.966428] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.077335] exe[150507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.160213] exe[166511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.255440] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.324063] exe[148511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.397110] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.417360] exe[153945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.500074] exe[148482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.657039] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562518.891334] warn_bad_vsyscall: 242 callbacks suppressed [11562518.891337] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.918008] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.940541] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.962612] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.984566] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.004824] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.026469] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.052169] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.077333] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.100492] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562523.895932] warn_bad_vsyscall: 195 callbacks suppressed [11562523.895936] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562523.979579] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.056179] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.153870] exe[157649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.235431] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.312684] exe[163330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.336197] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.425044] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.462329] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.531409] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.910818] warn_bad_vsyscall: 88 callbacks suppressed [11562528.910821] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.988209] exe[148466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.051915] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.121864] exe[148494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.148494] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.234883] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.511729] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.649601] exe[155191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.693598] exe[155337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.749781] exe[145592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11563296.983914] warn_bad_vsyscall: 51 callbacks suppressed [11563296.983917] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.050803] exe[209501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.121483] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.191808] exe[245375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11564162.444776] exe[282975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.703356] exe[282980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.920885] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.952924] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.989739] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.026962] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.062712] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.106058] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.144988] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.183482] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11565099.136493] warn_bad_vsyscall: 57 callbacks suppressed [11565099.136497] exe[293094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565099.258727] exe[294155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.043336] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.121398] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11566632.890447] exe[349719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f764152839 cs:33 sp:7fdb7b72b858 ax:0 si:55f7641ab062 di:ffffffffff600000 [11567358.170812] exe[372737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda5a9a839 cs:33 sp:7f549c97e858 ax:0 si:55fda5af3062 di:ffffffffff600000 [11568031.388619] exe[351576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d82c2e839 cs:33 sp:7ecffe498858 ax:0 si:558d82c87062 di:ffffffffff600000 [11569260.474399] exe[375466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569261.377312] exe[338184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569262.181339] exe[382316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d087f858 ax:0 si:559bde482062 di:ffffffffff600000 [11569309.954783] exe[405267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.065111] exe[352156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.120066] exe[398935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.176797] exe[393693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.243561] exe[405400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.277532] exe[399019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.333288] exe[393672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569717.914214] exe[406088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094052] exe[372314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bbcee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094670] exe[337720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.213977] exe[406250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bddee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11570627.586664] exe[417752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.638479] exe[417746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.766448] exe[441957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11572038.765476] exe[475895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889db1ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572038.977536] exe[479441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572039.176765] exe[479800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572342.507294] exe[481351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf282c5839 cs:33 sp:7f5c28337858 ax:0 si:55cf2831e070 di:ffffffffff600000 [11572577.393150] exe[486689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572577.473226] exe[486687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572578.211498] exe[486677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572754.198775] exe[481332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56477294c839 cs:33 sp:7f001edd1858 ax:0 si:5647729a5062 di:ffffffffff600000 [11574240.728150] exe[551421] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6f0ee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574241.487023] exe[545323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6aeee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574242.469682] exe[546003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6cfee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11575422.643597] exe[620510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.701376] exe[619500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.762542] exe[619046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575566.007915] exe[523991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.091195] exe[551819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.166155] exe[628916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11576445.764659] exe[712019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.878131] exe[712009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.982369] exe[711902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576887.854922] exe[723515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576887.911232] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.005831] exe[716298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.078248] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11578050.810150] exe[736914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.915350] exe[806208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.957314] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578050.969802] exe[799678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.032458] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.066640] exe[799655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.100539] exe[801517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.138612] exe[806683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.200188] exe[801281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.222257] exe[734041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11579845.499536] exe[851008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2109ed839 cs:33 sp:7f547858c858 ax:0 si:55e210a46062 di:ffffffffff600000 [11579884.100862] exe[859314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.173286] exe[861221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.225785] exe[861085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11580352.706875] exe[880278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc72733839 cs:33 sp:7ece8f07f858 ax:0 si:55dc7278c062 di:ffffffffff600000 [11581411.682652] exe[910863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555579041839 cs:33 sp:7eedc077f858 ax:0 si:55557909a062 di:ffffffffff600000 [11583407.177111] docker0: port 1(vethe259598) entered blocking state [11583407.183502] docker0: port 1(vethe259598) entered disabled state [11583407.190068] device vethe259598 entered promiscuous mode [11583408.741833] eth0: renamed from veth1e830bc [11583408.814556] IPv6: ADDRCONF(NETDEV_CHANGE): vethe259598: link becomes ready [11583408.822198] docker0: port 1(vethe259598) entered blocking state [11583408.828542] docker0: port 1(vethe259598) entered forwarding state [11583408.835194] IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready [11583412.300279] veth1e830bc: renamed from eth0 [11583412.448612] docker0: port 1(vethe259598) entered disabled state [11583412.462563] docker0: port 1(vethe259598) entered disabled state [11583412.479276] device vethe259598 left promiscuous mode [11583412.485146] docker0: port 1(vethe259598) entered disabled state [11583431.825145] docker0: port 1(vethc7abddf) entered blocking state [11583431.831533] docker0: port 1(vethc7abddf) entered disabled state [11583431.838215] device vethc7abddf entered promiscuous mode [11583432.494406] eth0: renamed from vethd633b4d [11583432.599425] IPv6: ADDRCONF(NETDEV_CHANGE): vethc7abddf: link becomes ready [11583432.607140] docker0: port 1(vethc7abddf) entered blocking state [11583432.613499] docker0: port 1(vethc7abddf) entered forwarding state [11583817.129561] vethd633b4d: renamed from eth0 [11583817.523399] docker0: port 1(vethc7abddf) entered disabled state [11583817.532193] docker0: port 1(vethc7abddf) entered disabled state [11583817.545763] device vethc7abddf left promiscuous mode [11583817.552461] docker0: port 1(vethc7abddf) entered disabled state [11584054.884518] audit: type=1326 audit(1689187802.116:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584055.879755] audit: type=1326 audit(1689187803.112:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103700 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584567.089744] audit: type=1326 audit(1689188314.320:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=182950 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584611.088374] audit: type=1326 audit(1689188358.312:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263707 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584672.762944] audit: type=1326 audit(1689188419.991:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584875.420389] audit: type=1326 audit(1689188622.651:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=188936 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584965.440931] audit: type=1326 audit(1689188712.671:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585225.740695] audit: type=1326 audit(1689188972.971:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585229.617269] audit: type=1326 audit(1689188976.847:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585232.156357] audit: type=1326 audit(1689188979.387:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=272781 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585314.538060] audit: type=1326 audit(1689189061.767:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343964 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585378.674528] audit: type=1326 audit(1689189125.902:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=441825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585433.090919] audit: type=1326 audit(1689189180.318:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585457.504489] audit: type=1326 audit(1689189204.734:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585481.843203] audit: type=1326 audit(1689189229.070:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488144 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585504.254722] audit: type=1326 audit(1689189251.482:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.053267] audit: type=1326 audit(1689189275.282:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493114 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.807884] audit: type=1326 audit(1689189276.034:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585528.832541] audit: type=1326 audit(1689189276.038:28): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442984 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585545.824476] audit: type=1326 audit(1689189293.054:29): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585551.212031] audit: type=1326 audit(1689189298.438:30): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585623.106438] audit: type=1326 audit(1689189370.334:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=368087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585650.678959] audit: type=1326 audit(1689189397.906:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=503494 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585666.774803] audit: type=1326 audit(1689189413.998:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585672.549526] audit: type=1326 audit(1689189419.774:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585675.835169] audit: type=1326 audit(1689189423.062:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=519541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585680.990321] audit: type=1326 audit(1689189428.218:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585682.225303] audit: type=1326 audit(1689189429.454:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=523487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585692.507931] audit: type=1326 audit(1689189439.734:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529974 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585700.810773] audit: type=1326 audit(1689189448.038:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585707.330135] audit: type=1326 audit(1689189454.558:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585707.355627] audit: type=1326 audit(1689189454.570:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585760.137664] audit: type=1326 audit(1689189507.366:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585842.181262] audit: type=1326 audit(1689189589.410:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=543905 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585953.240671] audit: type=1326 audit(1689189700.466:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=436527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585977.153008] audit: type=1326 audit(1689189724.382:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585983.993412] audit: type=1326 audit(1689189731.222:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586006.672711] audit: type=1326 audit(1689189753.898:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586140.152824] audit: type=1326 audit(1689189887.377:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586207.321863] audit: type=1326 audit(1689189954.549:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586222.617377] audit: type=1326 audit(1689189969.845:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586222.733853] audit: type=1326 audit(1689189969.961:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586283.299802] audit: type=1326 audit(1689190030.525:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586425.211851] audit: type=1326 audit(1689190172.437:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=660268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586448.276864] audit: type=1326 audit(1689190195.501:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=709276 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586599.517442] audit: type=1326 audit(1689190346.745:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586697.763797] audit: type=1326 audit(1689190444.989:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=749851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586721.351015] audit: type=1326 audit(1689190468.577:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=795666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586855.921790] audit: type=1326 audit(1689190603.152:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796699 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586945.894236] audit: type=1326 audit(1689190693.124:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=533305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.031898] audit: type=1326 audit(1689190744.260:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.140632] audit: type=1326 audit(1689190744.368:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862850 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586998.283858] audit: type=1326 audit(1689190745.512:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587012.567629] audit: type=1326 audit(1689190759.796:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879241 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587019.764188] audit: type=1326 audit(1689190766.992:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=885098 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587033.584838] audit: type=1326 audit(1689190780.812:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=895459 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587037.458391] audit: type=1326 audit(1689190784.688:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587047.438093] audit: type=1326 audit(1689190794.652:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587181.826148] audit: type=1326 audit(1689190929.056:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=905801 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587280.280946] audit: type=1326 audit(1689191027.508:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587323.352812] audit: type=1326 audit(1689191070.580:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587345.059700] audit: type=1326 audit(1689191092.288:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=549018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587346.322122] audit: type=1326 audit(1689191093.552:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=930804 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587481.789421] audit: type=1326 audit(1689191229.016:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931842 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587625.478553] audit: type=1326 audit(1689191372.707:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587708.307169] audit: type=1326 audit(1689191455.535:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=756034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587769.707671] audit: type=1326 audit(1689191516.935:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587868.987704] audit: type=1326 audit(1689191616.215:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587911.691294] audit: type=1326 audit(1689191658.919:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=953497 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587972.252639] audit: type=1326 audit(1689191719.479:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949672 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588027.579353] audit: type=1326 audit(1689191774.807:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=964425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11588054.186210] audit: type=1326 audit(1689191801.411:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=959048 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588196.763380] audit: type=1326 audit(1689191943.991:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=966784 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588241.418032] audit: type=1326 audit(1689191988.643:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961678 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588257.524755] exe[970083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563948302839 cs:33 sp:7f701577b858 ax:0 si:56394835b062 di:ffffffffff600000 [11588338.712384] audit: type=1326 audit(1689192085.938:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588361.040657] audit: type=1326 audit(1689192108.266:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588415.532026] audit: type=1326 audit(1689192162.758:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=601426 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588610.783264] audit: type=1326 audit(1689192358.006:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984049 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588726.496588] audit: type=1326 audit(1689192473.722:88): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588753.178927] audit: type=1326 audit(1689192500.402:89): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988316 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588776.098474] audit: type=1326 audit(1689192523.322:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992296 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588907.567479] audit: type=1326 audit(1689192654.790:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588943.441393] audit: type=1326 audit(1689192690.666:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=997051 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589004.500919] audit: type=1326 audit(1689192751.725:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589049.699452] audit: type=1326 audit(1689192796.921:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589192.852319] audit: type=1326 audit(1689192940.077:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589224.823353] audit: type=1326 audit(1689192972.045:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=957390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589279.679649] audit: type=1326 audit(1689193026.901:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999123 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589317.854470] audit: type=1326 audit(1689193065.077:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9166 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589336.359512] audit: type=1326 audit(1689193083.581:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589429.636946] audit: type=1326 audit(1689193176.861:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589439.329881] audit: type=1326 audit(1689193186.553:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589452.248556] audit: type=1326 audit(1689193199.473:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589478.982418] audit: type=1326 audit(1689193226.205:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10335 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589556.277003] audit: type=1326 audit(1689193303.501:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589580.979071] audit: type=1326 audit(1689193328.201:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589586.686728] audit: type=1326 audit(1689193333.909:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589621.171546] audit: type=1326 audit(1689193368.393:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19657 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589724.809423] audit: type=1326 audit(1689193472.032:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=975428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589728.293279] audit: type=1326 audit(1689193475.516:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589733.237752] audit: type=1326 audit(1689193480.460:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589743.161653] audit: type=1326 audit(1689193490.388:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589764.186602] audit: type=1326 audit(1689193511.412:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589776.120531] audit: type=1326 audit(1689193523.348:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589831.237562] audit: type=1326 audit(1689193578.464:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=991342 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589866.353844] audit: type=1326 audit(1689193613.580:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589870.843852] audit: type=1326 audit(1689193618.068:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589881.503035] exe[37537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589881.579767] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.310348] exe[38197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.415993] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589905.778137] audit: type=1326 audit(1689193653.004:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589907.278419] audit: type=1326 audit(1689193654.504:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36131 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589910.766143] audit: type=1326 audit(1689193657.992:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590010.704598] audit: type=1326 audit(1689193757.928:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590013.206490] audit: type=1326 audit(1689193760.432:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43383 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590049.200088] audit: type=1326 audit(1689193796.424:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=47282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590068.122169] audit: type=1326 audit(1689193815.348:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50694 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590073.502291] audit: type=1326 audit(1689193820.728:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590120.931053] audit: type=1326 audit(1689193868.156:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590155.535046] audit: type=1326 audit(1689193902.760:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=54378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590175.976226] audit: type=1326 audit(1689193923.200:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=981718 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590178.057670] audit: type=1326 audit(1689193925.284:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=60876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590190.713262] audit: type=1326 audit(1689193937.940:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56012 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590230.205782] audit: type=1326 audit(1689193977.432:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590235.472981] audit: type=1326 audit(1689193982.700:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58981 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590334.418166] audit: type=1326 audit(1689194081.644:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=62081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590356.564544] audit: type=1326 audit(1689194103.788:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=68645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590368.499637] audit: type=1326 audit(1689194115.724:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=69347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590393.106260] audit: type=1326 audit(1689194140.332:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590397.337896] audit: type=1326 audit(1689194144.564:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590421.065575] audit: type=1326 audit(1689194168.292:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=55042 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590427.197777] audit: type=1326 audit(1689194174.424:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=66561 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590480.784621] exe[70942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6628c839 cs:33 sp:7fa6d27d0858 ax:0 si:563a662e5062 di:ffffffffff600000 [11590563.298809] audit: type=1326 audit(1689194310.523:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=73853 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590570.174470] audit: type=1326 audit(1689194317.399:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74121 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590579.511563] audit: type=1326 audit(1689194326.735:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=41148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.165028] audit: type=1326 audit(1689194365.387:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.556131] audit: type=1326 audit(1689194365.779:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76917 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590659.789661] audit: type=1326 audit(1689194407.015:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=72204 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590667.566138] audit: type=1326 audit(1689194414.791:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=59720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590713.717972] audit: type=1326 audit(1689194460.943:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=81970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590760.577913] audit: type=1326 audit(1689194507.803:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=85519 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590773.925188] audit: type=1326 audit(1689194521.147:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=86433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590829.878288] audit: type=1326 audit(1689194577.103:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590843.309873] audit: type=1326 audit(1689194590.535:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=90249 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590856.337400] audit: type=1326 audit(1689194603.563:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=91077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590883.659438] exe[98704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.745839] exe[98692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.804815] exe[73130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590905.357910] audit: type=1326 audit(1689194652.583:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590994.002065] audit: type=1326 audit(1689194741.227:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=82851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590997.870766] audit: type=1326 audit(1689194745.095:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98690 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591045.573250] audit: type=1326 audit(1689194792.795:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=61248 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591047.449319] audit: type=1326 audit(1689194794.671:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=100862 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591140.220327] audit: type=1326 audit(1689194887.443:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103773 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591190.314804] audit: type=1326 audit(1689194937.538:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591282.744645] audit: type=1326 audit(1689195029.966:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=110698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591291.245979] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.293995] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.340272] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.365662] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591332.697604] audit: type=1326 audit(1689195079.918:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=112617 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591355.547113] audit: type=1326 audit(1689195102.770:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=116982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591358.161112] audit: type=1326 audit(1689195105.382:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98099 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591425.677450] audit: type=1326 audit(1689195172.898:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=115486 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591448.624599] audit: type=1326 audit(1689195195.846:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=119555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591607.174755] audit: type=1326 audit(1689195354.398:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=120483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591633.329281] audit: type=1326 audit(1689195380.550:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=118107 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591699.123909] audit: type=1326 audit(1689195446.346:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=123336 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591750.549397] audit: type=1326 audit(1689195497.770:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=124794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591808.120865] audit: type=1326 audit(1689195555.342:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591843.602538] audit: type=1326 audit(1689195590.826:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127514 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591873.374278] audit: type=1326 audit(1689195620.594:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591893.157685] audit: type=1326 audit(1689195640.377:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128877 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591982.621819] audit: type=1326 audit(1689195729.841:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127317 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591989.377409] audit: type=1326 audit(1689195736.597:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131086 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592022.574487] audit: type=1326 audit(1689195769.793:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87153 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592035.999430] audit: type=1326 audit(1689195783.221:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=132961 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592132.313885] audit: type=1326 audit(1689195879.533:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135592 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592143.607778] audit: type=1326 audit(1689195890.829:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128178 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592178.641536] audit: type=1326 audit(1689195925.861:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138468 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592254.513447] audit: type=1326 audit(1689196001.733:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592273.875922] audit: type=1326 audit(1689196021.097:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=140726 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592302.580569] audit: type=1326 audit(1689196049.801:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592321.531004] audit: type=1326 audit(1689196068.753:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=142352 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592339.728090] audit: type=1326 audit(1689196086.949:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=130223 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592369.761746] audit: type=1326 audit(1689196116.981:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103571 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592410.933916] audit: type=1326 audit(1689196158.153:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=150341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592416.511036] audit: type=1326 audit(1689196163.733:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=145063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592462.058974] audit: type=1326 audit(1689196209.281:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=141810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592463.310936] audit: type=1326 audit(1689196210.533:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592485.344448] audit: type=1326 audit(1689196232.565:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153095 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592558.476558] audit: type=1326 audit(1689196305.697:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=151044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592615.624930] audit: type=1326 audit(1689196362.844:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592699.997739] audit: type=1326 audit(1689196447.220:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592710.156296] audit: type=1326 audit(1689196457.380:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156955 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592721.951674] audit: type=1326 audit(1689196469.176:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592736.718023] audit: type=1326 audit(1689196483.940:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153479 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592741.098019] audit: type=1326 audit(1689196488.320:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592755.557937] audit: type=1326 audit(1689196502.780:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=149411 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592759.276627] audit: type=1326 audit(1689196506.500:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158134 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592769.332142] audit: type=1326 audit(1689196516.556:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592779.678505] audit: type=1326 audit(1689196526.900:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=144000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592781.810254] audit: type=1326 audit(1689196529.032:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592864.422847] audit: type=1326 audit(1689196611.644:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161799 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592924.228200] audit: type=1326 audit(1689196671.452:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164650 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592972.503710] audit: type=1326 audit(1689196719.728:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166288 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593019.764197] audit: type=1326 audit(1689196766.988:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=168704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593032.140808] audit: type=1326 audit(1689196779.364:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=169078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593079.379374] audit: type=1326 audit(1689196826.600:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593114.910849] audit: type=1326 audit(1689196862.132:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.622118] audit: type=1326 audit(1689196921.844:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.825662] audit: type=1326 audit(1689196922.048:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593178.076737] audit: type=1326 audit(1689196925.300:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162576 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593234.654096] audit: type=1326 audit(1689196981.876:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593257.424976] audit: type=1326 audit(1689197004.648:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=177244 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593293.232827] audit: type=1326 audit(1689197040.456:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=137729 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593317.825573] audit: type=1326 audit(1689197065.048:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=180616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593323.667486] audit: type=1326 audit(1689197070.888:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=189200 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593328.061505] audit: type=1326 audit(1689197075.284:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=148080 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593329.981467] audit: type=1326 audit(1689197077.204:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593338.759166] audit: type=1326 audit(1689197085.979:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=165105 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593389.569262] audit: type=1326 audit(1689197136.791:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=186680 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593396.219631] exe[152440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d776adb40a cs:33 sp:7ed61def9ee8 ax:12 si:ffffffffff600000 di:55d776b47ff2 [11593399.988581] audit: type=1326 audit(1689197147.211:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=187139 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593439.960246] exe[66056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be798b40a cs:33 sp:7f6af116aee8 ax:12 si:ffffffffff600000 di:555be79f7ff2 [11593461.573435] audit: type=1326 audit(1689197208.795:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=190626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593485.256569] audit: type=1326 audit(1689197232.479:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593497.873599] audit: type=1326 audit(1689197245.095:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593518.294739] audit: type=1326 audit(1689197265.515:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593521.883008] exe[199220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da1a09d40a cs:33 sp:7f85f4e68ee8 ax:12 si:ffffffffff600000 di:55da1a109ff2 [11593544.715149] audit: type=1326 audit(1689197291.935:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=197050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593545.100259] audit: type=1326 audit(1689197292.323:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=196843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593575.000948] exe[134062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639deab340a cs:33 sp:7f755d14fee8 ax:12 si:ffffffffff600000 di:5639deb1fff2 [11593604.159283] audit: type=1326 audit(1689197351.379:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=200356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593640.473262] audit: type=1326 audit(1689197387.695:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202521 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593657.667580] exe[179402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591c09e940a cs:33 sp:7f261affeee8 ax:12 si:ffffffffff600000 di:5591c0a55ff2 [11593674.309236] audit: type=1326 audit(1689197421.531:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593689.965207] audit: type=1326 audit(1689197437.187:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205540 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593691.547751] exe[160101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569db9d240a cs:33 sp:7fa8a79ccee8 ax:12 si:ffffffffff600000 di:5569dba3eff2 [11593699.961762] audit: type=1326 audit(1689197447.183:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=206003 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593728.160554] audit: type=1326 audit(1689197475.383:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593746.828768] audit: type=1326 audit(1689197494.051:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=207759 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593795.835659] audit: type=1326 audit(1689197543.055:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209535 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593832.663491] audit: type=1326 audit(1689197579.883:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210532 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593838.669590] exe[171215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56258f57d40a cs:33 sp:7eee19bc0ee8 ax:12 si:ffffffffff600000 di:56258f5e9ff2 [11593855.337569] audit: type=1326 audit(1689197602.559:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211977 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593873.582187] exe[168156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea3654340a cs:33 sp:7ee36dc7fee8 ax:12 si:ffffffffff600000 di:55ea365afff2 [11593890.297485] audit: type=1326 audit(1689197637.519:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=212765 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593894.219651] audit: type=1326 audit(1689197641.439:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=203030 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593950.988419] audit: type=1326 audit(1689197698.211:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215006 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593958.108331] exe[223988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55790709f40a cs:33 sp:7fc0e2306ee8 ax:12 si:ffffffffff600000 di:55790710bff2 [11593975.515820] audit: type=1326 audit(1689197722.735:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=216520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594010.397443] audit: type=1326 audit(1689197757.615:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594030.252814] audit: type=1326 audit(1689197777.475:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594033.719885] audit: type=1326 audit(1689197780.939:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=220218 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594106.182590] audit: type=1326 audit(1689197853.402:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594117.815412] audit: type=1326 audit(1689197865.034:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=239115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594117.935385] audit: type=1326 audit(1689197865.154:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225643 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594165.847268] audit: type=1326 audit(1689197913.066:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=230078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594174.793835] audit: type=1326 audit(1689197922.014:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=244854 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594175.873367] audit: type=1326 audit(1689197923.094:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594199.462125] audit: type=1326 audit(1689197946.682:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594224.432971] audit: type=1326 audit(1689197971.654:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=249792 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594261.404105] audit: type=1326 audit(1689198008.622:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=241022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594318.932606] audit: type=1326 audit(1689198066.150:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594320.925806] audit: type=1326 audit(1689198068.146:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594356.854437] audit: type=1326 audit(1689198104.074:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594380.768141] audit: type=1326 audit(1689198127.986:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=240966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594390.465281] audit: type=1326 audit(1689198137.686:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=228574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594461.153994] audit: type=1326 audit(1689198208.374:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=255268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594476.069454] audit: type=1326 audit(1689198223.290:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=256911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594518.406656] audit: type=1326 audit(1689198265.626:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594523.088185] audit: type=1326 audit(1689198270.306:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594597.381921] audit: type=1326 audit(1689198344.602:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=191172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594603.685087] audit: type=1326 audit(1689198350.906:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=266554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594631.412121] audit: type=1326 audit(1689198378.630:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=268442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594632.657909] audit: type=1326 audit(1689198379.878:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=258967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594662.779958] exe[279809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594662.854447] exe[276685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713532] exe[277223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713638] exe[279858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bddee8 ax:0 si:20000080 di:ffffffffff600000 [11594665.693757] audit: type=1326 audit(1689198412.914:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594673.507995] audit: type=1326 audit(1689198420.726:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594730.359948] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.445155] exe[278569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.446222] exe[278851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.540368] exe[278597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.552108] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.612605] exe[281701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.638579] exe[278601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594746.644836] audit: type=1326 audit(1689198493.862:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=277230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594768.991618] audit: type=1326 audit(1689198516.210:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291770 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594786.336470] audit: type=1326 audit(1689198533.553:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594808.089645] audit: type=1326 audit(1689198555.309:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=281516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594828.717418] audit: type=1326 audit(1689198575.937:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=284014 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594880.645359] audit: type=1326 audit(1689198627.865:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=276757 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594915.736039] audit: type=1326 audit(1689198662.953:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=296537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594941.113632] audit: type=1326 audit(1689198688.333:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=293790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594951.088221] audit: type=1326 audit(1689198698.305:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594973.980095] audit: type=1326 audit(1689198721.197:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=298957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595018.844858] audit: type=1326 audit(1689198766.061:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595030.820319] audit: type=1326 audit(1689198778.037:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263124 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595032.223366] audit: type=1326 audit(1689198779.441:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595145.554563] audit: type=1326 audit(1689198892.773:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=300890 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595161.269631] audit: type=1326 audit(1689198908.489:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=301412 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595170.431765] audit: type=1326 audit(1689198917.649:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595185.313809] audit: type=1326 audit(1689198932.533:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595201.280000] audit: type=1326 audit(1689198948.497:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=304270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595223.038909] audit: type=1326 audit(1689198970.257:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=305529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595268.993349] audit: type=1326 audit(1689199016.209:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280239 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595304.435314] audit: type=1326 audit(1689199051.653:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595356.370847] audit: type=1326 audit(1689199103.589:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=311169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595366.975635] audit: type=1326 audit(1689199114.193:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=312137 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595426.830311] audit: type=1326 audit(1689199174.049:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=315053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595427.662370] audit: type=1326 audit(1689199174.881:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=303097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595446.025545] audit: type=1326 audit(1689199193.241:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=316510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595464.682020] audit: type=1326 audit(1689199211.901:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=318190 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595509.649702] audit: type=1326 audit(1689199256.864:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323600 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595510.657426] audit: type=1326 audit(1689199257.872:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595542.116878] audit: type=1326 audit(1689199289.332:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=302591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595581.328126] audit: type=1326 audit(1689199328.548:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328777 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595587.640931] audit: type=1326 audit(1689199334.860:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=329367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595651.155320] audit: type=1326 audit(1689199398.376:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=333972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595702.302607] audit: type=1326 audit(1689199449.524:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595730.144192] audit: type=1326 audit(1689199477.364:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=337996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595740.233803] audit: type=1326 audit(1689199487.452:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=338460 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595792.585821] audit: type=1326 audit(1689199539.804:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=341419 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595825.580712] audit: type=1326 audit(1689199572.800:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595875.108425] audit: type=1326 audit(1689199622.328:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595901.852174] audit: type=1326 audit(1689199649.072:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344849 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595905.389538] audit: type=1326 audit(1689199652.608:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=314916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595925.496842] audit: type=1326 audit(1689199672.716:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=335810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595934.736760] audit: type=1326 audit(1689199681.956:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=345386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595971.418522] audit: type=1326 audit(1689199718.640:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308731 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595980.227077] audit: type=1326 audit(1689199727.448:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596018.056630] audit: type=1326 audit(1689199765.276:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=356309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596056.500390] audit: type=1326 audit(1689199803.720:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=361636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596075.947223] audit: type=1326 audit(1689199823.168:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=363826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596134.937184] audit: type=1326 audit(1689199882.156:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=373258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596159.034584] audit: type=1326 audit(1689199906.256:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=375929 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596177.422094] audit: type=1326 audit(1689199924.640:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383229 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596180.530915] audit: type=1326 audit(1689199927.752:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596187.965307] audit: type=1326 audit(1689199935.184:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596211.290275] audit: type=1326 audit(1689199958.508:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596218.125572] audit: type=1326 audit(1689199965.344:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596246.667371] audit: type=1326 audit(1689199993.887:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=389789 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596290.009508] audit: type=1326 audit(1689200037.227:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=382687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596301.649961] audit: type=1326 audit(1689200048.867:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383548 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596322.674538] audit: type=1326 audit(1689200069.891:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=385382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596359.395258] audit: type=1326 audit(1689200106.615:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=388832 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596368.814653] audit: type=1326 audit(1689200116.035:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=401516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596443.646206] audit: type=1326 audit(1689200190.863:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=396416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596466.257416] audit: type=1326 audit(1689200213.475:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=407911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596502.013601] audit: type=1326 audit(1689200249.231:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=403529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596564.211893] audit: type=1326 audit(1689200311.431:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=406533 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596594.833485] audit: type=1326 audit(1689200342.051:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596642.054964] audit: type=1326 audit(1689200389.275:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596644.775799] audit: type=1326 audit(1689200391.995:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412267 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596718.281279] audit: type=1326 audit(1689200465.499:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420908 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596748.828125] exe[433668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b25822839 cs:33 sp:7f1f6d4d3858 ax:0 si:558b2587b062 di:ffffffffff600000 [11596786.178383] audit: type=1326 audit(1689200533.395:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=425510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596794.175733] audit: type=1326 audit(1689200541.395:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426145 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596845.812515] audit: type=1326 audit(1689200593.031:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431991 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596871.244869] audit: type=1326 audit(1689200618.463:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596896.868375] audit: type=1326 audit(1689200644.087:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=405560 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596929.235998] audit: type=1326 audit(1689200676.455:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596963.597646] audit: type=1326 audit(1689200710.814:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431840 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596988.259748] audit: type=1326 audit(1689200735.478:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=440156 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597030.957935] audit: type=1326 audit(1689200778.174:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597070.847230] audit: type=1326 audit(1689200818.066:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443447 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597089.178816] audit: type=1326 audit(1689200836.394:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444711 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597129.189094] audit: type=1326 audit(1689200876.406:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=445864 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597150.586654] audit: type=1326 audit(1689200897.802:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447377 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597150.630455] audit: type=1326 audit(1689200897.846:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597213.244332] audit: type=1326 audit(1689200960.462:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=455277 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597271.316230] audit: type=1326 audit(1689201018.534:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=460261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597310.051733] audit: type=1326 audit(1689201057.270:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597313.276441] audit: type=1326 audit(1689201060.494:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597314.610726] audit: type=1326 audit(1689201061.826:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=464050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597357.135100] audit: type=1326 audit(1689201104.350:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=468066 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597413.137470] audit: type=1326 audit(1689201160.354:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443184 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597414.535659] audit: type=1326 audit(1689201161.754:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=471566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597474.924098] audit: type=1326 audit(1689201222.142:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597476.117154] audit: type=1326 audit(1689201223.334:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476538 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597498.269056] audit: type=1326 audit(1689201245.486:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597555.566526] audit: type=1326 audit(1689201302.782:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=482783 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597641.232540] audit: type=1326 audit(1689201388.450:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=489586 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597669.950313] exe[494500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e652697839 cs:33 sp:7f7b088e1858 ax:0 si:55e6526f0070 di:ffffffffff600000 [11597698.119005] audit: type=1326 audit(1689201445.333:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597723.766240] audit: type=1326 audit(1689201470.981:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494635 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597725.580971] audit: type=1326 audit(1689201472.797:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=487339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597778.424545] audit: type=1326 audit(1689201525.641:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497122 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597782.912946] audit: type=1326 audit(1689201530.129:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597839.779249] audit: type=1326 audit(1689201586.993:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=500302 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597924.949065] audit: type=1326 audit(1689201672.165:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597927.023142] audit: type=1326 audit(1689201674.237:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597928.907409] audit: type=1326 audit(1689201676.121:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=484211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597933.552953] audit: type=1326 audit(1689201680.769:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=510701 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597976.279809] audit: type=1326 audit(1689201723.493:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597982.541467] audit: type=1326 audit(1689201729.757:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=513162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598067.159794] audit: type=1326 audit(1689201814.373:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=518642 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598088.313475] audit: type=1326 audit(1689201835.529:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520919 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598125.471872] audit: type=1326 audit(1689201872.685:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522253 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598131.148243] audit: type=1326 audit(1689201878.365:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598204.492781] audit: type=1326 audit(1689201951.709:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598208.863021] audit: type=1326 audit(1689201956.077:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=526331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598243.575830] audit: type=1326 audit(1689201990.789:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528273 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598268.259679] audit: type=1326 audit(1689202015.473:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528775 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598286.099005] audit: type=1326 audit(1689202033.313:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598350.997125] audit: type=1326 audit(1689202098.213:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531385 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598352.184658] audit: type=1326 audit(1689202099.401:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541070 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598410.602708] audit: type=1326 audit(1689202157.816:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535596 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598458.134205] audit: type=1326 audit(1689202205.352:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=530585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598471.516156] audit: type=1326 audit(1689202218.732:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598480.334947] audit: type=1326 audit(1689202227.552:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531824 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598482.921116] audit: type=1326 audit(1689202230.140:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598493.766116] audit: type=1326 audit(1689202240.984:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=542354 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598537.882169] audit: type=1326 audit(1689202285.100:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552304 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598552.794779] audit: type=1326 audit(1689202300.012:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=545958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598601.517055] audit: type=1326 audit(1689202348.736:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=550148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598636.422226] audit: type=1326 audit(1689202383.640:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598696.930725] audit: type=1326 audit(1689202444.148:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598699.992536] audit: type=1326 audit(1689202447.208:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555330 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598764.002598] audit: type=1326 audit(1689202511.220:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=558821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598778.707897] audit: type=1326 audit(1689202525.924:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=559751 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598781.495884] audit: type=1326 audit(1689202528.712:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=571608 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598838.336938] audit: type=1326 audit(1689202585.556:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=566812 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598851.686782] audit: type=1326 audit(1689202598.904:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=557043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598921.757010] audit: type=1326 audit(1689202668.976:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=572500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598946.863553] audit: type=1326 audit(1689202694.080:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574758 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598979.367746] audit: type=1326 audit(1689202726.584:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=575821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599001.943831] audit: type=1326 audit(1689202749.160:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=577673 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599054.749238] audit: type=1326 audit(1689202801.968:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=573675 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599065.610701] audit: type=1326 audit(1689202812.828:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=579525 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599121.528672] audit: type=1326 audit(1689202868.744:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=583090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599156.266882] audit: type=1326 audit(1689202903.483:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599198.828291] audit: type=1326 audit(1689202946.043:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599208.132916] audit: type=1326 audit(1689202955.347:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586082 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599230.502686] audit: type=1326 audit(1689202977.719:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=576573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599296.025793] audit: type=1326 audit(1689203043.243:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=589839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599311.286462] audit: type=1326 audit(1689203058.503:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=590816 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599353.781004] audit: type=1326 audit(1689203100.995:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599357.016179] audit: type=1326 audit(1689203104.231:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599357.503764] audit: type=1326 audit(1689203104.719:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592880 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599379.763425] audit: type=1326 audit(1689203126.979:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599466.065105] audit: type=1326 audit(1689203213.279:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=597822 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599499.137048] audit: type=1326 audit(1689203246.351:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599505.276837] audit: type=1326 audit(1689203252.491:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=595019 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599507.683755] audit: type=1326 audit(1689203254.899:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598796 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599570.540316] audit: type=1326 audit(1689203317.755:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599584.813655] audit: type=1326 audit(1689203332.031:428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602286 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599642.444173] audit: type=1326 audit(1689203389.659:429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=603065 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599671.529067] audit: type=1326 audit(1689203418.743:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=596545 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599691.211475] audit: type=1326 audit(1689203438.427:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605507 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599691.379627] audit: type=1326 audit(1689203438.595:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599727.545269] audit: type=1326 audit(1689203474.759:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.062166] audit: type=1326 audit(1689203509.279:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.086813] audit: type=1326 audit(1689203509.279:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599794.446274] audit: type=1326 audit(1689203541.663:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604351 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599853.075039] audit: type=1326 audit(1689203600.290:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599854.839725] audit: type=1326 audit(1689203602.054:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599869.641444] audit: type=1326 audit(1689203616.854:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612658 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599904.012459] audit: type=1326 audit(1689203651.226:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=613836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600015.137399] audit: type=1326 audit(1689203762.350:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600016.195425] audit: type=1326 audit(1689203763.410:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600047.639331] audit: type=1326 audit(1689203794.854:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=609967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600049.671506] audit: type=1326 audit(1689203796.886:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600093.041099] audit: type=1326 audit(1689203840.254:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620895 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600136.261927] audit: type=1326 audit(1689203883.474:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=621806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600176.566249] audit: type=1326 audit(1689203923.778:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622882 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600177.846245] audit: type=1326 audit(1689203925.062:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622980 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600245.983660] audit: type=1326 audit(1689203993.198:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600255.622819] audit: type=1326 audit(1689204002.838:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627117 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600301.130225] audit: type=1326 audit(1689204048.342:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600313.685675] audit: type=1326 audit(1689204060.898:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600338.550728] audit: type=1326 audit(1689204085.766:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600339.475173] audit: type=1326 audit(1689204086.690:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600346.117313] audit: type=1326 audit(1689204093.330:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=625492 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600389.332439] audit: type=1326 audit(1689204136.546:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633029 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600413.679225] exe[552330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.533366] exe[616525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.845071] exe[553784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd587feee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600444.823774] audit: type=1326 audit(1689204192.038:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=628939 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600454.783559] audit: type=1326 audit(1689204201.998:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600460.297963] audit: type=1326 audit(1689204207.510:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=634120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600501.054928] audit: type=1326 audit(1689204248.270:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600501.459095] audit: type=1326 audit(1689204248.674:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600522.075266] audit: type=1326 audit(1689204269.290:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600532.895480] audit: type=1326 audit(1689204280.110:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=637127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600542.361069] audit: type=1326 audit(1689204289.574:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642337 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600618.878528] audit: type=1326 audit(1689204366.089:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=646857 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600662.564294] audit: type=1326 audit(1689204409.777:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642395 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600712.374259] audit: type=1326 audit(1689204459.585:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=644142 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600758.320683] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.381302] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.435987] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.460840] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600791.517421] audit: type=1326 audit(1689204538.729:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=647911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600796.510774] audit: type=1326 audit(1689204543.721:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=643074 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600821.804316] audit: type=1326 audit(1689204569.017:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600824.112759] audit: type=1326 audit(1689204571.325:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600837.837171] audit: type=1326 audit(1689204585.049:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=650926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600838.202708] audit: type=1326 audit(1689204585.413:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639619 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600862.491741] audit: type=1326 audit(1689204609.705:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=635997 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600952.331157] audit: type=1326 audit(1689204699.545:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=655568 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600984.800020] audit: type=1326 audit(1689204732.013:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=658564 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601000.447556] audit: type=1326 audit(1689204747.661:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659232 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601000.483579] audit: type=1326 audit(1689204747.697:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659242 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601093.169914] audit: type=1326 audit(1689204840.381:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=656730 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601098.482808] audit: type=1326 audit(1689204845.693:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=657512 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601113.225254] audit: type=1326 audit(1689204860.437:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666002 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601141.312313] audit: type=1326 audit(1689204888.525:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666552 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601145.359933] audit: type=1326 audit(1689204892.573:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666990 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601274.291260] audit: type=1326 audit(1689205021.505:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=671926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601306.606072] audit: type=1326 audit(1689205053.816:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601309.957748] audit: type=1326 audit(1689205057.168:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674553 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601341.904200] audit: type=1326 audit(1689205089.120:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=675836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601352.797313] audit: type=1326 audit(1689205100.012:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=670357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601367.443182] audit: type=1326 audit(1689205114.656:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601405.264683] audit: type=1326 audit(1689205152.480:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=678379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601436.248250] audit: type=1326 audit(1689205183.464:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=679261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601467.634913] audit: type=1326 audit(1689205214.848:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=680833 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601505.709842] audit: type=1326 audit(1689205252.924:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681793 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601506.056017] audit: type=1326 audit(1689205253.272:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601511.171917] audit: type=1326 audit(1689205258.388:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682176 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601597.695181] audit: type=1326 audit(1689205344.908:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=685750 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601628.435570] audit: type=1326 audit(1689205375.652:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687165 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601639.279190] audit: type=1326 audit(1689205386.492:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=693456 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601646.751183] audit: type=1326 audit(1689205393.964:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687780 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601648.323195] audit: type=1326 audit(1689205395.536:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601704.970538] audit: type=1326 audit(1689205452.184:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601726.438303] audit: type=1326 audit(1689205473.652:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=696962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601790.231890] audit: type=1326 audit(1689205537.448:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694256 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601870.281316] audit: type=1326 audit(1689205617.496:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692648 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601888.842697] audit: type=1326 audit(1689205636.056:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=698719 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601905.721655] audit: type=1326 audit(1689205652.936:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=699618 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601947.458397] audit: type=1326 audit(1689205694.672:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=700466 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601952.073376] audit: type=1326 audit(1689205699.288:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=701007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601958.768477] audit: type=1326 audit(1689205705.984:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=677034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601988.295493] audit: type=1326 audit(1689205735.508:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692547 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602050.588332] audit: type=1326 audit(1689205797.803:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=706687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602092.633316] audit: type=1326 audit(1689205839.847:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710024 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602109.458983] audit: type=1326 audit(1689205856.671:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.463185] audit: type=1326 audit(1689205857.675:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711039 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.945264] audit: type=1326 audit(1689205858.159:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602113.494614] audit: type=1326 audit(1689205860.707:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602167.835209] audit: type=1326 audit(1689205915.047:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=705931 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602212.164413] audit: type=1326 audit(1689205959.379:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=719035 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602228.614047] audit: type=1326 audit(1689205975.827:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602251.890213] audit: type=1326 audit(1689205999.103:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723451 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602263.451544] audit: type=1326 audit(1689206010.663:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=714805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602274.588673] audit: type=1326 audit(1689206021.803:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=726182 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602370.143134] audit: type=1326 audit(1689206117.355:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602373.347637] audit: type=1326 audit(1689206120.559:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735693 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602393.590611] audit: type=1326 audit(1689206140.803:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=737207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602422.998822] audit: type=1326 audit(1689206170.211:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=728959 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602436.005176] audit: type=1326 audit(1689206183.219:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=739202 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602484.595155] audit: type=1326 audit(1689206231.807:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=722293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602507.546522] audit: type=1326 audit(1689206254.759:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602535.958765] audit: type=1326 audit(1689206283.171:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742213 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602560.451117] audit: type=1326 audit(1689206307.663:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743728 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602579.163230] exe[728877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.244070] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.318329] exe[741075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602597.777330] audit: type=1326 audit(1689206344.991:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=745885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602603.869164] audit: type=1326 audit(1689206351.083:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=754999 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.285215] audit: type=1326 audit(1689206425.499:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=755000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.677713] audit: type=1326 audit(1689206425.891:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602696.843980] audit: type=1326 audit(1689206444.055:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=753602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602743.097537] audit: type=1326 audit(1689206490.311:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602743.122326] audit: type=1326 audit(1689206490.311:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602759.499374] audit: type=1326 audit(1689206506.710:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=760841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602854.344933] audit: type=1326 audit(1689206601.558:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=765622 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602859.040813] audit: type=1326 audit(1689206606.254:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=765875 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602884.867590] audit: type=1326 audit(1689206632.078:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=767807 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602895.802192] audit: type=1326 audit(1689206643.014:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=750390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602921.417882] audit: type=1326 audit(1689206668.630:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=769293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602934.284216] audit: type=1326 audit(1689206681.494:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=763696 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602998.074154] audit: type=1326 audit(1689206745.286:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=771543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603001.490232] audit: type=1326 audit(1689206748.702:547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772848 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603019.886473] exe[728911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603019.961263] exe[723449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.012456] exe[723112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.033883] exe[723112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.390766] audit: type=1326 audit(1689206767.602:548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603082.847524] audit: type=1326 audit(1689206830.058:549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=775665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000