ch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 23:58:56.787860 754374 usertrap_amd64.go:212] [ 595: 595] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:56.787880 754374 usertrap_amd64.go:122] [ 595: 595] Allocate a new trap: 0xc0009b8b10 3 D0712 23:58:56.787886 754374 usertrap_amd64.go:225] [ 595: 595] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 23:58:56.793872 754374 usertrap_amd64.go:212] [ 595: 595] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:56.793954 754374 usertrap_amd64.go:122] [ 595: 595] Allocate a new trap: 0xc0009b8b10 4 D0712 23:58:56.793972 754374 usertrap_amd64.go:225] [ 595: 595] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 23:58:56.795120 754374 usertrap_amd64.go:212] [ 595: 595] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:56.795140 754374 usertrap_amd64.go:122] [ 595: 595] Allocate a new trap: 0xc0009b8b10 5 D0712 23:58:56.795152 754374 usertrap_amd64.go:225] [ 595: 595] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 23:58:56.795219 754374 usertrap_amd64.go:212] [ 595: 595] Found the pattern at ip 46b214:sysno 13 D0712 23:58:56.795230 754374 usertrap_amd64.go:122] [ 595: 595] Allocate a new trap: 0xc0009b8b10 6 D0712 23:58:56.795238 754374 usertrap_amd64.go:225] [ 595: 595] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 23:58:56.795528 754374 usertrap_amd64.go:212] [ 595: 595] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:56.795546 754374 usertrap_amd64.go:122] [ 595: 595] Allocate a new trap: 0xc0009b8b10 7 D0712 23:58:56.795553 754374 usertrap_amd64.go:225] [ 595: 595] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 23:58:56.795675 754374 usertrap_amd64.go:212] [ 595: 596] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:56.795717 754374 usertrap_amd64.go:122] [ 595: 596] Allocate a new trap: 0xc0009b8b10 8 D0712 23:58:56.795728 754374 usertrap_amd64.go:225] [ 595: 596] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 23:58:56.796020 754374 usertrap_amd64.go:212] [ 595: 596] Found the pattern at ip 46af76:sysno 35 D0712 23:58:56.796043 754374 usertrap_amd64.go:122] [ 595: 596] Allocate a new trap: 0xc0009b8b10 9 D0712 23:58:56.796056 754374 usertrap_amd64.go:225] [ 595: 596] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 23:58:56.796091 754374 usertrap_amd64.go:212] [ 595: 595] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:56.796099 754374 usertrap_amd64.go:122] [ 595: 595] Allocate a new trap: 0xc0009b8b10 10 D0712 23:58:56.796106 754374 usertrap_amd64.go:225] [ 595: 595] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 23:58:56.803577 754374 usertrap_amd64.go:212] [ 595: 595] Found the pattern at ip 46af29:sysno 293 D0712 23:58:56.803600 754374 usertrap_amd64.go:122] [ 595: 595] Allocate a new trap: 0xc0009b8b10 11 D0712 23:58:56.803609 754374 usertrap_amd64.go:225] [ 595: 595] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 23:58:56.806636 754374 usertrap_amd64.go:212] [ 595: 596] Found the pattern at ip 46b020:sysno 39 D0712 23:58:56.806663 754374 usertrap_amd64.go:122] [ 595: 596] Allocate a new trap: 0xc0009b8b10 12 D0712 23:58:56.806677 754374 usertrap_amd64.go:225] [ 595: 596] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 23:58:56.807428 754374 usertrap_amd64.go:212] [ 595: 596] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:56.807453 754374 usertrap_amd64.go:122] [ 595: 596] Allocate a new trap: 0xc0009b8b10 13 D0712 23:58:56.807468 754374 usertrap_amd64.go:225] [ 595: 596] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 23:58:56.807493 754374 task_signals.go:470] [ 595: 595] Notified of signal 23 D0712 23:58:56.807537 754374 task_signals.go:220] [ 595: 595] Signal 23: delivering to handler D0712 23:58:56.813142 754374 usertrap_amd64.go:212] [ 595: 595] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:56.813191 754374 usertrap_amd64.go:122] [ 595: 595] Allocate a new trap: 0xc0009b8b10 14 D0712 23:58:56.813204 754374 usertrap_amd64.go:225] [ 595: 595] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 23:58:56.813247 754374 task_exit.go:204] [ 595: 595] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.813273 754374 task_exit.go:204] [ 595: 595] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.813276 754374 task_signals.go:204] [ 595: 596] Signal 595, PID: 596, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.813296 754374 task_signals.go:204] [ 595: 598] Signal 595, PID: 598, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.813307 754374 task_signals.go:204] [ 595: 600] Signal 595, PID: 600, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.813319 754374 task_exit.go:204] [ 595: 596] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.813344 754374 task_signals.go:204] [ 595: 597] Signal 595, PID: 597, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.813372 754374 task_exit.go:204] [ 595: 596] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.813294 754374 task_signals.go:204] [ 595: 599] Signal 595, PID: 599, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.813380 754374 task_exit.go:204] [ 595: 596] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.813399 754374 task_exit.go:204] [ 595: 599] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.813409 754374 task_exit.go:204] [ 595: 599] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.813413 754374 task_exit.go:204] [ 595: 599] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.813423 754374 task_exit.go:204] [ 595: 598] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.813443 754374 task_exit.go:204] [ 595: 598] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.813447 754374 task_exit.go:204] [ 595: 598] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.813455 754374 task_exit.go:204] [ 595: 600] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.813461 754374 task_exit.go:204] [ 595: 600] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.813466 754374 task_exit.go:204] [ 595: 600] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.813508 754374 task_exit.go:204] [ 595: 597] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.814796 754374 task_exit.go:204] [ 595: 597] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.814833 754374 task_exit.go:204] [ 595: 597] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.814849 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:56.814913 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:56.814935 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:56.815105 754374 task_exit.go:204] [ 595: 595] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.817525 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.819029 754374 syscalls.go:262] [ 601: 601] Allocating stack with size of 8388608 bytes D0712 23:58:56.819212 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.820106 754374 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:56.820157 754374 usertrap_amd64.go:106] [ 601: 601] Map a usertrap vma at 63000 D0712 23:58:56.820266 754374 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc0006e1650 1 D0712 23:58:56.820294 754374 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:58:56.821008 754374 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:56.821044 754374 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc0006e1650 2 D0712 23:58:56.821056 754374 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:58:56.821582 754374 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:56.821608 754374 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc0006e1650 3 D0712 23:58:56.821627 754374 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:58:56.827200 754374 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:56.827228 754374 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc0006e1650 4 D0712 23:58:56.827241 754374 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:58:56.828332 754374 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:56.828368 754374 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc0006e1650 5 D0712 23:58:56.828382 754374 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:58:56.828439 754374 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46b214:sysno 13 D0712 23:58:56.828467 754374 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc0006e1650 6 D0712 23:58:56.828477 754374 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:58:56.829114 754374 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:56.829138 754374 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc0006e1650 7 D0712 23:58:56.829161 754374 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:58:56.829332 754374 usertrap_amd64.go:212] [ 601: 602] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:56.829371 754374 usertrap_amd64.go:122] [ 601: 602] Allocate a new trap: 0xc0006e1650 8 D0712 23:58:56.829378 754374 usertrap_amd64.go:225] [ 601: 602] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:58:56.829662 754374 usertrap_amd64.go:212] [ 601: 602] Found the pattern at ip 46af76:sysno 35 D0712 23:58:56.829691 754374 usertrap_amd64.go:122] [ 601: 602] Allocate a new trap: 0xc0006e1650 9 D0712 23:58:56.829703 754374 usertrap_amd64.go:225] [ 601: 602] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:58:56.829715 754374 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:56.829722 754374 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc0006e1650 10 D0712 23:58:56.829731 754374 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:58:56.836928 754374 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46af29:sysno 293 D0712 23:58:56.836989 754374 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc0006e1650 11 D0712 23:58:56.836998 754374 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:58:56.840399 754374 usertrap_amd64.go:212] [ 601: 602] Found the pattern at ip 46b020:sysno 39 D0712 23:58:56.840429 754374 usertrap_amd64.go:122] [ 601: 602] Allocate a new trap: 0xc0006e1650 12 D0712 23:58:56.840443 754374 usertrap_amd64.go:225] [ 601: 602] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:58:56.840517 754374 usertrap_amd64.go:212] [ 601: 602] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:56.840556 754374 usertrap_amd64.go:122] [ 601: 602] Allocate a new trap: 0xc0006e1650 13 D0712 23:58:56.840569 754374 usertrap_amd64.go:225] [ 601: 602] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:58:56.840645 754374 task_signals.go:470] [ 601: 601] Notified of signal 23 D0712 23:58:56.840727 754374 task_signals.go:220] [ 601: 601] Signal 23: delivering to handler I0712 23:58:56.847171 754374 compat.go:120] Unsupported syscall ioperm(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioperm for more information. D0712 23:58:56.847251 754374 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:56.847264 754374 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc0006e1650 14 D0712 23:58:56.847271 754374 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:58:56.847325 754374 task_exit.go:204] [ 601: 601] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.847358 754374 task_exit.go:204] [ 601: 601] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.847359 754374 task_signals.go:204] [ 601: 603] Signal 601, PID: 603, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.847379 754374 task_exit.go:204] [ 601: 603] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.847378 754374 task_signals.go:204] [ 601: 604] Signal 601, PID: 604, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.847376 754374 task_signals.go:204] [ 601: 602] Signal 601, PID: 602, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.847389 754374 task_exit.go:204] [ 601: 603] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.847396 754374 task_exit.go:204] [ 601: 603] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.847416 754374 task_signals.go:204] [ 601: 606] Signal 601, PID: 606, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.847436 754374 task_exit.go:204] [ 601: 606] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.847479 754374 task_signals.go:204] [ 601: 605] Signal 601, PID: 605, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.847491 754374 task_exit.go:204] [ 601: 606] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.847496 754374 task_exit.go:204] [ 601: 606] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.847506 754374 task_exit.go:204] [ 601: 604] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.847520 754374 task_exit.go:204] [ 601: 604] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.847523 754374 task_exit.go:204] [ 601: 604] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.847530 754374 task_exit.go:204] [ 601: 602] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.847536 754374 task_exit.go:204] [ 601: 602] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.847564 754374 task_exit.go:204] [ 601: 602] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.847570 754374 task_exit.go:204] [ 601: 605] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.848638 754374 task_exit.go:204] [ 601: 605] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.848669 754374 task_exit.go:204] [ 601: 605] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.848682 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:56.848734 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:56.848760 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:56.848846 754374 task_exit.go:204] [ 601: 601] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.849434 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.850825 754374 syscalls.go:262] [ 607: 607] Allocating stack with size of 8388608 bytes D0712 23:58:56.851148 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.852528 754374 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:56.852567 754374 usertrap_amd64.go:106] [ 607: 607] Map a usertrap vma at 68000 D0712 23:58:56.852678 754374 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc0009bfa10 1 D0712 23:58:56.852708 754374 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 23:58:56.853113 754374 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:56.853135 754374 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc0009bfa10 2 D0712 23:58:56.853142 754374 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 23:58:56.853964 754374 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:56.853997 754374 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc0009bfa10 3 D0712 23:58:56.854009 754374 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 23:58:56.860385 754374 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:56.860414 754374 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc0009bfa10 4 D0712 23:58:56.860424 754374 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 23:58:56.861482 754374 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:56.861517 754374 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc0009bfa10 5 D0712 23:58:56.861527 754374 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 23:58:56.861576 754374 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b214:sysno 13 D0712 23:58:56.861596 754374 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc0009bfa10 6 D0712 23:58:56.861604 754374 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 23:58:56.861949 754374 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:56.861970 754374 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc0009bfa10 7 D0712 23:58:56.861976 754374 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 23:58:56.862095 754374 usertrap_amd64.go:212] [ 607: 608] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:56.862113 754374 usertrap_amd64.go:122] [ 607: 608] Allocate a new trap: 0xc0009bfa10 8 D0712 23:58:56.862119 754374 usertrap_amd64.go:225] [ 607: 608] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 23:58:56.862280 754374 usertrap_amd64.go:212] [ 607: 608] Found the pattern at ip 46af76:sysno 35 D0712 23:58:56.862327 754374 usertrap_amd64.go:122] [ 607: 608] Allocate a new trap: 0xc0009bfa10 9 D0712 23:58:56.862340 754374 usertrap_amd64.go:225] [ 607: 608] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 23:58:56.862526 754374 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:56.862550 754374 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc0009bfa10 10 D0712 23:58:56.862558 754374 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 23:58:56.870597 754374 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46af29:sysno 293 D0712 23:58:56.870630 754374 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc0009bfa10 11 D0712 23:58:56.870642 754374 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 23:58:56.873109 754374 usertrap_amd64.go:212] [ 607: 608] Found the pattern at ip 46b020:sysno 39 D0712 23:58:56.873133 754374 usertrap_amd64.go:122] [ 607: 608] Allocate a new trap: 0xc0009bfa10 12 D0712 23:58:56.873148 754374 usertrap_amd64.go:225] [ 607: 608] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 23:58:56.873187 754374 usertrap_amd64.go:212] [ 607: 608] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:56.873206 754374 usertrap_amd64.go:122] [ 607: 608] Allocate a new trap: 0xc0009bfa10 13 D0712 23:58:56.873215 754374 usertrap_amd64.go:225] [ 607: 608] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 23:58:56.873263 754374 task_signals.go:470] [ 607: 607] Notified of signal 23 D0712 23:58:56.873343 754374 task_signals.go:220] [ 607: 607] Signal 23: delivering to handler I0712 23:58:56.880404 754374 compat.go:120] Unsupported syscall iopl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/iopl for more information. D0712 23:58:56.880493 754374 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:56.880507 754374 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc0009bfa10 14 D0712 23:58:56.880520 754374 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 23:58:56.880597 754374 task_exit.go:204] [ 607: 607] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.880650 754374 task_exit.go:204] [ 607: 607] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.880670 754374 task_signals.go:204] [ 607: 611] Signal 607, PID: 611, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.880687 754374 task_exit.go:204] [ 607: 611] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.880694 754374 task_signals.go:204] [ 607: 609] Signal 607, PID: 609, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.880717 754374 task_signals.go:204] [ 607: 610] Signal 607, PID: 610, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.880724 754374 task_signals.go:204] [ 607: 608] Signal 607, PID: 608, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.880730 754374 task_exit.go:204] [ 607: 608] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.880735 754374 task_exit.go:204] [ 607: 608] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.880739 754374 task_exit.go:204] [ 607: 608] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.880750 754374 task_exit.go:204] [ 607: 609] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.880781 754374 task_exit.go:204] [ 607: 609] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.880788 754374 task_exit.go:204] [ 607: 609] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.880799 754374 task_exit.go:204] [ 607: 610] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.880973 754374 task_exit.go:204] [ 607: 611] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.881017 754374 task_exit.go:204] [ 607: 611] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.881892 754374 task_exit.go:204] [ 607: 610] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.881923 754374 task_exit.go:204] [ 607: 610] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.881934 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:56.881979 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:56.882033 754374 task_exit.go:204] [ 607: 607] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.882781 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.884282 754374 syscalls.go:262] [ 612: 612] Allocating stack with size of 8388608 bytes D0712 23:58:56.884470 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.885362 754374 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:56.885441 754374 usertrap_amd64.go:106] [ 612: 612] Map a usertrap vma at 62000 D0712 23:58:56.885511 754374 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc00149e900 1 D0712 23:58:56.885533 754374 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:58:56.885808 754374 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:56.885831 754374 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc00149e900 2 D0712 23:58:56.885847 754374 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:58:56.887134 754374 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:56.887164 754374 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc00149e900 3 D0712 23:58:56.887171 754374 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:58:56.893281 754374 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:56.893315 754374 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc00149e900 4 D0712 23:58:56.893325 754374 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:58:56.894323 754374 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:56.894343 754374 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc00149e900 5 D0712 23:58:56.894350 754374 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:58:56.894374 754374 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b214:sysno 13 D0712 23:58:56.894379 754374 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc00149e900 6 D0712 23:58:56.894383 754374 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:58:56.894635 754374 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:56.894650 754374 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc00149e900 7 D0712 23:58:56.894655 754374 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:58:56.894771 754374 usertrap_amd64.go:212] [ 612: 613] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:56.894809 754374 usertrap_amd64.go:122] [ 612: 613] Allocate a new trap: 0xc00149e900 8 D0712 23:58:56.894842 754374 usertrap_amd64.go:225] [ 612: 613] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:58:56.895059 754374 usertrap_amd64.go:212] [ 612: 613] Found the pattern at ip 46af76:sysno 35 D0712 23:58:56.895087 754374 usertrap_amd64.go:122] [ 612: 613] Allocate a new trap: 0xc00149e900 9 D0712 23:58:56.895100 754374 usertrap_amd64.go:225] [ 612: 613] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:58:56.895201 754374 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:56.895230 754374 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc00149e900 10 D0712 23:58:56.895269 754374 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:58:56.906722 754374 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46af29:sysno 293 D0712 23:58:56.906752 754374 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc00149e900 11 D0712 23:58:56.906763 754374 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:58:56.909093 754374 usertrap_amd64.go:212] [ 612: 613] Found the pattern at ip 46b020:sysno 39 D0712 23:58:56.909127 754374 usertrap_amd64.go:122] [ 612: 613] Allocate a new trap: 0xc00149e900 12 D0712 23:58:56.909143 754374 usertrap_amd64.go:225] [ 612: 613] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:58:56.909223 754374 usertrap_amd64.go:212] [ 612: 613] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:56.909231 754374 usertrap_amd64.go:122] [ 612: 613] Allocate a new trap: 0xc00149e900 13 D0712 23:58:56.909237 754374 usertrap_amd64.go:225] [ 612: 613] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:58:56.909259 754374 task_signals.go:470] [ 612: 612] Notified of signal 23 D0712 23:58:56.909370 754374 task_signals.go:220] [ 612: 612] Signal 23: delivering to handler I0712 23:58:56.919546 754374 compat.go:120] Unsupported syscall ioprio_get(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_get for more information. D0712 23:58:56.919693 754374 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:56.919718 754374 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc00149e900 14 D0712 23:58:56.919763 754374 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:58:56.919855 754374 task_exit.go:204] [ 612: 612] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.919898 754374 task_exit.go:204] [ 612: 612] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.919940 754374 task_signals.go:204] [ 612: 615] Signal 612, PID: 615, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.919962 754374 task_exit.go:204] [ 612: 615] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.919975 754374 task_signals.go:204] [ 612: 617] Signal 612, PID: 617, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.920016 754374 task_signals.go:204] [ 612: 614] Signal 612, PID: 614, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.919939 754374 task_signals.go:204] [ 612: 616] Signal 612, PID: 616, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.920032 754374 task_exit.go:204] [ 612: 615] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.920058 754374 task_exit.go:204] [ 612: 615] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.920159 754374 task_signals.go:204] [ 612: 613] Signal 612, PID: 613, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.920168 754374 task_exit.go:204] [ 612: 617] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.920201 754374 task_exit.go:204] [ 612: 617] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.920226 754374 task_exit.go:204] [ 612: 617] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.920249 754374 task_exit.go:204] [ 612: 613] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.920269 754374 task_exit.go:204] [ 612: 613] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.920275 754374 task_exit.go:204] [ 612: 613] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.920289 754374 task_exit.go:204] [ 612: 616] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.920299 754374 task_exit.go:204] [ 612: 616] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.920304 754374 task_exit.go:204] [ 612: 616] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.920317 754374 task_exit.go:204] [ 612: 614] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.921742 754374 task_exit.go:204] [ 612: 614] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.921779 754374 task_exit.go:204] [ 612: 614] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.921792 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:56.921824 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:58:56.921832 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:56.922006 754374 task_exit.go:204] [ 612: 612] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.923168 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.925227 754374 syscalls.go:262] [ 618: 618] Allocating stack with size of 8388608 bytes D0712 23:58:56.925479 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.927233 754374 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:56.927338 754374 usertrap_amd64.go:106] [ 618: 618] Map a usertrap vma at 6a000 D0712 23:58:56.927514 754374 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc001362060 1 D0712 23:58:56.927597 754374 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 23:58:56.928150 754374 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:56.928184 754374 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc001362060 2 D0712 23:58:56.928202 754374 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 23:58:56.929123 754374 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:56.929160 754374 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc001362060 3 D0712 23:58:56.929174 754374 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 23:58:56.937816 754374 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:56.937872 754374 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc001362060 4 D0712 23:58:56.937890 754374 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 23:58:56.939146 754374 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:56.939202 754374 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc001362060 5 D0712 23:58:56.939218 754374 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 23:58:56.939271 754374 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46b214:sysno 13 D0712 23:58:56.939280 754374 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc001362060 6 D0712 23:58:56.939288 754374 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 23:58:56.939498 754374 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:56.939511 754374 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc001362060 7 D0712 23:58:56.939519 754374 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 23:58:56.939707 754374 usertrap_amd64.go:212] [ 618: 619] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:56.939773 754374 usertrap_amd64.go:122] [ 618: 619] Allocate a new trap: 0xc001362060 8 D0712 23:58:56.939798 754374 usertrap_amd64.go:225] [ 618: 619] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 23:58:56.939970 754374 usertrap_amd64.go:212] [ 618: 619] Found the pattern at ip 46af76:sysno 35 D0712 23:58:56.939999 754374 usertrap_amd64.go:122] [ 618: 619] Allocate a new trap: 0xc001362060 9 D0712 23:58:56.940014 754374 usertrap_amd64.go:225] [ 618: 619] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 23:58:56.940199 754374 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:56.940226 754374 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc001362060 10 D0712 23:58:56.940242 754374 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 23:58:56.940333 754374 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:56.940383 754374 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc001362060 11 D0712 23:58:56.940413 754374 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46b6e0 trap addr 6a370 ([184 24 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 23:58:56.951180 754374 usertrap_amd64.go:212] [ 618: 619] Found the pattern at ip 46b020:sysno 39 D0712 23:58:56.951222 754374 usertrap_amd64.go:122] [ 618: 619] Allocate a new trap: 0xc001362060 12 D0712 23:58:56.951238 754374 usertrap_amd64.go:225] [ 618: 619] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 23:58:56.951302 754374 usertrap_amd64.go:212] [ 618: 619] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:56.951333 754374 usertrap_amd64.go:122] [ 618: 619] Allocate a new trap: 0xc001362060 13 D0712 23:58:56.951371 754374 usertrap_amd64.go:225] [ 618: 619] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 23:58:56.951444 754374 task_signals.go:470] [ 618: 618] Notified of signal 23 D0712 23:58:56.951569 754374 task_signals.go:220] [ 618: 618] Signal 23: delivering to handler D0712 23:58:56.953632 754374 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46af29:sysno 293 D0712 23:58:56.953666 754374 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc001362060 14 D0712 23:58:56.953680 754374 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46af29 trap addr 6a460 ([184 37 1 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 23:58:56.962184 754374 task_signals.go:470] [ 618: 618] Notified of signal 23 D0712 23:58:56.962282 754374 task_signals.go:220] [ 618: 618] Signal 23: delivering to handler I0712 23:58:56.965220 754374 compat.go:120] Unsupported syscall ioprio_set(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_set for more information. D0712 23:58:56.965367 754374 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:56.965396 754374 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc001362060 15 D0712 23:58:56.965412 754374 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0712 23:58:56.965496 754374 task_exit.go:204] [ 618: 618] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.965522 754374 task_exit.go:204] [ 618: 618] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.965550 754374 task_signals.go:204] [ 618: 621] Signal 618, PID: 621, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.965565 754374 task_exit.go:204] [ 618: 621] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.965552 754374 task_signals.go:204] [ 618: 620] Signal 618, PID: 620, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.965572 754374 task_exit.go:204] [ 618: 621] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.965588 754374 task_exit.go:204] [ 618: 621] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.965620 754374 task_signals.go:204] [ 618: 619] Signal 618, PID: 619, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.965659 754374 task_exit.go:204] [ 618: 620] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.965669 754374 task_exit.go:204] [ 618: 620] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.965663 754374 task_signals.go:204] [ 618: 622] Signal 618, PID: 622, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:56.965673 754374 task_exit.go:204] [ 618: 620] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.965709 754374 task_exit.go:204] [ 618: 619] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.965716 754374 task_exit.go:204] [ 618: 619] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.965723 754374 task_exit.go:204] [ 618: 619] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.965736 754374 task_exit.go:204] [ 618: 622] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:56.967071 754374 task_exit.go:204] [ 618: 622] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:56.967125 754374 task_exit.go:204] [ 618: 622] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.967154 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:56.967198 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:56.967225 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:56.967353 754374 task_exit.go:204] [ 618: 618] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:56.967539 754374 task_signals.go:470] [ 5: 25] Notified of signal 23 D0712 23:58:56.967650 754374 task_signals.go:220] [ 5: 25] Signal 23: delivering to handler D0712 23:58:56.968085 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.969695 754374 syscalls.go:262] [ 623: 623] Allocating stack with size of 8388608 bytes D0712 23:58:56.969857 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:56.971392 754374 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:56.971438 754374 usertrap_amd64.go:106] [ 623: 623] Map a usertrap vma at 67000 D0712 23:58:56.971518 754374 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc00149e4e0 1 D0712 23:58:56.971543 754374 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 23:58:56.971946 754374 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:56.971972 754374 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc00149e4e0 2 D0712 23:58:56.971982 754374 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 23:58:56.972496 754374 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:56.972524 754374 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc00149e4e0 3 D0712 23:58:56.972536 754374 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 23:58:56.978498 754374 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:56.978531 754374 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc00149e4e0 4 D0712 23:58:56.978543 754374 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 23:58:56.979586 754374 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:56.979605 754374 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc00149e4e0 5 D0712 23:58:56.979612 754374 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 23:58:56.979624 754374 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b214:sysno 13 D0712 23:58:56.979639 754374 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc00149e4e0 6 D0712 23:58:56.979648 754374 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 23:58:56.980075 754374 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:56.980139 754374 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc00149e4e0 7 D0712 23:58:56.980160 754374 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 23:58:56.980387 754374 usertrap_amd64.go:212] [ 623: 624] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:56.980420 754374 usertrap_amd64.go:122] [ 623: 624] Allocate a new trap: 0xc00149e4e0 8 D0712 23:58:56.980434 754374 usertrap_amd64.go:225] [ 623: 624] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 23:58:56.980723 754374 usertrap_amd64.go:212] [ 623: 624] Found the pattern at ip 46af76:sysno 35 D0712 23:58:56.980760 754374 usertrap_amd64.go:122] [ 623: 624] Allocate a new trap: 0xc00149e4e0 9 D0712 23:58:56.980773 754374 usertrap_amd64.go:225] [ 623: 624] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 23:58:56.980787 754374 usertrap_amd64.go:212] [ 623: 626] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:56.980802 754374 usertrap_amd64.go:122] [ 623: 626] Allocate a new trap: 0xc00149e4e0 10 D0712 23:58:56.980814 754374 usertrap_amd64.go:225] [ 623: 626] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 23:58:56.989017 754374 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46af29:sysno 293 D0712 23:58:56.989053 754374 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc00149e4e0 11 D0712 23:58:56.989066 754374 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 23:58:56.991538 754374 usertrap_amd64.go:212] [ 623: 624] Found the pattern at ip 46b020:sysno 39 D0712 23:58:56.991593 754374 usertrap_amd64.go:122] [ 623: 624] Allocate a new trap: 0xc00149e4e0 12 D0712 23:58:56.991606 754374 usertrap_amd64.go:225] [ 623: 624] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 23:58:56.991689 754374 usertrap_amd64.go:212] [ 623: 624] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:56.991753 754374 usertrap_amd64.go:122] [ 623: 624] Allocate a new trap: 0xc00149e4e0 13 D0712 23:58:56.991773 754374 usertrap_amd64.go:225] [ 623: 624] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 23:58:56.991848 754374 task_signals.go:470] [ 623: 623] Notified of signal 23 D0712 23:58:56.991951 754374 task_signals.go:220] [ 623: 623] Signal 23: delivering to handler I0712 23:58:56.999816 754374 compat.go:120] Unsupported syscall kcmp(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kcmp for more information. D0712 23:58:56.999945 754374 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:56.999970 754374 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc00149e4e0 14 D0712 23:58:56.999979 754374 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 23:58:57.000041 754374 task_exit.go:204] [ 623: 623] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.000067 754374 task_exit.go:204] [ 623: 623] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.000089 754374 task_signals.go:204] [ 623: 624] Signal 623, PID: 624, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.000113 754374 task_exit.go:204] [ 623: 624] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.000120 754374 task_exit.go:204] [ 623: 624] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.000124 754374 task_exit.go:204] [ 623: 624] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.000138 754374 task_signals.go:204] [ 623: 625] Signal 623, PID: 625, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.000157 754374 task_exit.go:204] [ 623: 625] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.000162 754374 task_exit.go:204] [ 623: 625] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.000166 754374 task_exit.go:204] [ 623: 625] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.000177 754374 task_signals.go:204] [ 623: 626] Signal 623, PID: 626, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.000185 754374 task_exit.go:204] [ 623: 626] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.000190 754374 task_exit.go:204] [ 623: 626] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.000193 754374 task_exit.go:204] [ 623: 626] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.000206 754374 task_signals.go:204] [ 623: 627] Signal 623, PID: 627, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.000213 754374 task_exit.go:204] [ 623: 627] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.001405 754374 task_exit.go:204] [ 623: 627] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.001426 754374 task_exit.go:204] [ 623: 627] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.001450 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.001482 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.001499 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.001648 754374 task_exit.go:204] [ 623: 623] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.002083 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.003462 754374 syscalls.go:262] [ 628: 628] Allocating stack with size of 8388608 bytes D0712 23:58:57.003661 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.006637 754374 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.006701 754374 usertrap_amd64.go:106] [ 628: 628] Map a usertrap vma at 65000 D0712 23:58:57.006802 754374 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc0009b86f0 1 D0712 23:58:57.006846 754374 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 23:58:57.007716 754374 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.007756 754374 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc0009b86f0 2 D0712 23:58:57.007772 754374 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 23:58:57.008619 754374 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.008648 754374 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc0009b86f0 3 D0712 23:58:57.008664 754374 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 23:58:57.015855 754374 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.015889 754374 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc0009b86f0 4 D0712 23:58:57.015906 754374 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 23:58:57.017192 754374 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.017226 754374 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc0009b86f0 5 D0712 23:58:57.017239 754374 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 23:58:57.017316 754374 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.017334 754374 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc0009b86f0 6 D0712 23:58:57.017344 754374 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 23:58:57.017864 754374 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.017874 754374 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc0009b86f0 7 D0712 23:58:57.017880 754374 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 23:58:57.018220 754374 usertrap_amd64.go:212] [ 628: 629] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.018241 754374 usertrap_amd64.go:122] [ 628: 629] Allocate a new trap: 0xc0009b86f0 8 D0712 23:58:57.018250 754374 usertrap_amd64.go:225] [ 628: 629] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 23:58:57.018508 754374 usertrap_amd64.go:212] [ 628: 629] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.018577 754374 usertrap_amd64.go:122] [ 628: 629] Allocate a new trap: 0xc0009b86f0 9 D0712 23:58:57.018597 754374 usertrap_amd64.go:225] [ 628: 629] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 23:58:57.018615 754374 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.018619 754374 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc0009b86f0 10 D0712 23:58:57.018626 754374 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 23:58:57.027780 754374 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.027815 754374 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc0009b86f0 11 D0712 23:58:57.027826 754374 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 23:58:57.030252 754374 usertrap_amd64.go:212] [ 628: 629] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.030327 754374 usertrap_amd64.go:122] [ 628: 629] Allocate a new trap: 0xc0009b86f0 12 D0712 23:58:57.030348 754374 usertrap_amd64.go:225] [ 628: 629] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 23:58:57.030411 754374 usertrap_amd64.go:212] [ 628: 629] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.030434 754374 usertrap_amd64.go:122] [ 628: 629] Allocate a new trap: 0xc0009b86f0 13 D0712 23:58:57.030443 754374 usertrap_amd64.go:225] [ 628: 629] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 23:58:57.030531 754374 task_signals.go:470] [ 628: 628] Notified of signal 23 D0712 23:58:57.030681 754374 task_signals.go:220] [ 628: 628] Signal 23: delivering to handler I0712 23:58:57.038496 754374 compat.go:120] Unsupported syscall kexec_load(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kexec_load for more information. D0712 23:58:57.038571 754374 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.038584 754374 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc0009b86f0 14 D0712 23:58:57.038595 754374 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 23:58:57.038629 754374 task_exit.go:204] [ 628: 628] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.038658 754374 task_exit.go:204] [ 628: 628] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.038673 754374 task_signals.go:204] [ 628: 630] Signal 628, PID: 630, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.038686 754374 task_signals.go:204] [ 628: 631] Signal 628, PID: 631, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.038697 754374 task_exit.go:204] [ 628: 630] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.038709 754374 task_exit.go:204] [ 628: 630] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.038708 754374 task_signals.go:204] [ 628: 629] Signal 628, PID: 629, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.038715 754374 task_exit.go:204] [ 628: 630] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.038730 754374 task_signals.go:204] [ 628: 632] Signal 628, PID: 632, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.038737 754374 task_exit.go:204] [ 628: 632] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.038743 754374 task_exit.go:204] [ 628: 632] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.038747 754374 task_exit.go:204] [ 628: 632] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.038753 754374 task_exit.go:204] [ 628: 629] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.038760 754374 task_exit.go:204] [ 628: 629] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.038764 754374 task_exit.go:204] [ 628: 629] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.038771 754374 task_exit.go:204] [ 628: 631] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.040135 754374 task_exit.go:204] [ 628: 631] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.040201 754374 task_exit.go:204] [ 628: 631] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.040225 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.040314 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.040330 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.040509 754374 task_exit.go:204] [ 628: 628] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.041434 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.043055 754374 syscalls.go:262] [ 633: 633] Allocating stack with size of 8388608 bytes D0712 23:58:57.043243 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.044137 754374 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.044191 754374 usertrap_amd64.go:106] [ 633: 633] Map a usertrap vma at 60000 D0712 23:58:57.044282 754374 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc0009bec00 1 D0712 23:58:57.044361 754374 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:58:57.044817 754374 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.044862 754374 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc0009bec00 2 D0712 23:58:57.044877 754374 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:58:57.046215 754374 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.046253 754374 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc0009bec00 3 D0712 23:58:57.046267 754374 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:58:57.052379 754374 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.052416 754374 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc0009bec00 4 D0712 23:58:57.052428 754374 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:58:57.053647 754374 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.053672 754374 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc0009bec00 5 D0712 23:58:57.053679 754374 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:58:57.053734 754374 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.053744 754374 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc0009bec00 6 D0712 23:58:57.053751 754374 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:58:57.053961 754374 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.053983 754374 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc0009bec00 7 D0712 23:58:57.053991 754374 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:58:57.054173 754374 usertrap_amd64.go:212] [ 633: 634] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.054216 754374 usertrap_amd64.go:122] [ 633: 634] Allocate a new trap: 0xc0009bec00 8 D0712 23:58:57.054227 754374 usertrap_amd64.go:225] [ 633: 634] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:58:57.054689 754374 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.054743 754374 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc0009bec00 9 D0712 23:58:57.054763 754374 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:58:57.054795 754374 usertrap_amd64.go:212] [ 633: 634] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.054807 754374 usertrap_amd64.go:122] [ 633: 634] Allocate a new trap: 0xc0009bec00 10 D0712 23:58:57.054814 754374 usertrap_amd64.go:225] [ 633: 634] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:58:57.063043 754374 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.063081 754374 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc0009bec00 11 D0712 23:58:57.063099 754374 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:58:57.067192 754374 usertrap_amd64.go:212] [ 633: 634] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.067264 754374 usertrap_amd64.go:122] [ 633: 634] Allocate a new trap: 0xc0009bec00 12 D0712 23:58:57.067289 754374 usertrap_amd64.go:225] [ 633: 634] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:58:57.067364 754374 usertrap_amd64.go:212] [ 633: 634] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.067384 754374 usertrap_amd64.go:122] [ 633: 634] Allocate a new trap: 0xc0009bec00 13 D0712 23:58:57.067403 754374 usertrap_amd64.go:225] [ 633: 634] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:58:57.067493 754374 task_signals.go:470] [ 633: 633] Notified of signal 23 D0712 23:58:57.067538 754374 task_signals.go:220] [ 633: 633] Signal 23: delivering to handler D0712 23:58:57.075030 754374 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.075067 754374 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc0009bec00 14 D0712 23:58:57.075082 754374 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:58:57.075147 754374 task_exit.go:204] [ 633: 633] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.075178 754374 task_exit.go:204] [ 633: 633] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.075202 754374 task_signals.go:204] [ 633: 636] Signal 633, PID: 636, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.075218 754374 task_exit.go:204] [ 633: 636] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.075196 754374 task_signals.go:204] [ 633: 635] Signal 633, PID: 635, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.075227 754374 task_exit.go:204] [ 633: 636] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.075238 754374 task_exit.go:204] [ 633: 636] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.075271 754374 task_signals.go:204] [ 633: 637] Signal 633, PID: 637, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.075310 754374 task_exit.go:204] [ 633: 635] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.075306 754374 task_signals.go:204] [ 633: 634] Signal 633, PID: 634, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.075368 754374 task_exit.go:204] [ 633: 634] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.075434 754374 task_exit.go:204] [ 633: 634] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.075455 754374 task_exit.go:204] [ 633: 634] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.075479 754374 task_exit.go:204] [ 633: 635] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.075527 754374 task_exit.go:204] [ 633: 635] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.075542 754374 task_exit.go:204] [ 633: 637] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.076720 754374 task_exit.go:204] [ 633: 637] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.076764 754374 task_exit.go:204] [ 633: 637] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.076781 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.076818 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.076829 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.076886 754374 task_exit.go:204] [ 633: 633] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.077879 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.079515 754374 syscalls.go:262] [ 638: 638] Allocating stack with size of 8388608 bytes D0712 23:58:57.079699 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.081037 754374 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.081085 754374 usertrap_amd64.go:106] [ 638: 638] Map a usertrap vma at 66000 D0712 23:58:57.081168 754374 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc00149e9f0 1 D0712 23:58:57.081196 754374 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:57.081441 754374 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.081479 754374 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc00149e9f0 2 D0712 23:58:57.081486 754374 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:57.082031 754374 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.082062 754374 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc00149e9f0 3 D0712 23:58:57.082076 754374 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:57.088668 754374 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.088729 754374 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc00149e9f0 4 D0712 23:58:57.088778 754374 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:57.090191 754374 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.090236 754374 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc00149e9f0 5 D0712 23:58:57.090254 754374 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:57.090340 754374 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.090350 754374 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc00149e9f0 6 D0712 23:58:57.090360 754374 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:57.090894 754374 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.090924 754374 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc00149e9f0 7 D0712 23:58:57.090937 754374 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:57.091127 754374 usertrap_amd64.go:212] [ 638: 639] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.091155 754374 usertrap_amd64.go:122] [ 638: 639] Allocate a new trap: 0xc00149e9f0 8 D0712 23:58:57.091167 754374 usertrap_amd64.go:225] [ 638: 639] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:57.091417 754374 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.091451 754374 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc00149e9f0 9 D0712 23:58:57.091462 754374 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:57.091489 754374 usertrap_amd64.go:212] [ 638: 639] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.091497 754374 usertrap_amd64.go:122] [ 638: 639] Allocate a new trap: 0xc00149e9f0 10 D0712 23:58:57.091540 754374 usertrap_amd64.go:225] [ 638: 639] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:57.099455 754374 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.099496 754374 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc00149e9f0 11 D0712 23:58:57.099511 754374 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:57.102444 754374 usertrap_amd64.go:212] [ 638: 639] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.102477 754374 usertrap_amd64.go:122] [ 638: 639] Allocate a new trap: 0xc00149e9f0 12 D0712 23:58:57.102492 754374 usertrap_amd64.go:225] [ 638: 639] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:57.102713 754374 usertrap_amd64.go:212] [ 638: 639] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.102746 754374 usertrap_amd64.go:122] [ 638: 639] Allocate a new trap: 0xc00149e9f0 13 D0712 23:58:57.102771 754374 usertrap_amd64.go:225] [ 638: 639] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:57.102817 754374 task_signals.go:470] [ 638: 638] Notified of signal 23 D0712 23:58:57.102954 754374 task_signals.go:220] [ 638: 638] Signal 23: delivering to handler I0712 23:58:57.111719 754374 compat.go:120] Unsupported syscall sys_445(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_445 for more information. D0712 23:58:57.111863 754374 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.111886 754374 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc00149e9f0 14 D0712 23:58:57.111897 754374 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:57.112025 754374 task_exit.go:204] [ 638: 638] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.112056 754374 task_exit.go:204] [ 638: 638] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.112074 754374 task_signals.go:204] [ 638: 642] Signal 638, PID: 642, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.112083 754374 task_signals.go:204] [ 638: 640] Signal 638, PID: 640, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.112087 754374 task_signals.go:204] [ 638: 641] Signal 638, PID: 641, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.112102 754374 task_exit.go:204] [ 638: 642] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.112130 754374 task_signals.go:204] [ 638: 639] Signal 638, PID: 639, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.112160 754374 task_exit.go:204] [ 638: 642] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.112168 754374 task_exit.go:204] [ 638: 642] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.112182 754374 task_exit.go:204] [ 638: 640] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.112192 754374 task_exit.go:204] [ 638: 640] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.112195 754374 task_exit.go:204] [ 638: 640] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.112204 754374 task_exit.go:204] [ 638: 641] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.112217 754374 task_exit.go:204] [ 638: 641] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.112220 754374 task_exit.go:204] [ 638: 641] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.112250 754374 task_exit.go:204] [ 638: 639] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.113568 754374 task_exit.go:204] [ 638: 639] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.113612 754374 task_exit.go:204] [ 638: 639] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.113636 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.113682 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.113724 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.113844 754374 task_exit.go:204] [ 638: 638] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.114895 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.116540 754374 syscalls.go:262] [ 643: 643] Allocating stack with size of 8388608 bytes D0712 23:58:57.116812 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.117909 754374 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.117955 754374 usertrap_amd64.go:106] [ 643: 643] Map a usertrap vma at 66000 D0712 23:58:57.118052 754374 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001724690 1 D0712 23:58:57.118088 754374 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:57.118637 754374 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.118667 754374 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001724690 2 D0712 23:58:57.118680 754374 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:57.119326 754374 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.119350 754374 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001724690 3 D0712 23:58:57.119360 754374 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:57.125344 754374 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.125379 754374 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001724690 4 D0712 23:58:57.125398 754374 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:57.126424 754374 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.126450 754374 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001724690 5 D0712 23:58:57.126460 754374 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:57.126506 754374 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.126526 754374 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001724690 6 D0712 23:58:57.126531 754374 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:57.126686 754374 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.126711 754374 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001724690 7 D0712 23:58:57.126717 754374 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:57.127053 754374 usertrap_amd64.go:212] [ 643: 644] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.127079 754374 usertrap_amd64.go:122] [ 643: 644] Allocate a new trap: 0xc001724690 8 D0712 23:58:57.127091 754374 usertrap_amd64.go:225] [ 643: 644] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:57.127228 754374 usertrap_amd64.go:212] [ 643: 644] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.127268 754374 usertrap_amd64.go:122] [ 643: 644] Allocate a new trap: 0xc001724690 9 D0712 23:58:57.127280 754374 usertrap_amd64.go:225] [ 643: 644] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:57.127293 754374 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.127300 754374 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001724690 10 D0712 23:58:57.127342 754374 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:57.134630 754374 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.134654 754374 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001724690 11 D0712 23:58:57.134662 754374 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:57.137629 754374 usertrap_amd64.go:212] [ 643: 644] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.137663 754374 usertrap_amd64.go:122] [ 643: 644] Allocate a new trap: 0xc001724690 12 D0712 23:58:57.137678 754374 usertrap_amd64.go:225] [ 643: 644] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:57.137709 754374 usertrap_amd64.go:212] [ 643: 644] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.137717 754374 usertrap_amd64.go:122] [ 643: 644] Allocate a new trap: 0xc001724690 13 D0712 23:58:57.137726 754374 usertrap_amd64.go:225] [ 643: 644] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:57.137761 754374 task_signals.go:470] [ 643: 643] Notified of signal 23 D0712 23:58:57.137809 754374 task_signals.go:220] [ 643: 643] Signal 23: delivering to handler I0712 23:58:57.144465 754374 compat.go:120] Unsupported syscall sys_444(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_444 for more information. D0712 23:58:57.144549 754374 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.144560 754374 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001724690 14 D0712 23:58:57.144574 754374 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:57.144652 754374 task_exit.go:204] [ 643: 643] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.144674 754374 task_exit.go:204] [ 643: 643] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.144698 754374 task_signals.go:204] [ 643: 646] Signal 643, PID: 646, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.144715 754374 task_exit.go:204] [ 643: 646] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.144733 754374 task_exit.go:204] [ 643: 646] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.144740 754374 task_exit.go:204] [ 643: 646] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.144720 754374 task_signals.go:204] [ 643: 645] Signal 643, PID: 645, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.144756 754374 task_signals.go:204] [ 643: 644] Signal 643, PID: 644, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.144772 754374 task_exit.go:204] [ 643: 645] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.144880 754374 task_signals.go:204] [ 643: 647] Signal 643, PID: 647, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.144911 754374 task_exit.go:204] [ 643: 645] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.144920 754374 task_exit.go:204] [ 643: 645] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.144956 754374 task_exit.go:204] [ 643: 644] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.145022 754374 task_exit.go:204] [ 643: 644] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.145050 754374 task_exit.go:204] [ 643: 644] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.145061 754374 task_exit.go:204] [ 643: 647] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.146053 754374 task_exit.go:204] [ 643: 647] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.146091 754374 task_exit.go:204] [ 643: 647] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.146113 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.146163 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.146478 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.146366 754374 task_exit.go:204] [ 643: 643] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.147287 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.148671 754374 syscalls.go:262] [ 648: 648] Allocating stack with size of 8388608 bytes D0712 23:58:57.148917 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.149759 754374 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.149802 754374 usertrap_amd64.go:106] [ 648: 648] Map a usertrap vma at 65000 D0712 23:58:57.149879 754374 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0013620f0 1 D0712 23:58:57.149910 754374 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 23:58:57.150362 754374 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.150385 754374 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0013620f0 2 D0712 23:58:57.150393 754374 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 23:58:57.150785 754374 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.150810 754374 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0013620f0 3 D0712 23:58:57.150820 754374 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 23:58:57.158022 754374 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.158049 754374 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0013620f0 4 D0712 23:58:57.158060 754374 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 23:58:57.159126 754374 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.159157 754374 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0013620f0 5 D0712 23:58:57.159168 754374 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 23:58:57.159239 754374 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.159252 754374 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0013620f0 6 D0712 23:58:57.159259 754374 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 23:58:57.159733 754374 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.159762 754374 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0013620f0 7 D0712 23:58:57.159772 754374 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 23:58:57.159945 754374 usertrap_amd64.go:212] [ 648: 649] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.159998 754374 usertrap_amd64.go:122] [ 648: 649] Allocate a new trap: 0xc0013620f0 8 D0712 23:58:57.160009 754374 usertrap_amd64.go:225] [ 648: 649] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 23:58:57.160175 754374 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.160197 754374 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0013620f0 9 D0712 23:58:57.160227 754374 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 23:58:57.160243 754374 usertrap_amd64.go:212] [ 648: 649] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.160250 754374 usertrap_amd64.go:122] [ 648: 649] Allocate a new trap: 0xc0013620f0 10 D0712 23:58:57.160261 754374 usertrap_amd64.go:225] [ 648: 649] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 23:58:57.168898 754374 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.168923 754374 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0013620f0 11 D0712 23:58:57.168934 754374 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 23:58:57.171769 754374 usertrap_amd64.go:212] [ 648: 649] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.171830 754374 usertrap_amd64.go:122] [ 648: 649] Allocate a new trap: 0xc0013620f0 12 D0712 23:58:57.171852 754374 usertrap_amd64.go:225] [ 648: 649] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 23:58:57.171902 754374 usertrap_amd64.go:212] [ 648: 649] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.171929 754374 usertrap_amd64.go:122] [ 648: 649] Allocate a new trap: 0xc0013620f0 13 D0712 23:58:57.171941 754374 usertrap_amd64.go:225] [ 648: 649] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 23:58:57.171991 754374 task_signals.go:470] [ 648: 648] Notified of signal 23 D0712 23:58:57.172125 754374 task_signals.go:220] [ 648: 648] Signal 23: delivering to handler I0712 23:58:57.179860 754374 compat.go:120] Unsupported syscall sys_446(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_446 for more information. D0712 23:58:57.179990 754374 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.180024 754374 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0013620f0 14 D0712 23:58:57.180076 754374 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 23:58:57.180176 754374 task_exit.go:204] [ 648: 648] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.180216 754374 task_exit.go:204] [ 648: 648] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.180235 754374 task_signals.go:204] [ 648: 651] Signal 648, PID: 651, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.180272 754374 task_signals.go:204] [ 648: 650] Signal 648, PID: 650, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.180278 754374 task_exit.go:204] [ 648: 651] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.180332 754374 task_exit.go:204] [ 648: 651] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.180348 754374 task_exit.go:204] [ 648: 651] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.180270 754374 task_signals.go:204] [ 648: 649] Signal 648, PID: 649, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.180367 754374 task_exit.go:204] [ 648: 649] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.180256 754374 task_signals.go:204] [ 648: 652] Signal 648, PID: 652, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.180375 754374 task_exit.go:204] [ 648: 649] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.180382 754374 task_exit.go:204] [ 648: 649] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.180396 754374 task_exit.go:204] [ 648: 652] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.180411 754374 task_signals.go:204] [ 648: 653] Signal 648, PID: 653, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.180436 754374 task_exit.go:204] [ 648: 652] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.180442 754374 task_exit.go:204] [ 648: 652] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.180507 754374 task_exit.go:204] [ 648: 653] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.180529 754374 task_exit.go:204] [ 648: 653] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.180549 754374 task_exit.go:204] [ 648: 653] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.180576 754374 task_exit.go:204] [ 648: 650] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.181691 754374 task_exit.go:204] [ 648: 650] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.181744 754374 task_exit.go:204] [ 648: 650] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.181762 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.181834 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.181855 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.182111 754374 task_exit.go:204] [ 648: 648] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.183472 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.185658 754374 syscalls.go:262] [ 654: 654] Allocating stack with size of 8388608 bytes D0712 23:58:57.185842 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.187840 754374 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.187905 754374 usertrap_amd64.go:106] [ 654: 654] Map a usertrap vma at 68000 D0712 23:58:57.188020 754374 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0009b9230 1 D0712 23:58:57.188065 754374 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 23:58:57.188670 754374 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.188737 754374 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0009b9230 2 D0712 23:58:57.188759 754374 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 23:58:57.189814 754374 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.189848 754374 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0009b9230 3 D0712 23:58:57.189860 754374 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 23:58:57.197443 754374 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.197485 754374 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0009b9230 4 D0712 23:58:57.197501 754374 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 23:58:57.198899 754374 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.198943 754374 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0009b9230 5 D0712 23:58:57.198960 754374 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 23:58:57.199031 754374 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.199049 754374 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0009b9230 6 D0712 23:58:57.199063 754374 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 23:58:57.199646 754374 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.199669 754374 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0009b9230 7 D0712 23:58:57.199680 754374 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 23:58:57.199939 754374 usertrap_amd64.go:212] [ 654: 655] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.199949 754374 usertrap_amd64.go:122] [ 654: 655] Allocate a new trap: 0xc0009b9230 8 D0712 23:58:57.199958 754374 usertrap_amd64.go:225] [ 654: 655] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 23:58:57.200154 754374 usertrap_amd64.go:212] [ 654: 655] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:57.200211 754374 usertrap_amd64.go:122] [ 654: 655] Allocate a new trap: 0xc0009b9230 9 D0712 23:58:57.200340 754374 usertrap_amd64.go:225] [ 654: 655] Apply the binary patch addr 46b6e0 trap addr 682d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 23:58:57.200386 754374 usertrap_amd64.go:212] [ 654: 657] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.200401 754374 usertrap_amd64.go:122] [ 654: 657] Allocate a new trap: 0xc0009b9230 10 D0712 23:58:57.200413 754374 usertrap_amd64.go:225] [ 654: 657] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 23:58:57.200483 754374 usertrap_amd64.go:212] [ 654: 655] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.200502 754374 usertrap_amd64.go:122] [ 654: 655] Allocate a new trap: 0xc0009b9230 11 D0712 23:58:57.200550 754374 usertrap_amd64.go:225] [ 654: 655] Apply the binary patch addr 46af76 trap addr 68370 ([184 35 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 23:58:57.208524 754374 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.208569 754374 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0009b9230 12 D0712 23:58:57.208582 754374 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46af29 trap addr 683c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 23:58:57.210962 754374 usertrap_amd64.go:212] [ 654: 655] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.211002 754374 usertrap_amd64.go:122] [ 654: 655] Allocate a new trap: 0xc0009b9230 13 D0712 23:58:57.211018 754374 usertrap_amd64.go:225] [ 654: 655] Apply the binary patch addr 46b020 trap addr 68410 ([184 39 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 23:58:57.211087 754374 usertrap_amd64.go:212] [ 654: 655] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.211113 754374 usertrap_amd64.go:122] [ 654: 655] Allocate a new trap: 0xc0009b9230 14 D0712 23:58:57.211123 754374 usertrap_amd64.go:225] [ 654: 655] Apply the binary patch addr 46b04f trap addr 68460 ([184 234 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 23:58:57.211187 754374 task_signals.go:470] [ 654: 654] Notified of signal 23 D0712 23:58:57.211309 754374 task_signals.go:220] [ 654: 654] Signal 23: delivering to handler D0712 23:58:57.220045 754374 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.220090 754374 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0009b9230 15 D0712 23:58:57.220104 754374 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0712 23:58:57.220189 754374 task_exit.go:204] [ 654: 654] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.220248 754374 task_exit.go:204] [ 654: 654] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.220278 754374 task_signals.go:204] [ 654: 656] Signal 654, PID: 656, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.220299 754374 task_exit.go:204] [ 654: 656] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.220320 754374 task_exit.go:204] [ 654: 656] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.220327 754374 task_exit.go:204] [ 654: 656] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.220347 754374 task_signals.go:204] [ 654: 655] Signal 654, PID: 655, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.220360 754374 task_exit.go:204] [ 654: 655] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.220368 754374 task_exit.go:204] [ 654: 655] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.220376 754374 task_exit.go:204] [ 654: 655] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.220392 754374 task_signals.go:204] [ 654: 657] Signal 654, PID: 657, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.220408 754374 task_exit.go:204] [ 654: 657] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.220417 754374 task_exit.go:204] [ 654: 657] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.220423 754374 task_exit.go:204] [ 654: 657] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.220437 754374 task_signals.go:204] [ 654: 658] Signal 654, PID: 658, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.220447 754374 task_exit.go:204] [ 654: 658] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.221747 754374 task_exit.go:204] [ 654: 658] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.221779 754374 task_exit.go:204] [ 654: 658] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.221799 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.221891 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.221901 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.222092 754374 task_exit.go:204] [ 654: 654] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.222762 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.223823 754374 syscalls.go:262] [ 659: 659] Allocating stack with size of 8388608 bytes D0712 23:58:57.223990 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.225691 754374 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.225734 754374 usertrap_amd64.go:106] [ 659: 659] Map a usertrap vma at 63000 D0712 23:58:57.225816 754374 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc001724de0 1 D0712 23:58:57.225852 754374 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:58:57.226332 754374 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.226355 754374 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc001724de0 2 D0712 23:58:57.226380 754374 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:58:57.227196 754374 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.227245 754374 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc001724de0 3 D0712 23:58:57.227265 754374 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:58:57.233644 754374 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.233674 754374 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc001724de0 4 D0712 23:58:57.233685 754374 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:58:57.235227 754374 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.235259 754374 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc001724de0 5 D0712 23:58:57.235269 754374 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:58:57.235325 754374 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.235340 754374 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc001724de0 6 D0712 23:58:57.235347 754374 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:58:57.236510 754374 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.236536 754374 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc001724de0 7 D0712 23:58:57.236547 754374 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:58:57.236861 754374 usertrap_amd64.go:212] [ 659: 660] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.236907 754374 usertrap_amd64.go:122] [ 659: 660] Allocate a new trap: 0xc001724de0 8 D0712 23:58:57.236924 754374 usertrap_amd64.go:225] [ 659: 660] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:58:57.237186 754374 usertrap_amd64.go:212] [ 659: 660] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.237221 754374 usertrap_amd64.go:122] [ 659: 660] Allocate a new trap: 0xc001724de0 9 D0712 23:58:57.237235 754374 usertrap_amd64.go:225] [ 659: 660] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:58:57.237408 754374 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.237440 754374 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc001724de0 10 D0712 23:58:57.237501 754374 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:58:57.246324 754374 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.246352 754374 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc001724de0 11 D0712 23:58:57.246362 754374 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:58:57.249149 754374 usertrap_amd64.go:212] [ 659: 660] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.249241 754374 usertrap_amd64.go:122] [ 659: 660] Allocate a new trap: 0xc001724de0 12 D0712 23:58:57.249262 754374 usertrap_amd64.go:225] [ 659: 660] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:58:57.249317 754374 usertrap_amd64.go:212] [ 659: 660] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.249339 754374 usertrap_amd64.go:122] [ 659: 660] Allocate a new trap: 0xc001724de0 13 D0712 23:58:57.249355 754374 usertrap_amd64.go:225] [ 659: 660] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:58:57.249468 754374 task_signals.go:470] [ 659: 659] Notified of signal 23 D0712 23:58:57.249578 754374 task_signals.go:220] [ 659: 659] Signal 23: delivering to handler D0712 23:58:57.256909 754374 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.256968 754374 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc001724de0 14 D0712 23:58:57.256984 754374 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:58:57.257049 754374 task_exit.go:204] [ 659: 659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.257081 754374 task_exit.go:204] [ 659: 659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.257135 754374 task_signals.go:204] [ 659: 664] Signal 659, PID: 664, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.257166 754374 task_signals.go:204] [ 659: 663] Signal 659, PID: 663, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.257145 754374 task_signals.go:204] [ 659: 660] Signal 659, PID: 660, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.257179 754374 task_exit.go:204] [ 659: 664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.257206 754374 task_signals.go:204] [ 659: 661] Signal 659, PID: 661, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.257253 754374 task_signals.go:204] [ 659: 662] Signal 659, PID: 662, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.257269 754374 task_exit.go:204] [ 659: 664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.257276 754374 task_exit.go:204] [ 659: 664] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.257289 754374 task_exit.go:204] [ 659: 663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.257300 754374 task_exit.go:204] [ 659: 663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.257306 754374 task_exit.go:204] [ 659: 663] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.257318 754374 task_exit.go:204] [ 659: 660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.257328 754374 task_exit.go:204] [ 659: 660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.257334 754374 task_exit.go:204] [ 659: 660] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.257350 754374 task_exit.go:204] [ 659: 661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.257359 754374 task_exit.go:204] [ 659: 661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.257364 754374 task_exit.go:204] [ 659: 661] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.257376 754374 task_exit.go:204] [ 659: 662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.258498 754374 task_exit.go:204] [ 659: 662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.258525 754374 task_exit.go:204] [ 659: 662] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.258537 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.258567 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.258577 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.258733 754374 task_exit.go:204] [ 659: 659] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.259495 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.261266 754374 syscalls.go:262] [ 665: 665] Allocating stack with size of 8388608 bytes D0712 23:58:57.261393 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.262905 754374 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.262948 754374 usertrap_amd64.go:106] [ 665: 665] Map a usertrap vma at 62000 D0712 23:58:57.263031 754374 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0009b9320 1 D0712 23:58:57.263097 754374 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:58:57.263420 754374 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.263439 754374 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0009b9320 2 D0712 23:58:57.263449 754374 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:58:57.264024 754374 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.264056 754374 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0009b9320 3 D0712 23:58:57.264068 754374 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:58:57.270878 754374 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.270907 754374 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0009b9320 4 D0712 23:58:57.270916 754374 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:58:57.272138 754374 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.272149 754374 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0009b9320 5 D0712 23:58:57.272156 754374 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:58:57.272170 754374 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.272175 754374 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0009b9320 6 D0712 23:58:57.272180 754374 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:58:57.272613 754374 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.272643 754374 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0009b9320 7 D0712 23:58:57.272656 754374 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:58:57.272929 754374 usertrap_amd64.go:212] [ 665: 666] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.273028 754374 usertrap_amd64.go:122] [ 665: 666] Allocate a new trap: 0xc0009b9320 8 D0712 23:58:57.273046 754374 usertrap_amd64.go:225] [ 665: 666] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:58:57.273397 754374 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.273426 754374 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0009b9320 9 D0712 23:58:57.273443 754374 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:58:57.273481 754374 usertrap_amd64.go:212] [ 665: 666] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.273502 754374 usertrap_amd64.go:122] [ 665: 666] Allocate a new trap: 0xc0009b9320 10 D0712 23:58:57.273591 754374 usertrap_amd64.go:225] [ 665: 666] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:58:57.273794 754374 usertrap_amd64.go:212] [ 665: 668] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:57.273824 754374 usertrap_amd64.go:122] [ 665: 668] Allocate a new trap: 0xc0009b9320 11 D0712 23:58:57.273836 754374 usertrap_amd64.go:225] [ 665: 668] Apply the binary patch addr 46b6e0 trap addr 62370 ([184 24 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:58:57.281571 754374 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.281629 754374 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0009b9320 12 D0712 23:58:57.281652 754374 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46af29 trap addr 623c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:58:57.285652 754374 usertrap_amd64.go:212] [ 665: 666] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.285713 754374 usertrap_amd64.go:122] [ 665: 666] Allocate a new trap: 0xc0009b9320 13 D0712 23:58:57.285735 754374 usertrap_amd64.go:225] [ 665: 666] Apply the binary patch addr 46b020 trap addr 62410 ([184 39 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:58:57.285876 754374 usertrap_amd64.go:212] [ 665: 666] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.285909 754374 usertrap_amd64.go:122] [ 665: 666] Allocate a new trap: 0xc0009b9320 14 D0712 23:58:57.285920 754374 usertrap_amd64.go:225] [ 665: 666] Apply the binary patch addr 46b04f trap addr 62460 ([184 234 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:58:57.285978 754374 task_signals.go:470] [ 665: 665] Notified of signal 23 D0712 23:58:57.286086 754374 task_signals.go:220] [ 665: 665] Signal 23: delivering to handler D0712 23:58:57.292492 754374 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.292520 754374 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0009b9320 15 D0712 23:58:57.292532 754374 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0712 23:58:57.292611 754374 task_exit.go:204] [ 665: 665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.292639 754374 task_exit.go:204] [ 665: 665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.292665 754374 task_signals.go:204] [ 665: 668] Signal 665, PID: 668, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.292660 754374 task_signals.go:204] [ 665: 667] Signal 665, PID: 667, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.292679 754374 task_exit.go:204] [ 665: 668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.292730 754374 task_exit.go:204] [ 665: 668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.292738 754374 task_exit.go:204] [ 665: 668] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.292756 754374 task_exit.go:204] [ 665: 667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.292776 754374 task_exit.go:204] [ 665: 667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.292782 754374 task_exit.go:204] [ 665: 667] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.292794 754374 task_signals.go:204] [ 665: 666] Signal 665, PID: 666, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.292817 754374 task_exit.go:204] [ 665: 666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.292831 754374 task_exit.go:204] [ 665: 666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.292848 754374 task_exit.go:204] [ 665: 666] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.292865 754374 task_signals.go:204] [ 665: 669] Signal 665, PID: 669, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.292888 754374 task_exit.go:204] [ 665: 669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.292898 754374 task_exit.go:204] [ 665: 669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.292905 754374 task_exit.go:204] [ 665: 669] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.292919 754374 task_signals.go:204] [ 665: 670] Signal 665, PID: 670, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.292964 754374 task_exit.go:204] [ 665: 670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.294001 754374 task_exit.go:204] [ 665: 670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.294035 754374 task_exit.go:204] [ 665: 670] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.294050 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.294154 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.294178 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.294292 754374 task_exit.go:204] [ 665: 665] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.295180 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.296717 754374 syscalls.go:262] [ 671: 671] Allocating stack with size of 8388608 bytes D0712 23:58:57.296824 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.298062 754374 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.298107 754374 usertrap_amd64.go:106] [ 671: 671] Map a usertrap vma at 6a000 D0712 23:58:57.298206 754374 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc001362930 1 D0712 23:58:57.298228 754374 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 23:58:57.299593 754374 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.299625 754374 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc001362930 2 D0712 23:58:57.299638 754374 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 23:58:57.300366 754374 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.300398 754374 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc001362930 3 D0712 23:58:57.300407 754374 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 23:58:57.309933 754374 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.309970 754374 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc001362930 4 D0712 23:58:57.309983 754374 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 23:58:57.311496 754374 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.311573 754374 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc001362930 5 D0712 23:58:57.311597 754374 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 23:58:57.311675 754374 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.311696 754374 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc001362930 6 D0712 23:58:57.311706 754374 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 23:58:57.312215 754374 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.312253 754374 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc001362930 7 D0712 23:58:57.312283 754374 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 23:58:57.312585 754374 usertrap_amd64.go:212] [ 671: 672] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.312613 754374 usertrap_amd64.go:122] [ 671: 672] Allocate a new trap: 0xc001362930 8 D0712 23:58:57.312623 754374 usertrap_amd64.go:225] [ 671: 672] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 23:58:57.312821 754374 usertrap_amd64.go:212] [ 671: 672] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.312839 754374 usertrap_amd64.go:122] [ 671: 672] Allocate a new trap: 0xc001362930 9 D0712 23:58:57.312848 754374 usertrap_amd64.go:225] [ 671: 672] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 23:58:57.312873 754374 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.312879 754374 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc001362930 10 D0712 23:58:57.312884 754374 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 23:58:57.323333 754374 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.323367 754374 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc001362930 11 D0712 23:58:57.323379 754374 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 23:58:57.323964 754374 usertrap_amd64.go:212] [ 671: 672] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.324005 754374 usertrap_amd64.go:122] [ 671: 672] Allocate a new trap: 0xc001362930 12 D0712 23:58:57.324021 754374 usertrap_amd64.go:225] [ 671: 672] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 23:58:57.324096 754374 usertrap_amd64.go:212] [ 671: 672] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.324105 754374 usertrap_amd64.go:122] [ 671: 672] Allocate a new trap: 0xc001362930 13 D0712 23:58:57.324115 754374 usertrap_amd64.go:225] [ 671: 672] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 23:58:57.324144 754374 task_signals.go:470] [ 671: 671] Notified of signal 23 D0712 23:58:57.324186 754374 task_signals.go:220] [ 671: 671] Signal 23: delivering to handler D0712 23:58:57.335411 754374 task_signals.go:470] [ 671: 671] Notified of signal 23 D0712 23:58:57.336683 754374 task_signals.go:220] [ 671: 671] Signal 23: delivering to handler D0712 23:58:57.337138 754374 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.337199 754374 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc001362930 14 D0712 23:58:57.337213 754374 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 23:58:57.337280 754374 task_exit.go:204] [ 671: 671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.337321 754374 task_exit.go:204] [ 671: 671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.337365 754374 task_signals.go:204] [ 671: 672] Signal 671, PID: 672, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.337380 754374 task_exit.go:204] [ 671: 672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.337386 754374 task_exit.go:204] [ 671: 672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.337390 754374 task_exit.go:204] [ 671: 672] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.337412 754374 task_signals.go:204] [ 671: 673] Signal 671, PID: 673, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.337431 754374 task_exit.go:204] [ 671: 673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.337437 754374 task_exit.go:204] [ 671: 673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.337441 754374 task_exit.go:204] [ 671: 673] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.337455 754374 task_signals.go:204] [ 671: 674] Signal 671, PID: 674, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.337471 754374 task_exit.go:204] [ 671: 674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.337476 754374 task_exit.go:204] [ 671: 674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.337481 754374 task_exit.go:204] [ 671: 674] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.337491 754374 task_signals.go:204] [ 671: 675] Signal 671, PID: 675, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.337505 754374 task_exit.go:204] [ 671: 675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.338859 754374 task_exit.go:204] [ 671: 675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.338941 754374 task_exit.go:204] [ 671: 675] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.338960 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.339016 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.339056 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.339148 754374 task_exit.go:204] [ 671: 671] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.339910 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.342121 754374 syscalls.go:262] [ 676: 676] Allocating stack with size of 8388608 bytes D0712 23:58:57.342342 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.344647 754374 usertrap_amd64.go:212] [ 676: 676] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.344700 754374 usertrap_amd64.go:106] [ 676: 676] Map a usertrap vma at 6a000 D0712 23:58:57.344801 754374 usertrap_amd64.go:122] [ 676: 676] Allocate a new trap: 0xc000c82480 1 D0712 23:58:57.344841 754374 usertrap_amd64.go:225] [ 676: 676] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 23:58:57.345548 754374 usertrap_amd64.go:212] [ 676: 676] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.345570 754374 usertrap_amd64.go:122] [ 676: 676] Allocate a new trap: 0xc000c82480 2 D0712 23:58:57.345582 754374 usertrap_amd64.go:225] [ 676: 676] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 23:58:57.347917 754374 usertrap_amd64.go:212] [ 676: 676] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.347947 754374 usertrap_amd64.go:122] [ 676: 676] Allocate a new trap: 0xc000c82480 3 D0712 23:58:57.347961 754374 usertrap_amd64.go:225] [ 676: 676] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 23:58:57.354382 754374 usertrap_amd64.go:212] [ 676: 676] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.354409 754374 usertrap_amd64.go:122] [ 676: 676] Allocate a new trap: 0xc000c82480 4 D0712 23:58:57.354420 754374 usertrap_amd64.go:225] [ 676: 676] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 23:58:57.355524 754374 usertrap_amd64.go:212] [ 676: 676] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.355553 754374 usertrap_amd64.go:122] [ 676: 676] Allocate a new trap: 0xc000c82480 5 D0712 23:58:57.355567 754374 usertrap_amd64.go:225] [ 676: 676] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 23:58:57.355628 754374 usertrap_amd64.go:212] [ 676: 676] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.355637 754374 usertrap_amd64.go:122] [ 676: 676] Allocate a new trap: 0xc000c82480 6 D0712 23:58:57.355644 754374 usertrap_amd64.go:225] [ 676: 676] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 23:58:57.356012 754374 usertrap_amd64.go:212] [ 676: 676] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.356025 754374 usertrap_amd64.go:122] [ 676: 676] Allocate a new trap: 0xc000c82480 7 D0712 23:58:57.356036 754374 usertrap_amd64.go:225] [ 676: 676] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 23:58:57.356278 754374 usertrap_amd64.go:212] [ 676: 677] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.356316 754374 usertrap_amd64.go:122] [ 676: 677] Allocate a new trap: 0xc000c82480 8 D0712 23:58:57.356332 754374 usertrap_amd64.go:225] [ 676: 677] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 23:58:57.356590 754374 usertrap_amd64.go:212] [ 676: 676] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.356610 754374 usertrap_amd64.go:122] [ 676: 676] Allocate a new trap: 0xc000c82480 9 D0712 23:58:57.356622 754374 usertrap_amd64.go:225] [ 676: 676] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 23:58:57.356653 754374 usertrap_amd64.go:212] [ 676: 677] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.356688 754374 usertrap_amd64.go:122] [ 676: 677] Allocate a new trap: 0xc000c82480 10 D0712 23:58:57.356697 754374 usertrap_amd64.go:225] [ 676: 677] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 23:58:57.364026 754374 usertrap_amd64.go:212] [ 676: 676] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.364051 754374 usertrap_amd64.go:122] [ 676: 676] Allocate a new trap: 0xc000c82480 11 D0712 23:58:57.364061 754374 usertrap_amd64.go:225] [ 676: 676] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 23:58:57.367158 754374 usertrap_amd64.go:212] [ 676: 677] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.367208 754374 usertrap_amd64.go:122] [ 676: 677] Allocate a new trap: 0xc000c82480 12 D0712 23:58:57.367222 754374 usertrap_amd64.go:225] [ 676: 677] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 23:58:57.367282 754374 usertrap_amd64.go:212] [ 676: 677] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.367313 754374 usertrap_amd64.go:122] [ 676: 677] Allocate a new trap: 0xc000c82480 13 D0712 23:58:57.367323 754374 usertrap_amd64.go:225] [ 676: 677] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 23:58:57.367386 754374 task_signals.go:470] [ 676: 676] Notified of signal 23 D0712 23:58:57.367536 754374 task_signals.go:220] [ 676: 676] Signal 23: delivering to handler D0712 23:58:57.375938 754374 usertrap_amd64.go:212] [ 676: 676] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.375967 754374 usertrap_amd64.go:122] [ 676: 676] Allocate a new trap: 0xc000c82480 14 D0712 23:58:57.375980 754374 usertrap_amd64.go:225] [ 676: 676] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 23:58:57.376034 754374 task_exit.go:204] [ 676: 676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.376064 754374 task_exit.go:204] [ 676: 676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.376093 754374 task_signals.go:204] [ 676: 677] Signal 676, PID: 677, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.376109 754374 task_exit.go:204] [ 676: 677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.376116 754374 task_exit.go:204] [ 676: 677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.376102 754374 task_signals.go:204] [ 676: 679] Signal 676, PID: 679, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.376122 754374 task_exit.go:204] [ 676: 677] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.376160 754374 task_signals.go:204] [ 676: 680] Signal 676, PID: 680, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.376170 754374 task_exit.go:204] [ 676: 680] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.376167 754374 task_signals.go:204] [ 676: 678] Signal 676, PID: 678, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.376186 754374 task_exit.go:204] [ 676: 680] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.376206 754374 task_exit.go:204] [ 676: 680] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.376217 754374 task_exit.go:204] [ 676: 679] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.376236 754374 task_exit.go:204] [ 676: 679] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.376242 754374 task_exit.go:204] [ 676: 679] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.376259 754374 task_exit.go:204] [ 676: 678] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.377385 754374 task_exit.go:204] [ 676: 678] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.377426 754374 task_exit.go:204] [ 676: 678] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.377443 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.377476 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.377485 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.377621 754374 task_exit.go:204] [ 676: 676] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.378344 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.379818 754374 syscalls.go:262] [ 681: 681] Allocating stack with size of 8388608 bytes D0712 23:58:57.380085 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.381478 754374 usertrap_amd64.go:212] [ 681: 681] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.381519 754374 usertrap_amd64.go:106] [ 681: 681] Map a usertrap vma at 66000 D0712 23:58:57.381629 754374 usertrap_amd64.go:122] [ 681: 681] Allocate a new trap: 0xc0006e1ad0 1 D0712 23:58:57.381660 754374 usertrap_amd64.go:225] [ 681: 681] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:57.382315 754374 usertrap_amd64.go:212] [ 681: 681] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.382342 754374 usertrap_amd64.go:122] [ 681: 681] Allocate a new trap: 0xc0006e1ad0 2 D0712 23:58:57.382355 754374 usertrap_amd64.go:225] [ 681: 681] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:57.383144 754374 usertrap_amd64.go:212] [ 681: 681] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.383172 754374 usertrap_amd64.go:122] [ 681: 681] Allocate a new trap: 0xc0006e1ad0 3 D0712 23:58:57.383183 754374 usertrap_amd64.go:225] [ 681: 681] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:57.389706 754374 usertrap_amd64.go:212] [ 681: 681] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.389736 754374 usertrap_amd64.go:122] [ 681: 681] Allocate a new trap: 0xc0006e1ad0 4 D0712 23:58:57.389751 754374 usertrap_amd64.go:225] [ 681: 681] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:57.391003 754374 usertrap_amd64.go:212] [ 681: 681] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.391029 754374 usertrap_amd64.go:122] [ 681: 681] Allocate a new trap: 0xc0006e1ad0 5 D0712 23:58:57.391042 754374 usertrap_amd64.go:225] [ 681: 681] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:57.391076 754374 usertrap_amd64.go:212] [ 681: 681] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.391083 754374 usertrap_amd64.go:122] [ 681: 681] Allocate a new trap: 0xc0006e1ad0 6 D0712 23:58:57.391094 754374 usertrap_amd64.go:225] [ 681: 681] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:57.391550 754374 usertrap_amd64.go:212] [ 681: 681] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.391568 754374 usertrap_amd64.go:122] [ 681: 681] Allocate a new trap: 0xc0006e1ad0 7 D0712 23:58:57.391578 754374 usertrap_amd64.go:225] [ 681: 681] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:57.391741 754374 usertrap_amd64.go:212] [ 681: 682] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.391762 754374 usertrap_amd64.go:122] [ 681: 682] Allocate a new trap: 0xc0006e1ad0 8 D0712 23:58:57.391772 754374 usertrap_amd64.go:225] [ 681: 682] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:57.391966 754374 usertrap_amd64.go:212] [ 681: 682] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.391990 754374 usertrap_amd64.go:122] [ 681: 682] Allocate a new trap: 0xc0006e1ad0 9 D0712 23:58:57.392001 754374 usertrap_amd64.go:225] [ 681: 682] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:57.392057 754374 usertrap_amd64.go:212] [ 681: 684] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.392068 754374 usertrap_amd64.go:122] [ 681: 684] Allocate a new trap: 0xc0006e1ad0 10 D0712 23:58:57.392077 754374 usertrap_amd64.go:225] [ 681: 684] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:57.392115 754374 usertrap_amd64.go:212] [ 681: 683] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:57.392134 754374 usertrap_amd64.go:122] [ 681: 683] Allocate a new trap: 0xc0006e1ad0 11 D0712 23:58:57.392144 754374 usertrap_amd64.go:225] [ 681: 683] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:57.399378 754374 usertrap_amd64.go:212] [ 681: 681] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.399408 754374 usertrap_amd64.go:122] [ 681: 681] Allocate a new trap: 0xc0006e1ad0 12 D0712 23:58:57.399420 754374 usertrap_amd64.go:225] [ 681: 681] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:57.402394 754374 usertrap_amd64.go:212] [ 681: 682] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.402423 754374 usertrap_amd64.go:122] [ 681: 682] Allocate a new trap: 0xc0006e1ad0 13 D0712 23:58:57.402436 754374 usertrap_amd64.go:225] [ 681: 682] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:57.402489 754374 usertrap_amd64.go:212] [ 681: 682] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.402524 754374 usertrap_amd64.go:122] [ 681: 682] Allocate a new trap: 0xc0006e1ad0 14 D0712 23:58:57.402542 754374 usertrap_amd64.go:225] [ 681: 682] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:57.402614 754374 task_signals.go:470] [ 681: 681] Notified of signal 23 D0712 23:58:57.402713 754374 task_signals.go:220] [ 681: 681] Signal 23: delivering to handler D0712 23:58:57.410482 754374 usertrap_amd64.go:212] [ 681: 681] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.410516 754374 usertrap_amd64.go:122] [ 681: 681] Allocate a new trap: 0xc0006e1ad0 15 D0712 23:58:57.410531 754374 usertrap_amd64.go:225] [ 681: 681] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0712 23:58:57.410601 754374 task_exit.go:204] [ 681: 681] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.410625 754374 task_exit.go:204] [ 681: 681] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.410657 754374 task_signals.go:204] [ 681: 684] Signal 681, PID: 684, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.410674 754374 task_signals.go:204] [ 681: 683] Signal 681, PID: 683, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.410689 754374 task_exit.go:204] [ 681: 684] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.410744 754374 task_exit.go:204] [ 681: 684] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.410782 754374 task_exit.go:204] [ 681: 684] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.410810 754374 task_signals.go:204] [ 681: 685] Signal 681, PID: 685, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.410828 754374 task_signals.go:204] [ 681: 682] Signal 681, PID: 682, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.410852 754374 task_exit.go:204] [ 681: 685] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.410872 754374 task_exit.go:204] [ 681: 685] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.410868 754374 task_signals.go:204] [ 681: 686] Signal 681, PID: 686, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.410880 754374 task_exit.go:204] [ 681: 685] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.410892 754374 task_exit.go:204] [ 681: 686] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.410908 754374 task_exit.go:204] [ 681: 683] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.410930 754374 task_exit.go:204] [ 681: 683] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.410938 754374 task_exit.go:204] [ 681: 683] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.410951 754374 task_exit.go:204] [ 681: 682] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.411027 754374 task_exit.go:204] [ 681: 686] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.411060 754374 task_exit.go:204] [ 681: 686] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.411962 754374 task_exit.go:204] [ 681: 682] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.411988 754374 task_exit.go:204] [ 681: 682] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.412010 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.412049 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.412073 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.412229 754374 task_exit.go:204] [ 681: 681] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.412978 754374 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.414815 754374 syscalls.go:262] [ 687: 687] Allocating stack with size of 8388608 bytes D0712 23:58:57.415053 754374 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.416132 754374 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.416167 754374 usertrap_amd64.go:106] [ 687: 687] Map a usertrap vma at 68000 D0712 23:58:57.416268 754374 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc0006e1e30 1 D0712 23:58:57.416301 754374 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 23:58:57.416671 754374 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.416701 754374 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc0006e1e30 2 D0712 23:58:57.416714 754374 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 23:58:57.417451 754374 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.417479 754374 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc0006e1e30 3 D0712 23:58:57.417497 754374 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 23:58:57.424039 754374 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.424087 754374 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc0006e1e30 4 D0712 23:58:57.424106 754374 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 23:58:57.425544 754374 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.425572 754374 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc0006e1e30 5 D0712 23:58:57.425582 754374 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 23:58:57.425652 754374 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.425660 754374 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc0006e1e30 6 D0712 23:58:57.425668 754374 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 23:58:57.426090 754374 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.426123 754374 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc0006e1e30 7 D0712 23:58:57.426139 754374 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 23:58:57.426310 754374 usertrap_amd64.go:212] [ 687: 688] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.426335 754374 usertrap_amd64.go:122] [ 687: 688] Allocate a new trap: 0xc0006e1e30 8 D0712 23:58:57.426346 754374 usertrap_amd64.go:225] [ 687: 688] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 23:58:57.426560 754374 usertrap_amd64.go:212] [ 687: 688] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.426634 754374 usertrap_amd64.go:122] [ 687: 688] Allocate a new trap: 0xc0006e1e30 9 D0712 23:58:57.426654 754374 usertrap_amd64.go:225] [ 687: 688] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 23:58:57.426689 754374 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.426697 754374 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc0006e1e30 10 D0712 23:58:57.426706 754374 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 23:58:57.426908 754374 usertrap_amd64.go:212] [ 687: 688] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.426946 754374 usertrap_amd64.go:122] [ 687: 688] Allocate a new trap: 0xc0006e1e30 11 D0712 23:58:57.426958 754374 usertrap_amd64.go:225] [ 687: 688] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 23:58:57.427025 754374 usertrap_amd64.go:212] [ 687: 688] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.427056 754374 usertrap_amd64.go:122] [ 687: 688] Allocate a new trap: 0xc0006e1e30 12 D0712 23:58:57.427084 754374 usertrap_amd64.go:225] [ 687: 688] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 23:58:57.427130 754374 task_signals.go:470] [ 687: 690] Notified of signal 23 D0712 23:58:57.427180 754374 task_signals.go:179] [ 687: 690] Restarting syscall 202: interrupted by signal 23 D0712 23:58:57.427192 754374 task_signals.go:220] [ 687: 690] Signal 23: delivering to handler D0712 23:58:57.434776 754374 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.434817 754374 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc0006e1e30 13 D0712 23:58:57.434831 754374 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 23:58:57.437545 754374 task_signals.go:470] [ 687: 687] Notified of signal 23 D0712 23:58:57.437613 754374 task_signals.go:220] [ 687: 687] Signal 23: delivering to handler D0712 23:58:57.445244 754374 usertrap_amd64.go:212] [ 687: 687] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.445287 754374 usertrap_amd64.go:122] [ 687: 687] Allocate a new trap: 0xc0006e1e30 14 D0712 23:58:57.445302 754374 usertrap_amd64.go:225] [ 687: 687] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 23:58:57.445390 754374 task_exit.go:204] [ 687: 687] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.445425 754374 task_exit.go:204] [ 687: 687] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.445453 754374 task_signals.go:204] [ 687: 690] Signal 687, PID: 690, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.445470 754374 task_exit.go:204] [ 687: 690] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.445472 754374 task_signals.go:204] [ 687: 691] Signal 687, PID: 691, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.445490 754374 task_exit.go:204] [ 687: 690] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.445509 754374 task_exit.go:204] [ 687: 690] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.445470 754374 task_signals.go:204] [ 687: 689] Signal 687, PID: 689, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.445528 754374 task_exit.go:204] [ 687: 689] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.445445 754374 task_signals.go:204] [ 687: 688] Signal 687, PID: 688, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.445564 754374 task_exit.go:204] [ 687: 689] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.445589 754374 task_exit.go:204] [ 687: 689] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.445649 754374 task_exit.go:204] [ 687: 691] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.445680 754374 task_exit.go:204] [ 687: 691] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.445688 754374 task_exit.go:204] [ 687: 691] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.445702 754374 task_exit.go:204] [ 687: 688] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.446706 754374 task_exit.go:204] [ 687: 688] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.446736 754374 task_exit.go:204] [ 687: 688] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.446787 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.446825 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.446844 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.447046 754374 task_exit.go:204] [ 687: 687] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.447655 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.449197 754374 syscalls.go:262] [ 692: 692] Allocating stack with size of 8388608 bytes D0712 23:58:57.449366 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.450772 754374 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.450806 754374 usertrap_amd64.go:106] [ 692: 692] Map a usertrap vma at 67000 D0712 23:58:57.450911 754374 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc0017258c0 1 D0712 23:58:57.450940 754374 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 23:58:57.451309 754374 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.451388 754374 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc0017258c0 2 D0712 23:58:57.451413 754374 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 23:58:57.452199 754374 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.452231 754374 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc0017258c0 3 D0712 23:58:57.452243 754374 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 23:58:57.458849 754374 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.458895 754374 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc0017258c0 4 D0712 23:58:57.458911 754374 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 23:58:57.460128 754374 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.460184 754374 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc0017258c0 5 D0712 23:58:57.460200 754374 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 23:58:57.460259 754374 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.460280 754374 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc0017258c0 6 D0712 23:58:57.460290 754374 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 23:58:57.460536 754374 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.460567 754374 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc0017258c0 7 D0712 23:58:57.460578 754374 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 23:58:57.460854 754374 usertrap_amd64.go:212] [ 692: 693] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.460886 754374 usertrap_amd64.go:122] [ 692: 693] Allocate a new trap: 0xc0017258c0 8 D0712 23:58:57.460902 754374 usertrap_amd64.go:225] [ 692: 693] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 23:58:57.461155 754374 usertrap_amd64.go:212] [ 692: 693] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.461184 754374 usertrap_amd64.go:122] [ 692: 693] Allocate a new trap: 0xc0017258c0 9 D0712 23:58:57.461194 754374 usertrap_amd64.go:225] [ 692: 693] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 23:58:57.461430 754374 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:57.461458 754374 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc0017258c0 10 D0712 23:58:57.461468 754374 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46b6e0 trap addr 67320 ([184 24 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 23:58:57.461621 754374 usertrap_amd64.go:212] [ 692: 694] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.461648 754374 usertrap_amd64.go:122] [ 692: 694] Allocate a new trap: 0xc0017258c0 11 D0712 23:58:57.461662 754374 usertrap_amd64.go:225] [ 692: 694] Apply the binary patch addr 46b57c trap addr 67370 ([184 202 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 23:58:57.470415 754374 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.470446 754374 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc0017258c0 12 D0712 23:58:57.470457 754374 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46af29 trap addr 673c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 23:58:57.473030 754374 usertrap_amd64.go:212] [ 692: 693] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.473067 754374 usertrap_amd64.go:122] [ 692: 693] Allocate a new trap: 0xc0017258c0 13 D0712 23:58:57.473083 754374 usertrap_amd64.go:225] [ 692: 693] Apply the binary patch addr 46b020 trap addr 67410 ([184 39 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 23:58:57.473279 754374 usertrap_amd64.go:212] [ 692: 693] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.473309 754374 usertrap_amd64.go:122] [ 692: 693] Allocate a new trap: 0xc0017258c0 14 D0712 23:58:57.473319 754374 usertrap_amd64.go:225] [ 692: 693] Apply the binary patch addr 46b04f trap addr 67460 ([184 234 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 23:58:57.473375 754374 task_signals.go:470] [ 692: 692] Notified of signal 23 D0712 23:58:57.473451 754374 task_signals.go:220] [ 692: 692] Signal 23: delivering to handler I0712 23:58:57.480789 754374 compat.go:120] Unsupported syscall lookup_dcookie(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/lookup_dcookie for more information. D0712 23:58:57.480886 754374 usertrap_amd64.go:212] [ 692: 692] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.480898 754374 usertrap_amd64.go:122] [ 692: 692] Allocate a new trap: 0xc0017258c0 15 D0712 23:58:57.480918 754374 usertrap_amd64.go:225] [ 692: 692] Apply the binary patch addr 46ae44 trap addr 674b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 116 6 0]) D0712 23:58:57.481003 754374 task_exit.go:204] [ 692: 692] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.481030 754374 task_exit.go:204] [ 692: 692] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.481052 754374 task_signals.go:204] [ 692: 695] Signal 692, PID: 695, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.481063 754374 task_exit.go:204] [ 692: 695] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.481081 754374 task_exit.go:204] [ 692: 695] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.481062 754374 task_signals.go:204] [ 692: 694] Signal 692, PID: 694, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.481089 754374 task_exit.go:204] [ 692: 695] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.481127 754374 task_exit.go:204] [ 692: 694] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.481176 754374 task_signals.go:204] [ 692: 693] Signal 692, PID: 693, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.481124 754374 task_signals.go:204] [ 692: 696] Signal 692, PID: 696, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.481197 754374 task_exit.go:204] [ 692: 694] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.481205 754374 task_exit.go:204] [ 692: 694] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.481224 754374 task_exit.go:204] [ 692: 693] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.481244 754374 task_exit.go:204] [ 692: 693] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.481258 754374 task_exit.go:204] [ 692: 693] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.481266 754374 task_exit.go:204] [ 692: 696] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.482552 754374 task_exit.go:204] [ 692: 696] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.482591 754374 task_exit.go:204] [ 692: 696] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.482605 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.482648 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.482660 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.482857 754374 task_exit.go:204] [ 692: 692] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.483162 754374 task_signals.go:470] [ 5: 25] Notified of signal 23 D0712 23:58:57.483216 754374 task_signals.go:220] [ 5: 25] Signal 23: delivering to handler D0712 23:58:57.483727 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.485503 754374 syscalls.go:262] [ 697: 697] Allocating stack with size of 8388608 bytes D0712 23:58:57.485638 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.487109 754374 usertrap_amd64.go:212] [ 697: 697] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.487150 754374 usertrap_amd64.go:106] [ 697: 697] Map a usertrap vma at 60000 D0712 23:58:57.487250 754374 usertrap_amd64.go:122] [ 697: 697] Allocate a new trap: 0xc000c830b0 1 D0712 23:58:57.487286 754374 usertrap_amd64.go:225] [ 697: 697] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:58:57.487626 754374 usertrap_amd64.go:212] [ 697: 697] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.487649 754374 usertrap_amd64.go:122] [ 697: 697] Allocate a new trap: 0xc000c830b0 2 D0712 23:58:57.487658 754374 usertrap_amd64.go:225] [ 697: 697] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:58:57.488426 754374 usertrap_amd64.go:212] [ 697: 697] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.488460 754374 usertrap_amd64.go:122] [ 697: 697] Allocate a new trap: 0xc000c830b0 3 D0712 23:58:57.488472 754374 usertrap_amd64.go:225] [ 697: 697] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:58:57.494532 754374 usertrap_amd64.go:212] [ 697: 697] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.494565 754374 usertrap_amd64.go:122] [ 697: 697] Allocate a new trap: 0xc000c830b0 4 D0712 23:58:57.494584 754374 usertrap_amd64.go:225] [ 697: 697] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:58:57.495890 754374 usertrap_amd64.go:212] [ 697: 697] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.495919 754374 usertrap_amd64.go:122] [ 697: 697] Allocate a new trap: 0xc000c830b0 5 D0712 23:58:57.495931 754374 usertrap_amd64.go:225] [ 697: 697] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:58:57.495980 754374 usertrap_amd64.go:212] [ 697: 697] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.496004 754374 usertrap_amd64.go:122] [ 697: 697] Allocate a new trap: 0xc000c830b0 6 D0712 23:58:57.496013 754374 usertrap_amd64.go:225] [ 697: 697] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:58:57.496455 754374 usertrap_amd64.go:212] [ 697: 697] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.496482 754374 usertrap_amd64.go:122] [ 697: 697] Allocate a new trap: 0xc000c830b0 7 D0712 23:58:57.496490 754374 usertrap_amd64.go:225] [ 697: 697] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:58:57.496636 754374 usertrap_amd64.go:212] [ 697: 698] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.496661 754374 usertrap_amd64.go:122] [ 697: 698] Allocate a new trap: 0xc000c830b0 8 D0712 23:58:57.496673 754374 usertrap_amd64.go:225] [ 697: 698] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:58:57.496999 754374 usertrap_amd64.go:212] [ 697: 697] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.497025 754374 usertrap_amd64.go:122] [ 697: 697] Allocate a new trap: 0xc000c830b0 9 D0712 23:58:57.497039 754374 usertrap_amd64.go:225] [ 697: 697] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:58:57.497056 754374 usertrap_amd64.go:212] [ 697: 698] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.497064 754374 usertrap_amd64.go:122] [ 697: 698] Allocate a new trap: 0xc000c830b0 10 D0712 23:58:57.497073 754374 usertrap_amd64.go:225] [ 697: 698] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:58:57.504793 754374 usertrap_amd64.go:212] [ 697: 697] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.504823 754374 usertrap_amd64.go:122] [ 697: 697] Allocate a new trap: 0xc000c830b0 11 D0712 23:58:57.504834 754374 usertrap_amd64.go:225] [ 697: 697] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:58:57.507429 754374 usertrap_amd64.go:212] [ 697: 698] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.507463 754374 usertrap_amd64.go:122] [ 697: 698] Allocate a new trap: 0xc000c830b0 12 D0712 23:58:57.507477 754374 usertrap_amd64.go:225] [ 697: 698] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:58:57.507544 754374 usertrap_amd64.go:212] [ 697: 698] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.507589 754374 usertrap_amd64.go:122] [ 697: 698] Allocate a new trap: 0xc000c830b0 13 D0712 23:58:57.507620 754374 usertrap_amd64.go:225] [ 697: 698] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:58:57.507665 754374 task_signals.go:470] [ 697: 697] Notified of signal 23 D0712 23:58:57.507773 754374 task_signals.go:220] [ 697: 697] Signal 23: delivering to handler D0712 23:58:57.516088 754374 usertrap_amd64.go:212] [ 697: 697] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.516168 754374 usertrap_amd64.go:122] [ 697: 697] Allocate a new trap: 0xc000c830b0 14 D0712 23:58:57.516192 754374 usertrap_amd64.go:225] [ 697: 697] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:58:57.516267 754374 task_exit.go:204] [ 697: 697] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.516325 754374 task_signals.go:204] [ 697: 698] Signal 697, PID: 698, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.516394 754374 task_signals.go:204] [ 697: 702] Signal 697, PID: 702, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.516400 754374 task_signals.go:204] [ 697: 699] Signal 697, PID: 699, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.516416 754374 task_exit.go:204] [ 697: 697] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.516466 754374 task_signals.go:204] [ 697: 700] Signal 697, PID: 700, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.516492 754374 task_exit.go:204] [ 697: 698] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.516582 754374 task_exit.go:204] [ 697: 698] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.516598 754374 task_exit.go:204] [ 697: 698] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.516483 754374 task_signals.go:204] [ 697: 701] Signal 697, PID: 701, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.516626 754374 task_exit.go:204] [ 697: 701] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.516675 754374 task_exit.go:204] [ 697: 701] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.516693 754374 task_exit.go:204] [ 697: 701] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.516721 754374 task_exit.go:204] [ 697: 700] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.516740 754374 task_exit.go:204] [ 697: 700] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.516748 754374 task_exit.go:204] [ 697: 700] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.516764 754374 task_exit.go:204] [ 697: 699] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.516791 754374 task_exit.go:204] [ 697: 699] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.516796 754374 task_exit.go:204] [ 697: 699] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.516804 754374 task_exit.go:204] [ 697: 702] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.518615 754374 task_exit.go:204] [ 697: 702] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.518659 754374 task_exit.go:204] [ 697: 702] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.518679 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.518762 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.518777 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.518983 754374 task_exit.go:204] [ 697: 697] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.519783 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.521416 754374 syscalls.go:262] [ 703: 703] Allocating stack with size of 8388608 bytes D0712 23:58:57.521548 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.523516 754374 usertrap_amd64.go:212] [ 703: 703] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.523571 754374 usertrap_amd64.go:106] [ 703: 703] Map a usertrap vma at 69000 D0712 23:58:57.523668 754374 usertrap_amd64.go:122] [ 703: 703] Allocate a new trap: 0xc0005e47b0 1 D0712 23:58:57.523692 754374 usertrap_amd64.go:225] [ 703: 703] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 23:58:57.524115 754374 usertrap_amd64.go:212] [ 703: 703] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.524150 754374 usertrap_amd64.go:122] [ 703: 703] Allocate a new trap: 0xc0005e47b0 2 D0712 23:58:57.524166 754374 usertrap_amd64.go:225] [ 703: 703] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 23:58:57.524851 754374 usertrap_amd64.go:212] [ 703: 703] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.524880 754374 usertrap_amd64.go:122] [ 703: 703] Allocate a new trap: 0xc0005e47b0 3 D0712 23:58:57.524890 754374 usertrap_amd64.go:225] [ 703: 703] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 23:58:57.532012 754374 usertrap_amd64.go:212] [ 703: 703] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.532058 754374 usertrap_amd64.go:122] [ 703: 703] Allocate a new trap: 0xc0005e47b0 4 D0712 23:58:57.532072 754374 usertrap_amd64.go:225] [ 703: 703] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 23:58:57.533373 754374 usertrap_amd64.go:212] [ 703: 703] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.533408 754374 usertrap_amd64.go:122] [ 703: 703] Allocate a new trap: 0xc0005e47b0 5 D0712 23:58:57.533418 754374 usertrap_amd64.go:225] [ 703: 703] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 23:58:57.534308 754374 usertrap_amd64.go:212] [ 703: 703] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.534336 754374 usertrap_amd64.go:122] [ 703: 703] Allocate a new trap: 0xc0005e47b0 6 D0712 23:58:57.534346 754374 usertrap_amd64.go:225] [ 703: 703] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 23:58:57.534738 754374 usertrap_amd64.go:212] [ 703: 703] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.534790 754374 usertrap_amd64.go:122] [ 703: 703] Allocate a new trap: 0xc0005e47b0 7 D0712 23:58:57.534809 754374 usertrap_amd64.go:225] [ 703: 703] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 23:58:57.535033 754374 usertrap_amd64.go:212] [ 703: 704] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.535058 754374 usertrap_amd64.go:122] [ 703: 704] Allocate a new trap: 0xc0005e47b0 8 D0712 23:58:57.535067 754374 usertrap_amd64.go:225] [ 703: 704] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 23:58:57.535467 754374 usertrap_amd64.go:212] [ 703: 704] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.535509 754374 usertrap_amd64.go:122] [ 703: 704] Allocate a new trap: 0xc0005e47b0 9 D0712 23:58:57.535531 754374 usertrap_amd64.go:225] [ 703: 704] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 23:58:57.535771 754374 usertrap_amd64.go:212] [ 703: 703] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.535790 754374 usertrap_amd64.go:122] [ 703: 703] Allocate a new trap: 0xc0005e47b0 10 D0712 23:58:57.535804 754374 usertrap_amd64.go:225] [ 703: 703] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 23:58:57.544575 754374 usertrap_amd64.go:212] [ 703: 703] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.544614 754374 usertrap_amd64.go:122] [ 703: 703] Allocate a new trap: 0xc0005e47b0 11 D0712 23:58:57.544626 754374 usertrap_amd64.go:225] [ 703: 703] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 23:58:57.547271 754374 usertrap_amd64.go:212] [ 703: 704] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.547322 754374 usertrap_amd64.go:122] [ 703: 704] Allocate a new trap: 0xc0005e47b0 12 D0712 23:58:57.547340 754374 usertrap_amd64.go:225] [ 703: 704] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 23:58:57.547370 754374 usertrap_amd64.go:212] [ 703: 704] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.547376 754374 usertrap_amd64.go:122] [ 703: 704] Allocate a new trap: 0xc0005e47b0 13 D0712 23:58:57.547383 754374 usertrap_amd64.go:225] [ 703: 704] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 23:58:57.547404 754374 task_signals.go:470] [ 703: 703] Notified of signal 23 D0712 23:58:57.547479 754374 task_signals.go:220] [ 703: 703] Signal 23: delivering to handler D0712 23:58:57.555101 754374 usertrap_amd64.go:212] [ 703: 703] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.555150 754374 usertrap_amd64.go:122] [ 703: 703] Allocate a new trap: 0xc0005e47b0 14 D0712 23:58:57.555166 754374 usertrap_amd64.go:225] [ 703: 703] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 23:58:57.555240 754374 task_exit.go:204] [ 703: 703] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.555280 754374 task_signals.go:204] [ 703: 704] Signal 703, PID: 704, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.555297 754374 task_exit.go:204] [ 703: 703] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.555277 754374 task_signals.go:204] [ 703: 705] Signal 703, PID: 705, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.555325 754374 task_exit.go:204] [ 703: 705] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.555374 754374 task_signals.go:204] [ 703: 707] Signal 703, PID: 707, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.555383 754374 task_signals.go:204] [ 703: 706] Signal 703, PID: 706, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.555395 754374 task_exit.go:204] [ 703: 705] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.555415 754374 task_exit.go:204] [ 703: 705] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.555465 754374 task_exit.go:204] [ 703: 704] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.555480 754374 task_exit.go:204] [ 703: 704] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.555484 754374 task_exit.go:204] [ 703: 704] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.555493 754374 task_exit.go:204] [ 703: 707] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.555499 754374 task_exit.go:204] [ 703: 707] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.555503 754374 task_exit.go:204] [ 703: 707] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.555512 754374 task_exit.go:204] [ 703: 706] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.556766 754374 task_exit.go:204] [ 703: 706] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.556801 754374 task_exit.go:204] [ 703: 706] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.556826 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.556859 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.556866 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.557068 754374 task_exit.go:204] [ 703: 703] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.557670 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.559134 754374 syscalls.go:262] [ 708: 708] Allocating stack with size of 8388608 bytes D0712 23:58:57.559220 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.560375 754374 usertrap_amd64.go:212] [ 708: 708] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.560421 754374 usertrap_amd64.go:106] [ 708: 708] Map a usertrap vma at 66000 D0712 23:58:57.560547 754374 usertrap_amd64.go:122] [ 708: 708] Allocate a new trap: 0xc00149f860 1 D0712 23:58:57.560577 754374 usertrap_amd64.go:225] [ 708: 708] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:57.560969 754374 usertrap_amd64.go:212] [ 708: 708] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.560994 754374 usertrap_amd64.go:122] [ 708: 708] Allocate a new trap: 0xc00149f860 2 D0712 23:58:57.561006 754374 usertrap_amd64.go:225] [ 708: 708] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:57.561579 754374 usertrap_amd64.go:212] [ 708: 708] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.561630 754374 usertrap_amd64.go:122] [ 708: 708] Allocate a new trap: 0xc00149f860 3 D0712 23:58:57.561646 754374 usertrap_amd64.go:225] [ 708: 708] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:57.567339 754374 usertrap_amd64.go:212] [ 708: 708] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.567378 754374 usertrap_amd64.go:122] [ 708: 708] Allocate a new trap: 0xc00149f860 4 D0712 23:58:57.567395 754374 usertrap_amd64.go:225] [ 708: 708] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:57.568457 754374 usertrap_amd64.go:212] [ 708: 708] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.568500 754374 usertrap_amd64.go:122] [ 708: 708] Allocate a new trap: 0xc00149f860 5 D0712 23:58:57.568514 754374 usertrap_amd64.go:225] [ 708: 708] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:57.568571 754374 usertrap_amd64.go:212] [ 708: 708] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.568584 754374 usertrap_amd64.go:122] [ 708: 708] Allocate a new trap: 0xc00149f860 6 D0712 23:58:57.568590 754374 usertrap_amd64.go:225] [ 708: 708] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:57.568930 754374 usertrap_amd64.go:212] [ 708: 708] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.568972 754374 usertrap_amd64.go:122] [ 708: 708] Allocate a new trap: 0xc00149f860 7 D0712 23:58:57.568985 754374 usertrap_amd64.go:225] [ 708: 708] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:57.569154 754374 usertrap_amd64.go:212] [ 708: 709] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.569169 754374 usertrap_amd64.go:122] [ 708: 709] Allocate a new trap: 0xc00149f860 8 D0712 23:58:57.569175 754374 usertrap_amd64.go:225] [ 708: 709] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:57.569362 754374 usertrap_amd64.go:212] [ 708: 709] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.569394 754374 usertrap_amd64.go:122] [ 708: 709] Allocate a new trap: 0xc00149f860 9 D0712 23:58:57.569408 754374 usertrap_amd64.go:225] [ 708: 709] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:57.569496 754374 usertrap_amd64.go:212] [ 708: 708] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.569529 754374 usertrap_amd64.go:122] [ 708: 708] Allocate a new trap: 0xc00149f860 10 D0712 23:58:57.569617 754374 usertrap_amd64.go:225] [ 708: 708] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:57.577055 754374 usertrap_amd64.go:212] [ 708: 708] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.577088 754374 usertrap_amd64.go:122] [ 708: 708] Allocate a new trap: 0xc00149f860 11 D0712 23:58:57.577098 754374 usertrap_amd64.go:225] [ 708: 708] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:57.579873 754374 usertrap_amd64.go:212] [ 708: 709] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.579907 754374 usertrap_amd64.go:122] [ 708: 709] Allocate a new trap: 0xc00149f860 12 D0712 23:58:57.579921 754374 usertrap_amd64.go:225] [ 708: 709] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:57.579976 754374 usertrap_amd64.go:212] [ 708: 709] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.580007 754374 usertrap_amd64.go:122] [ 708: 709] Allocate a new trap: 0xc00149f860 13 D0712 23:58:57.580021 754374 usertrap_amd64.go:225] [ 708: 709] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:57.580056 754374 task_signals.go:470] [ 708: 708] Notified of signal 23 D0712 23:58:57.580134 754374 task_signals.go:220] [ 708: 708] Signal 23: delivering to handler D0712 23:58:57.586641 754374 usertrap_amd64.go:212] [ 708: 708] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.586677 754374 usertrap_amd64.go:122] [ 708: 708] Allocate a new trap: 0xc00149f860 14 D0712 23:58:57.586690 754374 usertrap_amd64.go:225] [ 708: 708] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:57.586747 754374 task_exit.go:204] [ 708: 708] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.586773 754374 task_exit.go:204] [ 708: 708] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.586797 754374 task_signals.go:204] [ 708: 711] Signal 708, PID: 711, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.586793 754374 task_signals.go:204] [ 708: 709] Signal 708, PID: 709, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.586810 754374 task_exit.go:204] [ 708: 711] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.586826 754374 task_signals.go:204] [ 708: 710] Signal 708, PID: 710, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.586841 754374 task_exit.go:204] [ 708: 710] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.586882 754374 task_signals.go:204] [ 708: 712] Signal 708, PID: 712, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.586909 754374 task_exit.go:204] [ 708: 710] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.586916 754374 task_exit.go:204] [ 708: 710] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.586930 754374 task_exit.go:204] [ 708: 711] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.586936 754374 task_exit.go:204] [ 708: 711] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.586949 754374 task_exit.go:204] [ 708: 709] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.586970 754374 task_exit.go:204] [ 708: 709] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.586977 754374 task_exit.go:204] [ 708: 709] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.586988 754374 task_exit.go:204] [ 708: 712] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.588062 754374 task_exit.go:204] [ 708: 712] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.588102 754374 task_exit.go:204] [ 708: 712] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.588118 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.588151 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.588162 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.588276 754374 task_exit.go:204] [ 708: 708] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.588489 754374 task_signals.go:470] [ 5: 25] Notified of signal 23 D0712 23:58:57.588579 754374 task_signals.go:220] [ 5: 25] Signal 23: delivering to handler D0712 23:58:57.589093 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.590373 754374 syscalls.go:262] [ 713: 713] Allocating stack with size of 8388608 bytes D0712 23:58:57.590473 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.591174 754374 usertrap_amd64.go:212] [ 713: 713] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.591220 754374 usertrap_amd64.go:106] [ 713: 713] Map a usertrap vma at 66000 D0712 23:58:57.591354 754374 usertrap_amd64.go:122] [ 713: 713] Allocate a new trap: 0xc000c83170 1 D0712 23:58:57.591409 754374 usertrap_amd64.go:225] [ 713: 713] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:57.591609 754374 usertrap_amd64.go:212] [ 713: 713] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.591627 754374 usertrap_amd64.go:122] [ 713: 713] Allocate a new trap: 0xc000c83170 2 D0712 23:58:57.591634 754374 usertrap_amd64.go:225] [ 713: 713] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:57.592071 754374 usertrap_amd64.go:212] [ 713: 713] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.592095 754374 usertrap_amd64.go:122] [ 713: 713] Allocate a new trap: 0xc000c83170 3 D0712 23:58:57.592104 754374 usertrap_amd64.go:225] [ 713: 713] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:57.597539 754374 usertrap_amd64.go:212] [ 713: 713] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.597573 754374 usertrap_amd64.go:122] [ 713: 713] Allocate a new trap: 0xc000c83170 4 D0712 23:58:57.597585 754374 usertrap_amd64.go:225] [ 713: 713] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:57.598633 754374 usertrap_amd64.go:212] [ 713: 713] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.598661 754374 usertrap_amd64.go:122] [ 713: 713] Allocate a new trap: 0xc000c83170 5 D0712 23:58:57.598672 754374 usertrap_amd64.go:225] [ 713: 713] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:57.598700 754374 usertrap_amd64.go:212] [ 713: 713] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.598705 754374 usertrap_amd64.go:122] [ 713: 713] Allocate a new trap: 0xc000c83170 6 D0712 23:58:57.598710 754374 usertrap_amd64.go:225] [ 713: 713] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:57.598863 754374 usertrap_amd64.go:212] [ 713: 713] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.598878 754374 usertrap_amd64.go:122] [ 713: 713] Allocate a new trap: 0xc000c83170 7 D0712 23:58:57.598884 754374 usertrap_amd64.go:225] [ 713: 713] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:57.598980 754374 usertrap_amd64.go:212] [ 713: 714] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.599002 754374 usertrap_amd64.go:122] [ 713: 714] Allocate a new trap: 0xc000c83170 8 D0712 23:58:57.599012 754374 usertrap_amd64.go:225] [ 713: 714] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:57.599157 754374 usertrap_amd64.go:212] [ 713: 714] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.599176 754374 usertrap_amd64.go:122] [ 713: 714] Allocate a new trap: 0xc000c83170 9 D0712 23:58:57.599186 754374 usertrap_amd64.go:225] [ 713: 714] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:57.599247 754374 usertrap_amd64.go:212] [ 713: 713] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.599256 754374 usertrap_amd64.go:122] [ 713: 713] Allocate a new trap: 0xc000c83170 10 D0712 23:58:57.599264 754374 usertrap_amd64.go:225] [ 713: 713] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:57.606617 754374 usertrap_amd64.go:212] [ 713: 713] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.606645 754374 usertrap_amd64.go:122] [ 713: 713] Allocate a new trap: 0xc000c83170 11 D0712 23:58:57.606654 754374 usertrap_amd64.go:225] [ 713: 713] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:57.610284 754374 usertrap_amd64.go:212] [ 713: 714] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.610315 754374 usertrap_amd64.go:122] [ 713: 714] Allocate a new trap: 0xc000c83170 12 D0712 23:58:57.610327 754374 usertrap_amd64.go:225] [ 713: 714] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:57.610380 754374 usertrap_amd64.go:212] [ 713: 714] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.610411 754374 usertrap_amd64.go:122] [ 713: 714] Allocate a new trap: 0xc000c83170 13 D0712 23:58:57.610424 754374 usertrap_amd64.go:225] [ 713: 714] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:57.610458 754374 task_signals.go:470] [ 713: 713] Notified of signal 23 D0712 23:58:57.610512 754374 task_signals.go:220] [ 713: 713] Signal 23: delivering to handler D0712 23:58:57.616507 754374 usertrap_amd64.go:212] [ 713: 713] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.616552 754374 usertrap_amd64.go:122] [ 713: 713] Allocate a new trap: 0xc000c83170 14 D0712 23:58:57.616573 754374 usertrap_amd64.go:225] [ 713: 713] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:57.616656 754374 task_exit.go:204] [ 713: 713] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.616740 754374 task_signals.go:204] [ 713: 715] Signal 713, PID: 715, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.616745 754374 task_signals.go:204] [ 713: 716] Signal 713, PID: 716, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.616768 754374 task_signals.go:204] [ 713: 717] Signal 713, PID: 717, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.616794 754374 task_signals.go:204] [ 713: 714] Signal 713, PID: 714, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.616819 754374 task_exit.go:204] [ 713: 717] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.616844 754374 task_exit.go:204] [ 713: 717] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.616872 754374 task_exit.go:204] [ 713: 717] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.616894 754374 task_exit.go:204] [ 713: 715] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.616934 754374 task_exit.go:204] [ 713: 715] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.616973 754374 task_exit.go:204] [ 713: 715] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.616993 754374 task_exit.go:204] [ 713: 716] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.617020 754374 task_exit.go:204] [ 713: 716] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.617034 754374 task_exit.go:204] [ 713: 716] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.617050 754374 task_exit.go:204] [ 713: 713] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.617083 754374 task_exit.go:204] [ 713: 714] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.618138 754374 task_exit.go:204] [ 713: 714] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.618165 754374 task_exit.go:204] [ 713: 714] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.618179 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.618234 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.618258 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.618373 754374 task_exit.go:204] [ 713: 713] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.619241 754374 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.620464 754374 syscalls.go:262] [ 718: 718] Allocating stack with size of 8388608 bytes D0712 23:58:57.620576 754374 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.621806 754374 usertrap_amd64.go:212] [ 718: 718] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.621839 754374 usertrap_amd64.go:106] [ 718: 718] Map a usertrap vma at 67000 D0712 23:58:57.621954 754374 usertrap_amd64.go:122] [ 718: 718] Allocate a new trap: 0xc00149fad0 1 D0712 23:58:57.622009 754374 usertrap_amd64.go:225] [ 718: 718] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 23:58:57.622371 754374 usertrap_amd64.go:212] [ 718: 718] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.622397 754374 usertrap_amd64.go:122] [ 718: 718] Allocate a new trap: 0xc00149fad0 2 D0712 23:58:57.622422 754374 usertrap_amd64.go:225] [ 718: 718] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 23:58:57.622987 754374 usertrap_amd64.go:212] [ 718: 718] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.623015 754374 usertrap_amd64.go:122] [ 718: 718] Allocate a new trap: 0xc00149fad0 3 D0712 23:58:57.623026 754374 usertrap_amd64.go:225] [ 718: 718] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 23:58:57.629917 754374 usertrap_amd64.go:212] [ 718: 718] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.629952 754374 usertrap_amd64.go:122] [ 718: 718] Allocate a new trap: 0xc00149fad0 4 D0712 23:58:57.629969 754374 usertrap_amd64.go:225] [ 718: 718] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 23:58:57.631183 754374 usertrap_amd64.go:212] [ 718: 718] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.631211 754374 usertrap_amd64.go:122] [ 718: 718] Allocate a new trap: 0xc00149fad0 5 D0712 23:58:57.631230 754374 usertrap_amd64.go:225] [ 718: 718] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 23:58:57.631301 754374 usertrap_amd64.go:212] [ 718: 718] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.631315 754374 usertrap_amd64.go:122] [ 718: 718] Allocate a new trap: 0xc00149fad0 6 D0712 23:58:57.631329 754374 usertrap_amd64.go:225] [ 718: 718] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 23:58:57.631924 754374 usertrap_amd64.go:212] [ 718: 718] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.631955 754374 usertrap_amd64.go:122] [ 718: 718] Allocate a new trap: 0xc00149fad0 7 D0712 23:58:57.631964 754374 usertrap_amd64.go:225] [ 718: 718] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 23:58:57.632126 754374 usertrap_amd64.go:212] [ 718: 719] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.632154 754374 usertrap_amd64.go:122] [ 718: 719] Allocate a new trap: 0xc00149fad0 8 D0712 23:58:57.632168 754374 usertrap_amd64.go:225] [ 718: 719] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 23:58:57.632325 754374 usertrap_amd64.go:212] [ 718: 718] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.632357 754374 usertrap_amd64.go:122] [ 718: 718] Allocate a new trap: 0xc00149fad0 9 D0712 23:58:57.632371 754374 usertrap_amd64.go:225] [ 718: 718] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 23:58:57.632385 754374 usertrap_amd64.go:212] [ 718: 719] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.632391 754374 usertrap_amd64.go:122] [ 718: 719] Allocate a new trap: 0xc00149fad0 10 D0712 23:58:57.632476 754374 usertrap_amd64.go:225] [ 718: 719] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 23:58:57.640504 754374 usertrap_amd64.go:212] [ 718: 718] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.640540 754374 usertrap_amd64.go:122] [ 718: 718] Allocate a new trap: 0xc00149fad0 11 D0712 23:58:57.640554 754374 usertrap_amd64.go:225] [ 718: 718] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 23:58:57.643001 754374 usertrap_amd64.go:212] [ 718: 719] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.643034 754374 usertrap_amd64.go:122] [ 718: 719] Allocate a new trap: 0xc00149fad0 12 D0712 23:58:57.643049 754374 usertrap_amd64.go:225] [ 718: 719] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 23:58:57.643178 754374 usertrap_amd64.go:212] [ 718: 719] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.643204 754374 usertrap_amd64.go:122] [ 718: 719] Allocate a new trap: 0xc00149fad0 13 D0712 23:58:57.643216 754374 usertrap_amd64.go:225] [ 718: 719] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 23:58:57.643262 754374 task_signals.go:470] [ 718: 718] Notified of signal 23 D0712 23:58:57.643365 754374 task_signals.go:220] [ 718: 718] Signal 23: delivering to handler D0712 23:58:57.650725 754374 usertrap_amd64.go:212] [ 718: 718] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.650756 754374 usertrap_amd64.go:122] [ 718: 718] Allocate a new trap: 0xc00149fad0 14 D0712 23:58:57.650771 754374 usertrap_amd64.go:225] [ 718: 718] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 23:58:57.650841 754374 task_exit.go:204] [ 718: 718] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.650885 754374 task_signals.go:204] [ 718: 722] Signal 718, PID: 722, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.650885 754374 task_signals.go:204] [ 718: 721] Signal 718, PID: 721, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.650889 754374 task_signals.go:204] [ 718: 719] Signal 718, PID: 719, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.650910 754374 task_exit.go:204] [ 718: 718] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.650963 754374 task_signals.go:204] [ 718: 720] Signal 718, PID: 720, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.650999 754374 task_exit.go:204] [ 718: 722] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.651013 754374 task_exit.go:204] [ 718: 722] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.651030 754374 task_exit.go:204] [ 718: 722] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.651050 754374 task_exit.go:204] [ 718: 721] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.651062 754374 task_exit.go:204] [ 718: 721] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.651068 754374 task_exit.go:204] [ 718: 721] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.651077 754374 task_exit.go:204] [ 718: 719] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.651085 754374 task_exit.go:204] [ 718: 719] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.651103 754374 task_exit.go:204] [ 718: 719] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.651112 754374 task_exit.go:204] [ 718: 720] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.652174 754374 task_exit.go:204] [ 718: 720] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.652205 754374 task_exit.go:204] [ 718: 720] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.652219 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.652278 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.652288 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.652474 754374 task_exit.go:204] [ 718: 718] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.652982 754374 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.654447 754374 syscalls.go:262] [ 723: 723] Allocating stack with size of 8388608 bytes D0712 23:58:57.654546 754374 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.655592 754374 usertrap_amd64.go:212] [ 723: 723] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.655641 754374 usertrap_amd64.go:106] [ 723: 723] Map a usertrap vma at 69000 D0712 23:58:57.655723 754374 usertrap_amd64.go:122] [ 723: 723] Allocate a new trap: 0xc000c83530 1 D0712 23:58:57.655760 754374 usertrap_amd64.go:225] [ 723: 723] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 23:58:57.656021 754374 usertrap_amd64.go:212] [ 723: 723] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.656047 754374 usertrap_amd64.go:122] [ 723: 723] Allocate a new trap: 0xc000c83530 2 D0712 23:58:57.656057 754374 usertrap_amd64.go:225] [ 723: 723] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 23:58:57.656783 754374 usertrap_amd64.go:212] [ 723: 723] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.656809 754374 usertrap_amd64.go:122] [ 723: 723] Allocate a new trap: 0xc000c83530 3 D0712 23:58:57.656819 754374 usertrap_amd64.go:225] [ 723: 723] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 23:58:57.661548 754374 usertrap_amd64.go:212] [ 723: 723] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.661578 754374 usertrap_amd64.go:122] [ 723: 723] Allocate a new trap: 0xc000c83530 4 D0712 23:58:57.661591 754374 usertrap_amd64.go:225] [ 723: 723] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 23:58:57.662724 754374 usertrap_amd64.go:212] [ 723: 723] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.662759 754374 usertrap_amd64.go:122] [ 723: 723] Allocate a new trap: 0xc000c83530 5 D0712 23:58:57.662770 754374 usertrap_amd64.go:225] [ 723: 723] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 23:58:57.662805 754374 usertrap_amd64.go:212] [ 723: 723] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.662811 754374 usertrap_amd64.go:122] [ 723: 723] Allocate a new trap: 0xc000c83530 6 D0712 23:58:57.662819 754374 usertrap_amd64.go:225] [ 723: 723] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 23:58:57.663027 754374 usertrap_amd64.go:212] [ 723: 723] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.663048 754374 usertrap_amd64.go:122] [ 723: 723] Allocate a new trap: 0xc000c83530 7 D0712 23:58:57.663056 754374 usertrap_amd64.go:225] [ 723: 723] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 23:58:57.663150 754374 usertrap_amd64.go:212] [ 723: 724] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.663175 754374 usertrap_amd64.go:122] [ 723: 724] Allocate a new trap: 0xc000c83530 8 D0712 23:58:57.663182 754374 usertrap_amd64.go:225] [ 723: 724] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 23:58:57.663319 754374 usertrap_amd64.go:212] [ 723: 724] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.663343 754374 usertrap_amd64.go:122] [ 723: 724] Allocate a new trap: 0xc000c83530 9 D0712 23:58:57.663359 754374 usertrap_amd64.go:225] [ 723: 724] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 23:58:57.663402 754374 usertrap_amd64.go:212] [ 723: 723] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.663430 754374 usertrap_amd64.go:122] [ 723: 723] Allocate a new trap: 0xc000c83530 10 D0712 23:58:57.663443 754374 usertrap_amd64.go:225] [ 723: 723] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 23:58:57.670644 754374 usertrap_amd64.go:212] [ 723: 723] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.670659 754374 usertrap_amd64.go:122] [ 723: 723] Allocate a new trap: 0xc000c83530 11 D0712 23:58:57.670671 754374 usertrap_amd64.go:225] [ 723: 723] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 23:58:57.674430 754374 usertrap_amd64.go:212] [ 723: 724] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.674446 754374 usertrap_amd64.go:122] [ 723: 724] Allocate a new trap: 0xc000c83530 12 D0712 23:58:57.674457 754374 usertrap_amd64.go:225] [ 723: 724] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 23:58:57.674469 754374 usertrap_amd64.go:212] [ 723: 724] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.674474 754374 usertrap_amd64.go:122] [ 723: 724] Allocate a new trap: 0xc000c83530 13 D0712 23:58:57.674481 754374 usertrap_amd64.go:225] [ 723: 724] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 23:58:57.674514 754374 task_signals.go:470] [ 723: 723] Notified of signal 23 D0712 23:58:57.674585 754374 task_signals.go:220] [ 723: 723] Signal 23: delivering to handler I0712 23:58:57.680503 754374 compat.go:120] Unsupported syscall sys_451(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_451 for more information. D0712 23:58:57.680576 754374 usertrap_amd64.go:212] [ 723: 723] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.680587 754374 usertrap_amd64.go:122] [ 723: 723] Allocate a new trap: 0xc000c83530 14 D0712 23:58:57.680597 754374 usertrap_amd64.go:225] [ 723: 723] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 23:58:57.680626 754374 task_exit.go:204] [ 723: 723] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.680656 754374 task_exit.go:204] [ 723: 723] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.680659 754374 task_signals.go:204] [ 723: 727] Signal 723, PID: 727, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.680681 754374 task_signals.go:204] [ 723: 728] Signal 723, PID: 728, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.680680 754374 task_signals.go:204] [ 723: 724] Signal 723, PID: 724, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.680685 754374 task_signals.go:204] [ 723: 725] Signal 723, PID: 725, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.680700 754374 task_exit.go:204] [ 723: 727] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.680712 754374 task_signals.go:204] [ 723: 726] Signal 723, PID: 726, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.680727 754374 task_exit.go:204] [ 723: 727] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.680740 754374 task_exit.go:204] [ 723: 727] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.680756 754374 task_exit.go:204] [ 723: 728] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.680775 754374 task_exit.go:204] [ 723: 728] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.680780 754374 task_exit.go:204] [ 723: 728] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.680790 754374 task_exit.go:204] [ 723: 726] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.680795 754374 task_exit.go:204] [ 723: 726] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.680810 754374 task_exit.go:204] [ 723: 726] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.680821 754374 task_exit.go:204] [ 723: 724] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.680847 754374 task_exit.go:204] [ 723: 724] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.680864 754374 task_exit.go:204] [ 723: 724] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.680880 754374 task_exit.go:204] [ 723: 725] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.681937 754374 task_exit.go:204] [ 723: 725] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.681972 754374 task_exit.go:204] [ 723: 725] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.681991 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.682017 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.682027 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.682186 754374 task_exit.go:204] [ 723: 723] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.682561 754374 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.683792 754374 syscalls.go:262] [ 729: 729] Allocating stack with size of 8388608 bytes D0712 23:58:57.683911 754374 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.685345 754374 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.685386 754374 usertrap_amd64.go:106] [ 729: 729] Map a usertrap vma at 60000 D0712 23:58:57.685586 754374 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc0005e52c0 1 D0712 23:58:57.685698 754374 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:58:57.686213 754374 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.686244 754374 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc0005e52c0 2 D0712 23:58:57.686275 754374 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:58:57.686894 754374 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.686908 754374 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc0005e52c0 3 D0712 23:58:57.686917 754374 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:58:57.695182 754374 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.695217 754374 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc0005e52c0 4 D0712 23:58:57.695230 754374 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:58:57.696214 754374 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.696234 754374 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc0005e52c0 5 D0712 23:58:57.696242 754374 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:58:57.696322 754374 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.696337 754374 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc0005e52c0 6 D0712 23:58:57.696346 754374 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:58:57.696502 754374 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.696518 754374 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc0005e52c0 7 D0712 23:58:57.696524 754374 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:58:57.696633 754374 usertrap_amd64.go:212] [ 729: 730] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.696644 754374 usertrap_amd64.go:122] [ 729: 730] Allocate a new trap: 0xc0005e52c0 8 D0712 23:58:57.696650 754374 usertrap_amd64.go:225] [ 729: 730] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:58:57.696914 754374 usertrap_amd64.go:212] [ 729: 730] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.696923 754374 usertrap_amd64.go:122] [ 729: 730] Allocate a new trap: 0xc0005e52c0 9 D0712 23:58:57.696929 754374 usertrap_amd64.go:225] [ 729: 730] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:58:57.696981 754374 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.696990 754374 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc0005e52c0 10 D0712 23:58:57.696996 754374 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:58:57.703753 754374 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.703779 754374 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc0005e52c0 11 D0712 23:58:57.703791 754374 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:58:57.707700 754374 usertrap_amd64.go:212] [ 729: 730] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.707758 754374 usertrap_amd64.go:122] [ 729: 730] Allocate a new trap: 0xc0005e52c0 12 D0712 23:58:57.707776 754374 usertrap_amd64.go:225] [ 729: 730] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:58:57.707853 754374 usertrap_amd64.go:212] [ 729: 730] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.707862 754374 usertrap_amd64.go:122] [ 729: 730] Allocate a new trap: 0xc0005e52c0 13 D0712 23:58:57.707869 754374 usertrap_amd64.go:225] [ 729: 730] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:58:57.707894 754374 task_signals.go:470] [ 729: 729] Notified of signal 23 D0712 23:58:57.707963 754374 task_signals.go:220] [ 729: 729] Signal 23: delivering to handler D0712 23:58:57.717266 754374 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.717319 754374 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc0005e52c0 14 D0712 23:58:57.717336 754374 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:58:57.717397 754374 task_exit.go:204] [ 729: 729] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.717438 754374 task_exit.go:204] [ 729: 729] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.717469 754374 task_signals.go:204] [ 729: 732] Signal 729, PID: 732, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.717492 754374 task_exit.go:204] [ 729: 732] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.717500 754374 task_exit.go:204] [ 729: 732] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.717467 754374 task_signals.go:204] [ 729: 731] Signal 729, PID: 731, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.717492 754374 task_signals.go:204] [ 729: 730] Signal 729, PID: 730, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.717506 754374 task_exit.go:204] [ 729: 732] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.717532 754374 task_signals.go:204] [ 729: 733] Signal 729, PID: 733, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.717549 754374 task_exit.go:204] [ 729: 733] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.717562 754374 task_exit.go:204] [ 729: 733] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.717597 754374 task_exit.go:204] [ 729: 733] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.717609 754374 task_exit.go:204] [ 729: 731] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.717615 754374 task_exit.go:204] [ 729: 731] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.717618 754374 task_exit.go:204] [ 729: 731] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.717626 754374 task_exit.go:204] [ 729: 730] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.718832 754374 task_exit.go:204] [ 729: 730] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.718920 754374 task_exit.go:204] [ 729: 730] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.718937 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.718971 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.719007 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.719044 754374 task_exit.go:204] [ 729: 729] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.719737 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.720987 754374 syscalls.go:262] [ 734: 734] Allocating stack with size of 8388608 bytes D0712 23:58:57.721144 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.724638 754374 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.724691 754374 usertrap_amd64.go:106] [ 734: 734] Map a usertrap vma at 63000 D0712 23:58:57.724771 754374 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000ee1320 1 D0712 23:58:57.724799 754374 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:58:57.725279 754374 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.725314 754374 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000ee1320 2 D0712 23:58:57.725331 754374 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:58:57.726382 754374 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.726409 754374 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000ee1320 3 D0712 23:58:57.726424 754374 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:58:57.732824 754374 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.732857 754374 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000ee1320 4 D0712 23:58:57.732868 754374 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:58:57.733864 754374 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.733890 754374 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000ee1320 5 D0712 23:58:57.733898 754374 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:58:57.733947 754374 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.733963 754374 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000ee1320 6 D0712 23:58:57.733968 754374 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:58:57.734111 754374 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.734122 754374 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000ee1320 7 D0712 23:58:57.734127 754374 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:58:57.734311 754374 usertrap_amd64.go:212] [ 734: 735] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.734342 754374 usertrap_amd64.go:122] [ 734: 735] Allocate a new trap: 0xc000ee1320 8 D0712 23:58:57.734357 754374 usertrap_amd64.go:225] [ 734: 735] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:58:57.734471 754374 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.734485 754374 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000ee1320 9 D0712 23:58:57.734491 754374 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:58:57.734518 754374 usertrap_amd64.go:212] [ 734: 735] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.734530 754374 usertrap_amd64.go:122] [ 734: 735] Allocate a new trap: 0xc000ee1320 10 D0712 23:58:57.734537 754374 usertrap_amd64.go:225] [ 734: 735] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:58:57.741400 754374 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.741428 754374 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000ee1320 11 D0712 23:58:57.741437 754374 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:58:57.745151 754374 usertrap_amd64.go:212] [ 734: 735] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.745182 754374 usertrap_amd64.go:122] [ 734: 735] Allocate a new trap: 0xc000ee1320 12 D0712 23:58:57.745196 754374 usertrap_amd64.go:225] [ 734: 735] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:58:57.745253 754374 usertrap_amd64.go:212] [ 734: 735] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.745272 754374 usertrap_amd64.go:122] [ 734: 735] Allocate a new trap: 0xc000ee1320 13 D0712 23:58:57.745284 754374 usertrap_amd64.go:225] [ 734: 735] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:58:57.745356 754374 task_signals.go:470] [ 734: 734] Notified of signal 23 D0712 23:58:57.745469 754374 task_signals.go:220] [ 734: 734] Signal 23: delivering to handler I0712 23:58:57.751895 754374 compat.go:120] Unsupported syscall membarrier(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/membarrier for more information. D0712 23:58:57.751971 754374 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.751980 754374 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000ee1320 14 D0712 23:58:57.751987 754374 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:58:57.752018 754374 task_exit.go:204] [ 734: 734] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.752051 754374 task_exit.go:204] [ 734: 734] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.752054 754374 task_signals.go:204] [ 734: 737] Signal 734, PID: 737, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.752067 754374 task_signals.go:204] [ 734: 738] Signal 734, PID: 738, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.752075 754374 task_exit.go:204] [ 734: 737] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.752088 754374 task_signals.go:204] [ 734: 736] Signal 734, PID: 736, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.752101 754374 task_signals.go:204] [ 734: 735] Signal 734, PID: 735, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.752121 754374 task_exit.go:204] [ 734: 737] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.752125 754374 task_exit.go:204] [ 734: 737] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.752138 754374 task_exit.go:204] [ 734: 738] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.752160 754374 task_exit.go:204] [ 734: 738] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.752169 754374 task_exit.go:204] [ 734: 738] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.752182 754374 task_exit.go:204] [ 734: 736] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.752206 754374 task_exit.go:204] [ 734: 736] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.752213 754374 task_exit.go:204] [ 734: 736] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.752221 754374 task_exit.go:204] [ 734: 735] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.753558 754374 task_exit.go:204] [ 734: 735] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.753582 754374 task_exit.go:204] [ 734: 735] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.753597 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.753646 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.753662 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.753795 754374 task_exit.go:204] [ 734: 734] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.754312 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.755165 754374 task_signals.go:481] [ 5: 25] No task notified of signal 23 D0712 23:58:57.755700 754374 syscalls.go:262] [ 739: 739] Allocating stack with size of 8388608 bytes D0712 23:58:57.755811 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.755984 754374 task_signals.go:220] [ 5: 25] Signal 23: delivering to handler D0712 23:58:57.757112 754374 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.757144 754374 usertrap_amd64.go:106] [ 739: 739] Map a usertrap vma at 61000 D0712 23:58:57.757264 754374 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc000c83e30 1 D0712 23:58:57.757295 754374 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 23:58:57.757742 754374 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.757759 754374 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc000c83e30 2 D0712 23:58:57.757778 754374 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 23:58:57.758564 754374 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.758619 754374 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc000c83e30 3 D0712 23:58:57.758636 754374 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 23:58:57.765419 754374 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.765469 754374 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc000c83e30 4 D0712 23:58:57.765487 754374 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 23:58:57.766581 754374 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.766624 754374 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc000c83e30 5 D0712 23:58:57.766637 754374 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 23:58:57.766712 754374 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.766730 754374 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc000c83e30 6 D0712 23:58:57.766736 754374 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 23:58:57.767042 754374 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.767064 754374 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc000c83e30 7 D0712 23:58:57.767071 754374 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 23:58:57.767249 754374 usertrap_amd64.go:212] [ 739: 740] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.767263 754374 usertrap_amd64.go:122] [ 739: 740] Allocate a new trap: 0xc000c83e30 8 D0712 23:58:57.767272 754374 usertrap_amd64.go:225] [ 739: 740] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 23:58:57.767432 754374 usertrap_amd64.go:212] [ 739: 740] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.767465 754374 usertrap_amd64.go:122] [ 739: 740] Allocate a new trap: 0xc000c83e30 9 D0712 23:58:57.767476 754374 usertrap_amd64.go:225] [ 739: 740] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 23:58:57.767485 754374 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.767491 754374 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc000c83e30 10 D0712 23:58:57.767500 754374 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 23:58:57.767627 754374 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:57.767734 754374 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc000c83e30 11 D0712 23:58:57.767762 754374 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b6e0 trap addr 61370 ([184 24 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 23:58:57.775110 754374 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.775140 754374 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc000c83e30 12 D0712 23:58:57.775154 754374 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 23:58:57.777885 754374 usertrap_amd64.go:212] [ 739: 740] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.777909 754374 usertrap_amd64.go:122] [ 739: 740] Allocate a new trap: 0xc000c83e30 13 D0712 23:58:57.777919 754374 usertrap_amd64.go:225] [ 739: 740] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 23:58:57.777973 754374 usertrap_amd64.go:212] [ 739: 740] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.777990 754374 usertrap_amd64.go:122] [ 739: 740] Allocate a new trap: 0xc000c83e30 14 D0712 23:58:57.778001 754374 usertrap_amd64.go:225] [ 739: 740] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 23:58:57.778055 754374 task_signals.go:470] [ 739: 739] Notified of signal 23 D0712 23:58:57.778100 754374 task_signals.go:220] [ 739: 739] Signal 23: delivering to handler D0712 23:58:57.785943 754374 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.785994 754374 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc000c83e30 15 D0712 23:58:57.786009 754374 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0712 23:58:57.786079 754374 task_exit.go:204] [ 739: 739] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.786112 754374 task_exit.go:204] [ 739: 739] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.786115 754374 task_signals.go:204] [ 739: 741] Signal 739, PID: 741, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.786134 754374 task_signals.go:204] [ 739: 742] Signal 739, PID: 742, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.786137 754374 task_exit.go:204] [ 739: 741] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.786145 754374 task_exit.go:204] [ 739: 742] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.786159 754374 task_exit.go:204] [ 739: 742] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.786174 754374 task_exit.go:204] [ 739: 742] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.786196 754374 task_signals.go:204] [ 739: 743] Signal 739, PID: 743, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.786218 754374 task_signals.go:204] [ 739: 740] Signal 739, PID: 740, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.786229 754374 task_exit.go:204] [ 739: 741] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.786236 754374 task_exit.go:204] [ 739: 741] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.786247 754374 task_exit.go:204] [ 739: 743] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.786263 754374 task_exit.go:204] [ 739: 743] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.786269 754374 task_exit.go:204] [ 739: 743] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.786279 754374 task_exit.go:204] [ 739: 740] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.787431 754374 task_exit.go:204] [ 739: 740] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.787462 754374 task_exit.go:204] [ 739: 740] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.787481 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.787536 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.787563 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.787637 754374 task_exit.go:204] [ 739: 739] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.788434 754374 task_stop.go:118] [ 5: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.789966 754374 syscalls.go:262] [ 744: 744] Allocating stack with size of 8388608 bytes D0712 23:58:57.790170 754374 task_stop.go:138] [ 5: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.791036 754374 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.791071 754374 usertrap_amd64.go:106] [ 744: 744] Map a usertrap vma at 65000 D0712 23:58:57.791165 754374 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc000786ff0 1 D0712 23:58:57.791187 754374 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 23:58:57.791450 754374 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.791467 754374 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc000786ff0 2 D0712 23:58:57.791473 754374 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 23:58:57.792011 754374 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.792040 754374 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc000786ff0 3 D0712 23:58:57.792052 754374 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 23:58:57.798169 754374 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.798196 754374 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc000786ff0 4 D0712 23:58:57.798209 754374 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 23:58:57.799147 754374 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.799167 754374 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc000786ff0 5 D0712 23:58:57.799182 754374 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 23:58:57.799238 754374 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.799254 754374 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc000786ff0 6 D0712 23:58:57.799262 754374 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 23:58:57.799459 754374 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.799476 754374 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc000786ff0 7 D0712 23:58:57.799485 754374 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 23:58:57.799623 754374 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.799688 754374 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc000786ff0 8 D0712 23:58:57.799711 754374 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 23:58:57.799908 754374 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.799935 754374 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc000786ff0 9 D0712 23:58:57.799945 754374 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 23:58:57.800116 754374 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.800139 754374 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc000786ff0 10 D0712 23:58:57.800149 754374 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 23:58:57.808574 754374 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.808612 754374 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc000786ff0 11 D0712 23:58:57.808624 754374 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 23:58:57.811693 754374 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.811776 754374 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc000786ff0 12 D0712 23:58:57.811804 754374 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 23:58:57.811897 754374 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.811918 754374 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc000786ff0 13 D0712 23:58:57.811926 754374 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 23:58:57.811987 754374 task_signals.go:470] [ 744: 744] Notified of signal 23 D0712 23:58:57.812088 754374 task_signals.go:220] [ 744: 744] Signal 23: delivering to handler I0712 23:58:57.820430 754374 compat.go:120] Unsupported syscall sys_447(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_447 for more information. D0712 23:58:57.820574 754374 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.820597 754374 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc000786ff0 14 D0712 23:58:57.820611 754374 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 23:58:57.820697 754374 task_exit.go:204] [ 744: 744] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.820723 754374 task_exit.go:204] [ 744: 744] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.820749 754374 task_signals.go:204] [ 744: 747] Signal 744, PID: 747, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.820774 754374 task_exit.go:204] [ 744: 747] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.820783 754374 task_exit.go:204] [ 744: 747] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.820790 754374 task_exit.go:204] [ 744: 747] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.820806 754374 task_signals.go:204] [ 744: 745] Signal 744, PID: 745, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.820791 754374 task_signals.go:204] [ 744: 746] Signal 744, PID: 746, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.820844 754374 task_exit.go:204] [ 744: 745] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.820914 754374 task_signals.go:204] [ 744: 748] Signal 744, PID: 748, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.820976 754374 task_exit.go:204] [ 744: 745] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.820987 754374 task_exit.go:204] [ 744: 745] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.821011 754374 task_exit.go:204] [ 744: 746] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.821029 754374 task_exit.go:204] [ 744: 746] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.821034 754374 task_exit.go:204] [ 744: 746] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.821053 754374 task_exit.go:204] [ 744: 748] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.822409 754374 task_exit.go:204] [ 744: 748] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.822470 754374 task_exit.go:204] [ 744: 748] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.822492 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.822536 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.822561 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.822639 754374 task_exit.go:204] [ 744: 744] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.823272 754374 task_stop.go:118] [ 5: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.824580 754374 syscalls.go:262] [ 749: 749] Allocating stack with size of 8388608 bytes D0712 23:58:57.824688 754374 task_stop.go:138] [ 5: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.826839 754374 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.826924 754374 usertrap_amd64.go:106] [ 749: 749] Map a usertrap vma at 6a000 D0712 23:58:57.827045 754374 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc0005e5c80 1 D0712 23:58:57.827070 754374 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 23:58:57.827429 754374 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.827455 754374 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc0005e5c80 2 D0712 23:58:57.827466 754374 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 23:58:57.827891 754374 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.827912 754374 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc0005e5c80 3 D0712 23:58:57.827919 754374 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 23:58:57.833881 754374 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.833919 754374 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc0005e5c80 4 D0712 23:58:57.833930 754374 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 23:58:57.834863 754374 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.834892 754374 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc0005e5c80 5 D0712 23:58:57.834901 754374 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 23:58:57.834950 754374 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.834955 754374 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc0005e5c80 6 D0712 23:58:57.834960 754374 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 23:58:57.835364 754374 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.835385 754374 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc0005e5c80 7 D0712 23:58:57.835398 754374 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 23:58:57.835538 754374 usertrap_amd64.go:212] [ 749: 750] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.835561 754374 usertrap_amd64.go:122] [ 749: 750] Allocate a new trap: 0xc0005e5c80 8 D0712 23:58:57.835574 754374 usertrap_amd64.go:225] [ 749: 750] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 23:58:57.835720 754374 usertrap_amd64.go:212] [ 749: 750] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.835742 754374 usertrap_amd64.go:122] [ 749: 750] Allocate a new trap: 0xc0005e5c80 9 D0712 23:58:57.835751 754374 usertrap_amd64.go:225] [ 749: 750] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 23:58:57.835814 754374 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.835826 754374 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc0005e5c80 10 D0712 23:58:57.835837 754374 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 23:58:57.842753 754374 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.842781 754374 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc0005e5c80 11 D0712 23:58:57.842792 754374 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 23:58:57.846875 754374 usertrap_amd64.go:212] [ 749: 750] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.846914 754374 usertrap_amd64.go:122] [ 749: 750] Allocate a new trap: 0xc0005e5c80 12 D0712 23:58:57.846927 754374 usertrap_amd64.go:225] [ 749: 750] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 23:58:57.847031 754374 usertrap_amd64.go:212] [ 749: 750] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.847058 754374 usertrap_amd64.go:122] [ 749: 750] Allocate a new trap: 0xc0005e5c80 13 D0712 23:58:57.847069 754374 usertrap_amd64.go:225] [ 749: 750] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 23:58:57.847124 754374 task_signals.go:470] [ 749: 749] Notified of signal 23 D0712 23:58:57.847190 754374 task_signals.go:220] [ 749: 749] Signal 23: delivering to handler I0712 23:58:57.852871 754374 compat.go:120] Unsupported syscall migrate_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/migrate_pages for more information. D0712 23:58:57.853011 754374 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.853039 754374 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc0005e5c80 14 D0712 23:58:57.853051 754374 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 23:58:57.853122 754374 task_exit.go:204] [ 749: 749] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.853150 754374 task_exit.go:204] [ 749: 749] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.853166 754374 task_signals.go:204] [ 749: 751] Signal 749, PID: 751, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.853190 754374 task_signals.go:204] [ 749: 750] Signal 749, PID: 750, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.853198 754374 task_exit.go:204] [ 749: 751] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.853223 754374 task_exit.go:204] [ 749: 751] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.853239 754374 task_exit.go:204] [ 749: 751] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.853174 754374 task_signals.go:204] [ 749: 752] Signal 749, PID: 752, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.853257 754374 task_exit.go:204] [ 749: 752] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.853266 754374 task_exit.go:204] [ 749: 752] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.853283 754374 task_exit.go:204] [ 749: 752] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.853204 754374 task_signals.go:204] [ 749: 753] Signal 749, PID: 753, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.853296 754374 task_exit.go:204] [ 749: 753] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.853304 754374 task_exit.go:204] [ 749: 753] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.853315 754374 task_exit.go:204] [ 749: 753] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.853325 754374 task_exit.go:204] [ 749: 750] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.854371 754374 task_exit.go:204] [ 749: 750] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.854394 754374 task_exit.go:204] [ 749: 750] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.854407 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.854441 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.854562 754374 task_exit.go:204] [ 749: 749] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.855440 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.856769 754374 syscalls.go:262] [ 754: 754] Allocating stack with size of 8388608 bytes D0712 23:58:57.856903 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.858462 754374 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.858495 754374 usertrap_amd64.go:106] [ 754: 754] Map a usertrap vma at 66000 D0712 23:58:57.858569 754374 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc0007870e0 1 D0712 23:58:57.858599 754374 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:57.858875 754374 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.858895 754374 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc0007870e0 2 D0712 23:58:57.858904 754374 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:57.859453 754374 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.859480 754374 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc0007870e0 3 D0712 23:58:57.859488 754374 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:57.865250 754374 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.865288 754374 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc0007870e0 4 D0712 23:58:57.865305 754374 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:57.866465 754374 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.866496 754374 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc0007870e0 5 D0712 23:58:57.866509 754374 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:57.866547 754374 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.866554 754374 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc0007870e0 6 D0712 23:58:57.866561 754374 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:57.866761 754374 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.866781 754374 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc0007870e0 7 D0712 23:58:57.866790 754374 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:57.866922 754374 usertrap_amd64.go:212] [ 754: 755] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.866938 754374 usertrap_amd64.go:122] [ 754: 755] Allocate a new trap: 0xc0007870e0 8 D0712 23:58:57.866944 754374 usertrap_amd64.go:225] [ 754: 755] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:57.867100 754374 usertrap_amd64.go:212] [ 754: 755] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.867119 754374 usertrap_amd64.go:122] [ 754: 755] Allocate a new trap: 0xc0007870e0 9 D0712 23:58:57.867130 754374 usertrap_amd64.go:225] [ 754: 755] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:57.867240 754374 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.867271 754374 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc0007870e0 10 D0712 23:58:57.867282 754374 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:57.873754 754374 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.873783 754374 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc0007870e0 11 D0712 23:58:57.873795 754374 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:57.877756 754374 usertrap_amd64.go:212] [ 754: 755] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.877785 754374 usertrap_amd64.go:122] [ 754: 755] Allocate a new trap: 0xc0007870e0 12 D0712 23:58:57.877797 754374 usertrap_amd64.go:225] [ 754: 755] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:57.877949 754374 usertrap_amd64.go:212] [ 754: 755] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.877987 754374 usertrap_amd64.go:122] [ 754: 755] Allocate a new trap: 0xc0007870e0 13 D0712 23:58:57.878001 754374 usertrap_amd64.go:225] [ 754: 755] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:57.878095 754374 task_signals.go:470] [ 754: 754] Notified of signal 23 D0712 23:58:57.878236 754374 task_signals.go:220] [ 754: 754] Signal 23: delivering to handler D0712 23:58:57.884257 754374 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.884286 754374 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc0007870e0 14 D0712 23:58:57.884298 754374 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:57.884341 754374 task_exit.go:204] [ 754: 754] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.884361 754374 task_exit.go:204] [ 754: 754] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.884387 754374 task_signals.go:204] [ 754: 757] Signal 754, PID: 757, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.884406 754374 task_exit.go:204] [ 754: 757] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.884410 754374 task_exit.go:204] [ 754: 757] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.884414 754374 task_exit.go:204] [ 754: 757] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.884409 754374 task_signals.go:204] [ 754: 755] Signal 754, PID: 755, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.884425 754374 task_signals.go:204] [ 754: 758] Signal 754, PID: 758, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.884433 754374 task_exit.go:204] [ 754: 755] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.884449 754374 task_exit.go:204] [ 754: 755] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.884465 754374 task_exit.go:204] [ 754: 755] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.884403 754374 task_signals.go:204] [ 754: 756] Signal 754, PID: 756, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.884483 754374 task_exit.go:204] [ 754: 756] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.884500 754374 task_signals.go:204] [ 754: 759] Signal 754, PID: 759, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.884516 754374 task_exit.go:204] [ 754: 756] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.884527 754374 task_exit.go:204] [ 754: 756] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.884537 754374 task_exit.go:204] [ 754: 758] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.884542 754374 task_exit.go:204] [ 754: 758] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.884545 754374 task_exit.go:204] [ 754: 758] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.884551 754374 task_exit.go:204] [ 754: 759] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.885941 754374 task_exit.go:204] [ 754: 759] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.885965 754374 task_exit.go:204] [ 754: 759] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.885974 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.886018 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:58:57.886031 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.886185 754374 task_exit.go:204] [ 754: 754] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.886764 754374 task_stop.go:118] [ 5: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.888152 754374 syscalls.go:262] [ 760: 760] Allocating stack with size of 8388608 bytes D0712 23:58:57.888330 754374 task_stop.go:138] [ 5: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.889407 754374 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.889441 754374 usertrap_amd64.go:106] [ 760: 760] Map a usertrap vma at 69000 D0712 23:58:57.889531 754374 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc0002feb40 1 D0712 23:58:57.889551 754374 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 23:58:57.889798 754374 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.889823 754374 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc0002feb40 2 D0712 23:58:57.889833 754374 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 23:58:57.890735 754374 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.890755 754374 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc0002feb40 3 D0712 23:58:57.890765 754374 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 23:58:57.896128 754374 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.896161 754374 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc0002feb40 4 D0712 23:58:57.896171 754374 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 23:58:57.897181 754374 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.897205 754374 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc0002feb40 5 D0712 23:58:57.897217 754374 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 23:58:57.897318 754374 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.897340 754374 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc0002feb40 6 D0712 23:58:57.897347 754374 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 23:58:57.897555 754374 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.897570 754374 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc0002feb40 7 D0712 23:58:57.897576 754374 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 23:58:57.897684 754374 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.897721 754374 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc0002feb40 8 D0712 23:58:57.897727 754374 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 23:58:57.897875 754374 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.897895 754374 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc0002feb40 9 D0712 23:58:57.897902 754374 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 23:58:57.897966 754374 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.897991 754374 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc0002feb40 10 D0712 23:58:57.898003 754374 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 23:58:57.898167 754374 usertrap_amd64.go:212] [ 760: 763] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:57.898189 754374 usertrap_amd64.go:122] [ 760: 763] Allocate a new trap: 0xc0002feb40 11 D0712 23:58:57.898200 754374 usertrap_amd64.go:225] [ 760: 763] Apply the binary patch addr 46b6e0 trap addr 69370 ([184 24 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 23:58:57.905342 754374 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.905364 754374 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc0002feb40 12 D0712 23:58:57.905372 754374 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46af29 trap addr 693c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 23:58:57.908839 754374 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.908865 754374 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc0002feb40 13 D0712 23:58:57.908874 754374 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46b020 trap addr 69410 ([184 39 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 23:58:57.909050 754374 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.909069 754374 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc0002feb40 14 D0712 23:58:57.909081 754374 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46b04f trap addr 69460 ([184 234 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 23:58:57.909130 754374 task_signals.go:470] [ 760: 760] Notified of signal 23 D0712 23:58:57.909204 754374 task_signals.go:220] [ 760: 760] Signal 23: delivering to handler D0712 23:58:57.914812 754374 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.914864 754374 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc0002feb40 15 D0712 23:58:57.914885 754374 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0712 23:58:57.914945 754374 task_exit.go:204] [ 760: 760] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.915030 754374 task_signals.go:204] [ 760: 763] Signal 760, PID: 763, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.915061 754374 task_exit.go:204] [ 760: 760] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.915084 754374 task_signals.go:204] [ 760: 762] Signal 760, PID: 762, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.915102 754374 task_signals.go:204] [ 760: 761] Signal 760, PID: 761, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.915114 754374 task_signals.go:204] [ 760: 765] Signal 760, PID: 765, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.915123 754374 task_exit.go:204] [ 760: 762] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.915177 754374 task_signals.go:204] [ 760: 764] Signal 760, PID: 764, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.915205 754374 task_exit.go:204] [ 760: 762] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.915213 754374 task_exit.go:204] [ 760: 762] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.915228 754374 task_exit.go:204] [ 760: 763] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.915253 754374 task_exit.go:204] [ 760: 763] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.915260 754374 task_exit.go:204] [ 760: 763] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.915271 754374 task_exit.go:204] [ 760: 761] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.915505 754374 task_exit.go:204] [ 760: 761] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.915513 754374 task_exit.go:204] [ 760: 761] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.915527 754374 task_exit.go:204] [ 760: 765] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.915547 754374 task_exit.go:204] [ 760: 765] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.915565 754374 task_exit.go:204] [ 760: 765] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.915575 754374 task_exit.go:204] [ 760: 764] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.916649 754374 task_exit.go:204] [ 760: 764] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.916670 754374 task_exit.go:204] [ 760: 764] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.916681 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.916705 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.916712 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.916860 754374 task_exit.go:204] [ 760: 760] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.916969 754374 task_signals.go:470] [ 5: 10] Notified of signal 23 D0712 23:58:57.917015 754374 task_signals.go:220] [ 5: 10] Signal 23: delivering to handler D0712 23:58:57.917505 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.918867 754374 syscalls.go:262] [ 766: 766] Allocating stack with size of 8388608 bytes D0712 23:58:57.918998 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.919885 754374 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.919920 754374 usertrap_amd64.go:106] [ 766: 766] Map a usertrap vma at 62000 D0712 23:58:57.920005 754374 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc000e7e210 1 D0712 23:58:57.920025 754374 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:58:57.920325 754374 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.920421 754374 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc000e7e210 2 D0712 23:58:57.920445 754374 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:58:57.921084 754374 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.921124 754374 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc000e7e210 3 D0712 23:58:57.921135 754374 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:58:57.926203 754374 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.926218 754374 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc000e7e210 4 D0712 23:58:57.926226 754374 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:58:57.927306 754374 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.927330 754374 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc000e7e210 5 D0712 23:58:57.927337 754374 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:58:57.927399 754374 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.927404 754374 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc000e7e210 6 D0712 23:58:57.927409 754374 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:58:57.927626 754374 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.927633 754374 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc000e7e210 7 D0712 23:58:57.927637 754374 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:58:57.927759 754374 usertrap_amd64.go:212] [ 766: 767] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.927768 754374 usertrap_amd64.go:122] [ 766: 767] Allocate a new trap: 0xc000e7e210 8 D0712 23:58:57.927777 754374 usertrap_amd64.go:225] [ 766: 767] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:58:57.928116 754374 usertrap_amd64.go:212] [ 766: 767] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.928129 754374 usertrap_amd64.go:122] [ 766: 767] Allocate a new trap: 0xc000e7e210 9 D0712 23:58:57.928144 754374 usertrap_amd64.go:225] [ 766: 767] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:58:57.928188 754374 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.928212 754374 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc000e7e210 10 D0712 23:58:57.928225 754374 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:58:57.928484 754374 usertrap_amd64.go:212] [ 766: 769] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:57.928497 754374 usertrap_amd64.go:122] [ 766: 769] Allocate a new trap: 0xc000e7e210 11 D0712 23:58:57.928505 754374 usertrap_amd64.go:225] [ 766: 769] Apply the binary patch addr 46b6e0 trap addr 62370 ([184 24 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:58:57.928875 754374 usertrap_amd64.go:212] [ 766: 767] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.928888 754374 usertrap_amd64.go:122] [ 766: 767] Allocate a new trap: 0xc000e7e210 12 D0712 23:58:57.928901 754374 usertrap_amd64.go:225] [ 766: 767] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:58:57.928996 754374 usertrap_amd64.go:212] [ 766: 767] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.929044 754374 usertrap_amd64.go:122] [ 766: 767] Allocate a new trap: 0xc000e7e210 13 D0712 23:58:57.929060 754374 usertrap_amd64.go:225] [ 766: 767] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:58:57.929083 754374 task_signals.go:470] [ 766: 766] Notified of signal 23 D0712 23:58:57.929119 754374 task_signals.go:220] [ 766: 766] Signal 23: delivering to handler D0712 23:58:57.935047 754374 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.935064 754374 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc000e7e210 14 D0712 23:58:57.935075 754374 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46af29 trap addr 62460 ([184 37 1 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:58:57.940227 754374 task_signals.go:470] [ 766: 766] Notified of signal 23 D0712 23:58:57.940874 754374 task_signals.go:220] [ 766: 766] Signal 23: delivering to handler D0712 23:58:57.944621 754374 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.944655 754374 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc000e7e210 15 D0712 23:58:57.944666 754374 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0712 23:58:57.944723 754374 task_exit.go:204] [ 766: 766] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.944787 754374 task_exit.go:204] [ 766: 766] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.944807 754374 task_signals.go:204] [ 766: 768] Signal 766, PID: 768, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.944801 754374 task_signals.go:204] [ 766: 770] Signal 766, PID: 770, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.944822 754374 task_signals.go:204] [ 766: 767] Signal 766, PID: 767, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.944831 754374 task_exit.go:204] [ 766: 768] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.944853 754374 task_signals.go:204] [ 766: 769] Signal 766, PID: 769, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.944876 754374 task_exit.go:204] [ 766: 768] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.944891 754374 task_exit.go:204] [ 766: 768] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.944907 754374 task_exit.go:204] [ 766: 767] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.944931 754374 task_exit.go:204] [ 766: 767] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.944935 754374 task_exit.go:204] [ 766: 767] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.944965 754374 task_exit.go:204] [ 766: 770] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.944999 754374 task_exit.go:204] [ 766: 770] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.945008 754374 task_exit.go:204] [ 766: 770] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.945019 754374 task_exit.go:204] [ 766: 769] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.945968 754374 task_exit.go:204] [ 766: 769] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.945988 754374 task_exit.go:204] [ 766: 769] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.945999 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.946049 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.946056 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.946145 754374 task_exit.go:204] [ 766: 766] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.946854 754374 task_stop.go:118] [ 5: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.948571 754374 syscalls.go:262] [ 771: 771] Allocating stack with size of 8388608 bytes D0712 23:58:57.948744 754374 task_stop.go:138] [ 5: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.949564 754374 usertrap_amd64.go:212] [ 771: 771] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.949599 754374 usertrap_amd64.go:106] [ 771: 771] Map a usertrap vma at 63000 D0712 23:58:57.949673 754374 usertrap_amd64.go:122] [ 771: 771] Allocate a new trap: 0xc0019f40f0 1 D0712 23:58:57.949703 754374 usertrap_amd64.go:225] [ 771: 771] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:58:57.950131 754374 usertrap_amd64.go:212] [ 771: 771] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.950156 754374 usertrap_amd64.go:122] [ 771: 771] Allocate a new trap: 0xc0019f40f0 2 D0712 23:58:57.950168 754374 usertrap_amd64.go:225] [ 771: 771] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:58:57.950734 754374 usertrap_amd64.go:212] [ 771: 771] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.950755 754374 usertrap_amd64.go:122] [ 771: 771] Allocate a new trap: 0xc0019f40f0 3 D0712 23:58:57.950762 754374 usertrap_amd64.go:225] [ 771: 771] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:58:57.956000 754374 usertrap_amd64.go:212] [ 771: 771] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.956025 754374 usertrap_amd64.go:122] [ 771: 771] Allocate a new trap: 0xc0019f40f0 4 D0712 23:58:57.956038 754374 usertrap_amd64.go:225] [ 771: 771] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:58:57.957107 754374 usertrap_amd64.go:212] [ 771: 771] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.957172 754374 usertrap_amd64.go:122] [ 771: 771] Allocate a new trap: 0xc0019f40f0 5 D0712 23:58:57.957190 754374 usertrap_amd64.go:225] [ 771: 771] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:58:57.957260 754374 usertrap_amd64.go:212] [ 771: 771] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.957277 754374 usertrap_amd64.go:122] [ 771: 771] Allocate a new trap: 0xc0019f40f0 6 D0712 23:58:57.957283 754374 usertrap_amd64.go:225] [ 771: 771] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:58:57.957572 754374 usertrap_amd64.go:212] [ 771: 771] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.957591 754374 usertrap_amd64.go:122] [ 771: 771] Allocate a new trap: 0xc0019f40f0 7 D0712 23:58:57.957597 754374 usertrap_amd64.go:225] [ 771: 771] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:58:57.957766 754374 usertrap_amd64.go:212] [ 771: 772] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.957794 754374 usertrap_amd64.go:122] [ 771: 772] Allocate a new trap: 0xc0019f40f0 8 D0712 23:58:57.957807 754374 usertrap_amd64.go:225] [ 771: 772] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:58:57.957984 754374 usertrap_amd64.go:212] [ 771: 772] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.958011 754374 usertrap_amd64.go:122] [ 771: 772] Allocate a new trap: 0xc0019f40f0 9 D0712 23:58:57.958022 754374 usertrap_amd64.go:225] [ 771: 772] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:58:57.958210 754374 usertrap_amd64.go:212] [ 771: 771] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.958235 754374 usertrap_amd64.go:122] [ 771: 771] Allocate a new trap: 0xc0019f40f0 10 D0712 23:58:57.958245 754374 usertrap_amd64.go:225] [ 771: 771] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:58:57.964817 754374 usertrap_amd64.go:212] [ 771: 771] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.964844 754374 usertrap_amd64.go:122] [ 771: 771] Allocate a new trap: 0xc0019f40f0 11 D0712 23:58:57.964854 754374 usertrap_amd64.go:225] [ 771: 771] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:58:57.968557 754374 usertrap_amd64.go:212] [ 771: 772] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.968598 754374 usertrap_amd64.go:122] [ 771: 772] Allocate a new trap: 0xc0019f40f0 12 D0712 23:58:57.968614 754374 usertrap_amd64.go:225] [ 771: 772] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:58:57.968670 754374 usertrap_amd64.go:212] [ 771: 772] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.968695 754374 usertrap_amd64.go:122] [ 771: 772] Allocate a new trap: 0xc0019f40f0 13 D0712 23:58:57.968703 754374 usertrap_amd64.go:225] [ 771: 772] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:58:57.968738 754374 task_signals.go:470] [ 771: 771] Notified of signal 23 D0712 23:58:57.968806 754374 task_signals.go:220] [ 771: 771] Signal 23: delivering to handler D0712 23:58:57.974685 754374 usertrap_amd64.go:212] [ 771: 771] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:57.974714 754374 usertrap_amd64.go:122] [ 771: 771] Allocate a new trap: 0xc0019f40f0 14 D0712 23:58:57.974728 754374 usertrap_amd64.go:225] [ 771: 771] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:58:57.974791 754374 task_exit.go:204] [ 771: 771] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.974825 754374 task_exit.go:204] [ 771: 771] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.974842 754374 task_signals.go:204] [ 771: 772] Signal 771, PID: 772, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.974847 754374 task_signals.go:204] [ 771: 775] Signal 771, PID: 775, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.974863 754374 task_exit.go:204] [ 771: 772] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.974860 754374 task_signals.go:204] [ 771: 773] Signal 771, PID: 773, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.974875 754374 task_exit.go:204] [ 771: 772] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.974842 754374 task_signals.go:204] [ 771: 774] Signal 771, PID: 774, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:57.974883 754374 task_exit.go:204] [ 771: 772] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.974895 754374 task_exit.go:204] [ 771: 774] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.974920 754374 task_exit.go:204] [ 771: 774] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.974926 754374 task_exit.go:204] [ 771: 774] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.974944 754374 task_exit.go:204] [ 771: 775] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.974953 754374 task_exit.go:204] [ 771: 775] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.974958 754374 task_exit.go:204] [ 771: 775] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.974966 754374 task_exit.go:204] [ 771: 773] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:57.975853 754374 task_exit.go:204] [ 771: 773] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:57.975892 754374 task_exit.go:204] [ 771: 773] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.975909 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:57.975945 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:57.975955 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:57.976124 754374 task_exit.go:204] [ 771: 771] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:57.976778 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.978351 754374 syscalls.go:262] [ 776: 776] Allocating stack with size of 8388608 bytes D0712 23:58:57.978457 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:57.979263 754374 usertrap_amd64.go:212] [ 776: 776] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:57.979306 754374 usertrap_amd64.go:106] [ 776: 776] Map a usertrap vma at 67000 D0712 23:58:57.979428 754374 usertrap_amd64.go:122] [ 776: 776] Allocate a new trap: 0xc000e7e9c0 1 D0712 23:58:57.979460 754374 usertrap_amd64.go:225] [ 776: 776] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 23:58:57.979914 754374 usertrap_amd64.go:212] [ 776: 776] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:57.979942 754374 usertrap_amd64.go:122] [ 776: 776] Allocate a new trap: 0xc000e7e9c0 2 D0712 23:58:57.979953 754374 usertrap_amd64.go:225] [ 776: 776] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 23:58:57.980585 754374 usertrap_amd64.go:212] [ 776: 776] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:57.980612 754374 usertrap_amd64.go:122] [ 776: 776] Allocate a new trap: 0xc000e7e9c0 3 D0712 23:58:57.980619 754374 usertrap_amd64.go:225] [ 776: 776] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 23:58:57.986761 754374 usertrap_amd64.go:212] [ 776: 776] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:57.986777 754374 usertrap_amd64.go:122] [ 776: 776] Allocate a new trap: 0xc000e7e9c0 4 D0712 23:58:57.986786 754374 usertrap_amd64.go:225] [ 776: 776] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 23:58:57.987722 754374 usertrap_amd64.go:212] [ 776: 776] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:57.987743 754374 usertrap_amd64.go:122] [ 776: 776] Allocate a new trap: 0xc000e7e9c0 5 D0712 23:58:57.987750 754374 usertrap_amd64.go:225] [ 776: 776] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 23:58:57.987802 754374 usertrap_amd64.go:212] [ 776: 776] Found the pattern at ip 46b214:sysno 13 D0712 23:58:57.987816 754374 usertrap_amd64.go:122] [ 776: 776] Allocate a new trap: 0xc000e7e9c0 6 D0712 23:58:57.987821 754374 usertrap_amd64.go:225] [ 776: 776] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 23:58:57.988090 754374 usertrap_amd64.go:212] [ 776: 776] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:57.988107 754374 usertrap_amd64.go:122] [ 776: 776] Allocate a new trap: 0xc000e7e9c0 7 D0712 23:58:57.988112 754374 usertrap_amd64.go:225] [ 776: 776] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 23:58:57.988275 754374 usertrap_amd64.go:212] [ 776: 777] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:57.988308 754374 usertrap_amd64.go:122] [ 776: 777] Allocate a new trap: 0xc000e7e9c0 8 D0712 23:58:57.988328 754374 usertrap_amd64.go:225] [ 776: 777] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 23:58:57.988485 754374 usertrap_amd64.go:212] [ 776: 777] Found the pattern at ip 46af76:sysno 35 D0712 23:58:57.988573 754374 usertrap_amd64.go:122] [ 776: 777] Allocate a new trap: 0xc000e7e9c0 9 D0712 23:58:57.988614 754374 usertrap_amd64.go:225] [ 776: 777] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 23:58:57.988646 754374 usertrap_amd64.go:212] [ 776: 779] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:57.988660 754374 usertrap_amd64.go:122] [ 776: 779] Allocate a new trap: 0xc000e7e9c0 10 D0712 23:58:57.988667 754374 usertrap_amd64.go:225] [ 776: 779] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 23:58:57.995590 754374 usertrap_amd64.go:212] [ 776: 776] Found the pattern at ip 46af29:sysno 293 D0712 23:58:57.995608 754374 usertrap_amd64.go:122] [ 776: 776] Allocate a new trap: 0xc000e7e9c0 11 D0712 23:58:57.995617 754374 usertrap_amd64.go:225] [ 776: 776] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 23:58:57.999645 754374 usertrap_amd64.go:212] [ 776: 777] Found the pattern at ip 46b020:sysno 39 D0712 23:58:57.999674 754374 usertrap_amd64.go:122] [ 776: 777] Allocate a new trap: 0xc000e7e9c0 12 D0712 23:58:57.999684 754374 usertrap_amd64.go:225] [ 776: 777] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 23:58:57.999702 754374 usertrap_amd64.go:212] [ 776: 777] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:57.999709 754374 usertrap_amd64.go:122] [ 776: 777] Allocate a new trap: 0xc000e7e9c0 13 D0712 23:58:57.999716 754374 usertrap_amd64.go:225] [ 776: 777] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 23:58:57.999793 754374 task_signals.go:470] [ 776: 776] Notified of signal 23 D0712 23:58:57.999909 754374 task_signals.go:220] [ 776: 776] Signal 23: delivering to handler D0712 23:58:58.006561 754374 usertrap_amd64.go:212] [ 776: 776] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.006638 754374 usertrap_amd64.go:122] [ 776: 776] Allocate a new trap: 0xc000e7e9c0 14 D0712 23:58:58.006663 754374 usertrap_amd64.go:225] [ 776: 776] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 23:58:58.006862 754374 task_exit.go:204] [ 776: 776] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.006961 754374 task_exit.go:204] [ 776: 776] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.007005 754374 task_signals.go:204] [ 776: 778] Signal 776, PID: 778, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.007030 754374 task_exit.go:204] [ 776: 778] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.007038 754374 task_exit.go:204] [ 776: 778] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.007050 754374 task_exit.go:204] [ 776: 778] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.007071 754374 task_signals.go:204] [ 776: 777] Signal 776, PID: 777, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.007080 754374 task_exit.go:204] [ 776: 777] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.007086 754374 task_exit.go:204] [ 776: 777] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.007090 754374 task_exit.go:204] [ 776: 777] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.007100 754374 task_signals.go:204] [ 776: 779] Signal 776, PID: 779, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.007109 754374 task_exit.go:204] [ 776: 779] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.007114 754374 task_exit.go:204] [ 776: 779] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.007118 754374 task_exit.go:204] [ 776: 779] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.007130 754374 task_signals.go:204] [ 776: 780] Signal 776, PID: 780, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.007141 754374 task_exit.go:204] [ 776: 780] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.007148 754374 task_exit.go:204] [ 776: 780] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.007168 754374 task_exit.go:204] [ 776: 780] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.007197 754374 task_signals.go:204] [ 776: 781] Signal 776, PID: 781, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.007227 754374 task_exit.go:204] [ 776: 781] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.008680 754374 task_exit.go:204] [ 776: 781] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.008740 754374 task_exit.go:204] [ 776: 781] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.008760 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.008801 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:58.008820 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.008902 754374 task_exit.go:204] [ 776: 776] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.009846 754374 task_stop.go:118] [ 5: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.011418 754374 syscalls.go:262] [ 782: 782] Allocating stack with size of 8388608 bytes D0712 23:58:58.011598 754374 task_stop.go:138] [ 5: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.013200 754374 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.013278 754374 usertrap_amd64.go:106] [ 782: 782] Map a usertrap vma at 63000 D0712 23:58:58.013418 754374 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc000fb2360 1 D0712 23:58:58.013469 754374 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:58:58.013994 754374 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.014020 754374 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc000fb2360 2 D0712 23:58:58.014032 754374 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:58:58.014733 754374 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.014749 754374 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc000fb2360 3 D0712 23:58:58.014756 754374 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:58:58.020526 754374 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.020563 754374 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc000fb2360 4 D0712 23:58:58.020576 754374 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:58:58.021608 754374 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.021638 754374 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc000fb2360 5 D0712 23:58:58.021649 754374 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:58:58.021725 754374 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.021741 754374 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc000fb2360 6 D0712 23:58:58.021751 754374 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:58:58.022644 754374 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.022672 754374 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc000fb2360 7 D0712 23:58:58.022682 754374 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:58:58.022855 754374 usertrap_amd64.go:212] [ 782: 783] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.022866 754374 usertrap_amd64.go:122] [ 782: 783] Allocate a new trap: 0xc000fb2360 8 D0712 23:58:58.022875 754374 usertrap_amd64.go:225] [ 782: 783] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:58:58.023109 754374 usertrap_amd64.go:212] [ 782: 783] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.023191 754374 usertrap_amd64.go:122] [ 782: 783] Allocate a new trap: 0xc000fb2360 9 D0712 23:58:58.023211 754374 usertrap_amd64.go:225] [ 782: 783] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:58:58.023241 754374 usertrap_amd64.go:212] [ 782: 784] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:58.023249 754374 usertrap_amd64.go:122] [ 782: 784] Allocate a new trap: 0xc000fb2360 10 D0712 23:58:58.023259 754374 usertrap_amd64.go:225] [ 782: 784] Apply the binary patch addr 46b6e0 trap addr 63320 ([184 24 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:58:58.023298 754374 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.023308 754374 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc000fb2360 11 D0712 23:58:58.023317 754374 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b57c trap addr 63370 ([184 202 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:58:58.030686 754374 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.030718 754374 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc000fb2360 12 D0712 23:58:58.030729 754374 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:58:58.033672 754374 usertrap_amd64.go:212] [ 782: 783] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.033707 754374 usertrap_amd64.go:122] [ 782: 783] Allocate a new trap: 0xc000fb2360 13 D0712 23:58:58.033720 754374 usertrap_amd64.go:225] [ 782: 783] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:58:58.033796 754374 usertrap_amd64.go:212] [ 782: 783] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.033844 754374 usertrap_amd64.go:122] [ 782: 783] Allocate a new trap: 0xc000fb2360 14 D0712 23:58:58.033862 754374 usertrap_amd64.go:225] [ 782: 783] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:58:58.033916 754374 task_signals.go:470] [ 782: 782] Notified of signal 23 D0712 23:58:58.033987 754374 task_signals.go:220] [ 782: 782] Signal 23: delivering to handler D0712 23:58:58.040963 754374 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.040982 754374 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc000fb2360 15 D0712 23:58:58.040993 754374 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0712 23:58:58.041039 754374 task_exit.go:204] [ 782: 782] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.041069 754374 task_exit.go:204] [ 782: 782] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.041095 754374 task_signals.go:204] [ 782: 783] Signal 782, PID: 783, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.041112 754374 task_exit.go:204] [ 782: 783] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.041119 754374 task_exit.go:204] [ 782: 783] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.041124 754374 task_exit.go:204] [ 782: 783] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.041179 754374 task_signals.go:204] [ 782: 785] Signal 782, PID: 785, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.041202 754374 task_signals.go:204] [ 782: 786] Signal 782, PID: 786, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.041215 754374 task_exit.go:204] [ 782: 785] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.041305 754374 task_signals.go:204] [ 782: 784] Signal 782, PID: 784, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.041343 754374 task_exit.go:204] [ 782: 785] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.041355 754374 task_exit.go:204] [ 782: 785] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.041368 754374 task_exit.go:204] [ 782: 786] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.041385 754374 task_exit.go:204] [ 782: 786] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.041390 754374 task_exit.go:204] [ 782: 786] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.041399 754374 task_exit.go:204] [ 782: 784] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.042473 754374 task_exit.go:204] [ 782: 784] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.042510 754374 task_exit.go:204] [ 782: 784] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.042524 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.042557 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:58.042566 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.042738 754374 task_exit.go:204] [ 782: 782] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.043350 754374 task_stop.go:118] [ 5: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.045024 754374 syscalls.go:262] [ 787: 787] Allocating stack with size of 8388608 bytes D0712 23:58:58.045152 754374 task_stop.go:138] [ 5: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.046905 754374 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.046996 754374 usertrap_amd64.go:106] [ 787: 787] Map a usertrap vma at 6a000 D0712 23:58:58.047092 754374 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000e7eed0 1 D0712 23:58:58.047127 754374 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 23:58:58.047386 754374 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.047411 754374 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000e7eed0 2 D0712 23:58:58.047421 754374 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 23:58:58.047862 754374 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.047887 754374 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000e7eed0 3 D0712 23:58:58.047899 754374 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 23:58:58.053771 754374 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.053803 754374 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000e7eed0 4 D0712 23:58:58.053816 754374 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 23:58:58.054989 754374 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.055015 754374 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000e7eed0 5 D0712 23:58:58.055025 754374 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 23:58:58.055068 754374 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.055075 754374 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000e7eed0 6 D0712 23:58:58.055085 754374 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 23:58:58.055470 754374 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.055495 754374 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000e7eed0 7 D0712 23:58:58.055504 754374 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 23:58:58.055632 754374 usertrap_amd64.go:212] [ 787: 788] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.055643 754374 usertrap_amd64.go:122] [ 787: 788] Allocate a new trap: 0xc000e7eed0 8 D0712 23:58:58.055651 754374 usertrap_amd64.go:225] [ 787: 788] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 23:58:58.055889 754374 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.055906 754374 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000e7eed0 9 D0712 23:58:58.055914 754374 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 23:58:58.055937 754374 usertrap_amd64.go:212] [ 787: 788] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.055953 754374 usertrap_amd64.go:122] [ 787: 788] Allocate a new trap: 0xc000e7eed0 10 D0712 23:58:58.056011 754374 usertrap_amd64.go:225] [ 787: 788] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 23:58:58.066404 754374 usertrap_amd64.go:212] [ 787: 788] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.066465 754374 usertrap_amd64.go:122] [ 787: 788] Allocate a new trap: 0xc000e7eed0 11 D0712 23:58:58.066483 754374 usertrap_amd64.go:225] [ 787: 788] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 23:58:58.066627 754374 usertrap_amd64.go:212] [ 787: 788] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.066696 754374 usertrap_amd64.go:122] [ 787: 788] Allocate a new trap: 0xc000e7eed0 12 D0712 23:58:58.066713 754374 usertrap_amd64.go:225] [ 787: 788] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 23:58:58.066776 754374 task_signals.go:470] [ 787: 787] Notified of signal 23 D0712 23:58:58.066923 754374 task_signals.go:220] [ 787: 787] Signal 23: delivering to handler D0712 23:58:58.069587 754374 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.069655 754374 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000e7eed0 13 D0712 23:58:58.069673 754374 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 23:58:58.078625 754374 task_signals.go:470] [ 787: 787] Notified of signal 23 D0712 23:58:58.080067 754374 task_signals.go:220] [ 787: 787] Signal 23: delivering to handler D0712 23:58:58.080678 754374 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.080754 754374 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000e7eed0 14 D0712 23:58:58.080778 754374 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 23:58:58.080852 754374 task_exit.go:204] [ 787: 787] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.080900 754374 task_exit.go:204] [ 787: 787] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.080920 754374 task_signals.go:204] [ 787: 788] Signal 787, PID: 788, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.080935 754374 task_signals.go:204] [ 787: 790] Signal 787, PID: 790, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.081038 754374 task_exit.go:204] [ 787: 788] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.081156 754374 task_signals.go:204] [ 787: 791] Signal 787, PID: 791, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.081208 754374 task_exit.go:204] [ 787: 788] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.081228 754374 task_exit.go:204] [ 787: 788] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.081252 754374 task_exit.go:204] [ 787: 790] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.081263 754374 task_exit.go:204] [ 787: 790] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.081271 754374 task_exit.go:204] [ 787: 790] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.081206 754374 task_signals.go:204] [ 787: 789] Signal 787, PID: 789, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.081311 754374 task_exit.go:204] [ 787: 789] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.081323 754374 task_exit.go:204] [ 787: 789] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.081339 754374 task_exit.go:204] [ 787: 789] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.081353 754374 task_exit.go:204] [ 787: 791] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.082735 754374 task_exit.go:204] [ 787: 791] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.082784 754374 task_exit.go:204] [ 787: 791] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.082800 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.082830 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:58.082852 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.082984 754374 task_exit.go:204] [ 787: 787] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.083159 754374 task_signals.go:470] [ 5: 10] Notified of signal 23 D0712 23:58:58.083223 754374 task_signals.go:220] [ 5: 10] Signal 23: delivering to handler D0712 23:58:58.083644 754374 task_stop.go:118] [ 5: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.085459 754374 syscalls.go:262] [ 792: 792] Allocating stack with size of 8388608 bytes D0712 23:58:58.085685 754374 task_stop.go:138] [ 5: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.086710 754374 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.086767 754374 usertrap_amd64.go:106] [ 792: 792] Map a usertrap vma at 64000 D0712 23:58:58.086892 754374 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc000fb2a20 1 D0712 23:58:58.086948 754374 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 23:58:58.087428 754374 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.087464 754374 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc000fb2a20 2 D0712 23:58:58.087481 754374 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 23:58:58.088357 754374 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.088376 754374 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc000fb2a20 3 D0712 23:58:58.088393 754374 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 23:58:58.097168 754374 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.097203 754374 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc000fb2a20 4 D0712 23:58:58.097221 754374 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 23:58:58.098360 754374 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.098391 754374 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc000fb2a20 5 D0712 23:58:58.098403 754374 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 23:58:58.098448 754374 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.098453 754374 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc000fb2a20 6 D0712 23:58:58.098459 754374 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 23:58:58.098608 754374 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.098622 754374 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc000fb2a20 7 D0712 23:58:58.098626 754374 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 23:58:58.098760 754374 usertrap_amd64.go:212] [ 792: 793] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.098782 754374 usertrap_amd64.go:122] [ 792: 793] Allocate a new trap: 0xc000fb2a20 8 D0712 23:58:58.098789 754374 usertrap_amd64.go:225] [ 792: 793] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 23:58:58.099035 754374 usertrap_amd64.go:212] [ 792: 793] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.099075 754374 usertrap_amd64.go:122] [ 792: 793] Allocate a new trap: 0xc000fb2a20 9 D0712 23:58:58.099087 754374 usertrap_amd64.go:225] [ 792: 793] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 23:58:58.099280 754374 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.099325 754374 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc000fb2a20 10 D0712 23:58:58.099342 754374 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 23:58:58.099807 754374 usertrap_amd64.go:212] [ 792: 793] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.099836 754374 usertrap_amd64.go:122] [ 792: 793] Allocate a new trap: 0xc000fb2a20 11 D0712 23:58:58.099847 754374 usertrap_amd64.go:225] [ 792: 793] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 23:58:58.099888 754374 usertrap_amd64.go:212] [ 792: 793] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.099893 754374 usertrap_amd64.go:122] [ 792: 793] Allocate a new trap: 0xc000fb2a20 12 D0712 23:58:58.099899 754374 usertrap_amd64.go:225] [ 792: 793] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 23:58:58.099917 754374 task_signals.go:470] [ 792: 792] Notified of signal 23 D0712 23:58:58.099957 754374 task_signals.go:220] [ 792: 792] Signal 23: delivering to handler D0712 23:58:58.106461 754374 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.106489 754374 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc000fb2a20 13 D0712 23:58:58.106501 754374 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 23:58:58.110907 754374 task_signals.go:470] [ 792: 792] Notified of signal 23 D0712 23:58:58.110980 754374 task_signals.go:220] [ 792: 792] Signal 23: delivering to handler D0712 23:58:58.111139 754374 task_signals.go:470] [ 792: 792] Notified of signal 23 D0712 23:58:58.111372 754374 task_signals.go:220] [ 792: 792] Signal 23: delivering to handler D0712 23:58:58.117216 754374 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.117262 754374 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc000fb2a20 14 D0712 23:58:58.117281 754374 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 23:58:58.117359 754374 task_exit.go:204] [ 792: 792] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.117390 754374 task_exit.go:204] [ 792: 792] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.117421 754374 task_signals.go:204] [ 792: 795] Signal 792, PID: 795, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.117448 754374 task_signals.go:204] [ 792: 793] Signal 792, PID: 793, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.117455 754374 task_exit.go:204] [ 792: 795] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.117421 754374 task_signals.go:204] [ 792: 794] Signal 792, PID: 794, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.117477 754374 task_exit.go:204] [ 792: 795] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.117497 754374 task_exit.go:204] [ 792: 795] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.117512 754374 task_exit.go:204] [ 792: 794] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.117529 754374 task_exit.go:204] [ 792: 794] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.117533 754374 task_exit.go:204] [ 792: 794] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.117548 754374 task_signals.go:204] [ 792: 796] Signal 792, PID: 796, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.117579 754374 task_exit.go:204] [ 792: 796] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.117600 754374 task_exit.go:204] [ 792: 796] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.117616 754374 task_exit.go:204] [ 792: 796] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.117633 754374 task_signals.go:204] [ 792: 797] Signal 792, PID: 797, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.117641 754374 task_exit.go:204] [ 792: 793] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.117669 754374 task_exit.go:204] [ 792: 793] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.117676 754374 task_exit.go:204] [ 792: 793] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.117688 754374 task_exit.go:204] [ 792: 797] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.118691 754374 task_exit.go:204] [ 792: 797] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.118717 754374 task_exit.go:204] [ 792: 797] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.118732 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.118769 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:58.118779 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.118954 754374 task_exit.go:204] [ 792: 792] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.120140 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.122099 754374 syscalls.go:262] [ 798: 798] Allocating stack with size of 8388608 bytes D0712 23:58:58.122251 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.123348 754374 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.123449 754374 usertrap_amd64.go:106] [ 798: 798] Map a usertrap vma at 69000 D0712 23:58:58.123605 754374 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc000fb2cf0 1 D0712 23:58:58.123642 754374 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 23:58:58.124110 754374 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.124137 754374 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc000fb2cf0 2 D0712 23:58:58.124153 754374 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 23:58:58.124860 754374 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.124907 754374 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc000fb2cf0 3 D0712 23:58:58.124921 754374 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 23:58:58.131984 754374 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.132027 754374 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc000fb2cf0 4 D0712 23:58:58.132042 754374 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 23:58:58.133236 754374 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.133299 754374 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc000fb2cf0 5 D0712 23:58:58.133311 754374 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 23:58:58.133382 754374 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.133429 754374 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc000fb2cf0 6 D0712 23:58:58.133448 754374 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 23:58:58.133857 754374 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.133882 754374 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc000fb2cf0 7 D0712 23:58:58.133890 754374 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 23:58:58.134060 754374 usertrap_amd64.go:212] [ 798: 799] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.134084 754374 usertrap_amd64.go:122] [ 798: 799] Allocate a new trap: 0xc000fb2cf0 8 D0712 23:58:58.134093 754374 usertrap_amd64.go:225] [ 798: 799] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 23:58:58.134233 754374 usertrap_amd64.go:212] [ 798: 799] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.134262 754374 usertrap_amd64.go:122] [ 798: 799] Allocate a new trap: 0xc000fb2cf0 9 D0712 23:58:58.134275 754374 usertrap_amd64.go:225] [ 798: 799] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 23:58:58.134354 754374 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.134366 754374 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc000fb2cf0 10 D0712 23:58:58.134377 754374 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 23:58:58.135206 754374 usertrap_amd64.go:212] [ 798: 799] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.135233 754374 usertrap_amd64.go:122] [ 798: 799] Allocate a new trap: 0xc000fb2cf0 11 D0712 23:58:58.135243 754374 usertrap_amd64.go:225] [ 798: 799] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 23:58:58.135367 754374 usertrap_amd64.go:212] [ 798: 799] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.135390 754374 usertrap_amd64.go:122] [ 798: 799] Allocate a new trap: 0xc000fb2cf0 12 D0712 23:58:58.135401 754374 usertrap_amd64.go:225] [ 798: 799] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 23:58:58.135438 754374 task_signals.go:470] [ 798: 798] Notified of signal 23 D0712 23:58:58.135484 754374 task_signals.go:220] [ 798: 798] Signal 23: delivering to handler D0712 23:58:58.141819 754374 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.141925 754374 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc000fb2cf0 13 D0712 23:58:58.141950 754374 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 23:58:58.146458 754374 task_signals.go:470] [ 798: 798] Notified of signal 23 D0712 23:58:58.146523 754374 task_signals.go:220] [ 798: 798] Signal 23: delivering to handler D0712 23:58:58.152537 754374 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.152570 754374 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc000fb2cf0 14 D0712 23:58:58.152585 754374 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 23:58:58.152691 754374 task_exit.go:204] [ 798: 798] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.152724 754374 task_exit.go:204] [ 798: 798] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.152754 754374 task_signals.go:204] [ 798: 801] Signal 798, PID: 801, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.152751 754374 task_signals.go:204] [ 798: 800] Signal 798, PID: 800, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.152779 754374 task_exit.go:204] [ 798: 801] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.152789 754374 task_exit.go:204] [ 798: 801] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.152804 754374 task_exit.go:204] [ 798: 801] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.152823 754374 task_signals.go:204] [ 798: 799] Signal 798, PID: 799, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.152839 754374 task_signals.go:204] [ 798: 803] Signal 798, PID: 803, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.152843 754374 task_exit.go:204] [ 798: 799] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.152828 754374 task_signals.go:204] [ 798: 802] Signal 798, PID: 802, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.152860 754374 task_exit.go:204] [ 798: 800] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.152916 754374 task_exit.go:204] [ 798: 800] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.152966 754374 task_exit.go:204] [ 798: 800] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.153015 754374 task_exit.go:204] [ 798: 803] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.153055 754374 task_exit.go:204] [ 798: 803] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.153063 754374 task_exit.go:204] [ 798: 803] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.153077 754374 task_exit.go:204] [ 798: 802] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.153098 754374 task_exit.go:204] [ 798: 802] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.153104 754374 task_exit.go:204] [ 798: 802] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.154341 754374 task_exit.go:204] [ 798: 799] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.154383 754374 task_exit.go:204] [ 798: 799] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.154398 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.154444 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:58.154466 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.154516 754374 task_exit.go:204] [ 798: 798] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.155122 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.156619 754374 syscalls.go:262] [ 804: 804] Allocating stack with size of 8388608 bytes D0712 23:58:58.156821 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.158063 754374 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.158103 754374 usertrap_amd64.go:106] [ 804: 804] Map a usertrap vma at 69000 D0712 23:58:58.158199 754374 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc000e7ef90 1 D0712 23:58:58.158217 754374 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 23:58:58.158625 754374 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.158649 754374 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc000e7ef90 2 D0712 23:58:58.158658 754374 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 23:58:58.159461 754374 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.159499 754374 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc000e7ef90 3 D0712 23:58:58.159514 754374 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 23:58:58.165843 754374 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.165891 754374 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc000e7ef90 4 D0712 23:58:58.165909 754374 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 23:58:58.167063 754374 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.167102 754374 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc000e7ef90 5 D0712 23:58:58.167119 754374 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 23:58:58.167178 754374 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.167197 754374 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc000e7ef90 6 D0712 23:58:58.167207 754374 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 23:58:58.167748 754374 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.167915 754374 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc000e7ef90 7 D0712 23:58:58.167947 754374 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 23:58:58.168121 754374 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.168136 754374 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc000e7ef90 8 D0712 23:58:58.168146 754374 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 23:58:58.168375 754374 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.168409 754374 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc000e7ef90 9 D0712 23:58:58.168420 754374 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 23:58:58.168665 754374 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.168698 754374 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc000e7ef90 10 D0712 23:58:58.168741 754374 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 23:58:58.178796 754374 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.178834 754374 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc000e7ef90 11 D0712 23:58:58.178845 754374 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 23:58:58.179589 754374 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.179616 754374 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc000e7ef90 12 D0712 23:58:58.179634 754374 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 23:58:58.179688 754374 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.179704 754374 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc000e7ef90 13 D0712 23:58:58.179711 754374 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 23:58:58.179729 754374 task_signals.go:470] [ 804: 804] Notified of signal 23 D0712 23:58:58.179794 754374 task_signals.go:220] [ 804: 804] Signal 23: delivering to handler D0712 23:58:58.189592 754374 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.189655 754374 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc000e7ef90 14 D0712 23:58:58.189667 754374 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 23:58:58.189736 754374 task_exit.go:204] [ 804: 804] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.189763 754374 task_exit.go:204] [ 804: 804] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.189780 754374 task_signals.go:204] [ 804: 805] Signal 804, PID: 805, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.189882 754374 task_exit.go:204] [ 804: 805] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.189915 754374 task_exit.go:204] [ 804: 805] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.189922 754374 task_exit.go:204] [ 804: 805] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.189817 754374 task_signals.go:204] [ 804: 807] Signal 804, PID: 807, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.189819 754374 task_signals.go:204] [ 804: 808] Signal 804, PID: 808, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.189830 754374 task_signals.go:204] [ 804: 806] Signal 804, PID: 806, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.189939 754374 task_exit.go:204] [ 804: 807] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.189968 754374 task_exit.go:204] [ 804: 807] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.189975 754374 task_exit.go:204] [ 804: 807] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.190018 754374 task_exit.go:204] [ 804: 808] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.190027 754374 task_exit.go:204] [ 804: 808] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.190032 754374 task_exit.go:204] [ 804: 808] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.190052 754374 task_exit.go:204] [ 804: 806] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.191292 754374 task_exit.go:204] [ 804: 806] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.191331 754374 task_exit.go:204] [ 804: 806] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.191345 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.191369 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:58.191377 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.191675 754374 task_exit.go:204] [ 804: 804] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.192367 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.193857 754374 syscalls.go:262] [ 809: 809] Allocating stack with size of 8388608 bytes D0712 23:58:58.193974 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.195503 754374 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.195581 754374 usertrap_amd64.go:106] [ 809: 809] Map a usertrap vma at 63000 D0712 23:58:58.195664 754374 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000c0dd70 1 D0712 23:58:58.195687 754374 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:58:58.195849 754374 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.195867 754374 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000c0dd70 2 D0712 23:58:58.195877 754374 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:58:58.196327 754374 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.196342 754374 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000c0dd70 3 D0712 23:58:58.196351 754374 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:58:58.202125 754374 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.202138 754374 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000c0dd70 4 D0712 23:58:58.202146 754374 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:58:58.203346 754374 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.203377 754374 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000c0dd70 5 D0712 23:58:58.203388 754374 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:58:58.203436 754374 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.203445 754374 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000c0dd70 6 D0712 23:58:58.203453 754374 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:58:58.203657 754374 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.203680 754374 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000c0dd70 7 D0712 23:58:58.203691 754374 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:58:58.203848 754374 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.203869 754374 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc000c0dd70 8 D0712 23:58:58.203878 754374 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:58:58.204109 754374 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.204133 754374 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000c0dd70 9 D0712 23:58:58.204144 754374 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:58:58.204156 754374 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.204162 754374 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc000c0dd70 10 D0712 23:58:58.204173 754374 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:58:58.212025 754374 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.212048 754374 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000c0dd70 11 D0712 23:58:58.212056 754374 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:58:58.214708 754374 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.214726 754374 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc000c0dd70 12 D0712 23:58:58.214738 754374 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:58:58.214782 754374 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.214800 754374 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc000c0dd70 13 D0712 23:58:58.214809 754374 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:58:58.214835 754374 task_signals.go:470] [ 809: 809] Notified of signal 23 D0712 23:58:58.214907 754374 task_signals.go:220] [ 809: 809] Signal 23: delivering to handler D0712 23:58:58.222735 754374 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.222759 754374 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000c0dd70 14 D0712 23:58:58.222771 754374 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:58:58.222849 754374 task_exit.go:204] [ 809: 809] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.222882 754374 task_exit.go:204] [ 809: 809] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.222896 754374 task_signals.go:204] [ 809: 812] Signal 809, PID: 812, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.222903 754374 task_signals.go:204] [ 809: 811] Signal 809, PID: 811, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.222923 754374 task_exit.go:204] [ 809: 812] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.222906 754374 task_signals.go:204] [ 809: 813] Signal 809, PID: 813, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.222936 754374 task_exit.go:204] [ 809: 812] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.222943 754374 task_exit.go:204] [ 809: 812] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.222958 754374 task_exit.go:204] [ 809: 811] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.222965 754374 task_exit.go:204] [ 809: 811] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.222971 754374 task_exit.go:204] [ 809: 811] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.222981 754374 task_exit.go:204] [ 809: 813] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.222989 754374 task_exit.go:204] [ 809: 813] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.222995 754374 task_exit.go:204] [ 809: 813] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.222920 754374 task_signals.go:204] [ 809: 810] Signal 809, PID: 810, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.223007 754374 task_exit.go:204] [ 809: 810] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.224231 754374 task_exit.go:204] [ 809: 810] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.224263 754374 task_exit.go:204] [ 809: 810] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.224276 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.224334 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:58.224351 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.224512 754374 task_exit.go:204] [ 809: 809] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.226297 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.227986 754374 syscalls.go:262] [ 814: 814] Allocating stack with size of 8388608 bytes D0712 23:58:58.228109 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.230146 754374 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.230177 754374 usertrap_amd64.go:106] [ 814: 814] Map a usertrap vma at 68000 D0712 23:58:58.230255 754374 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000e7f4d0 1 D0712 23:58:58.230295 754374 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 23:58:58.230847 754374 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.230873 754374 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000e7f4d0 2 D0712 23:58:58.230885 754374 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 23:58:58.232346 754374 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.232374 754374 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000e7f4d0 3 D0712 23:58:58.232386 754374 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 23:58:58.239503 754374 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.239548 754374 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000e7f4d0 4 D0712 23:58:58.239565 754374 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 23:58:58.241101 754374 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.241131 754374 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000e7f4d0 5 D0712 23:58:58.241141 754374 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 23:58:58.241187 754374 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.241201 754374 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000e7f4d0 6 D0712 23:58:58.241209 754374 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 23:58:58.241519 754374 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.241548 754374 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000e7f4d0 7 D0712 23:58:58.241557 754374 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 23:58:58.241823 754374 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.241856 754374 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc000e7f4d0 8 D0712 23:58:58.241869 754374 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 23:58:58.242106 754374 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.242129 754374 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000e7f4d0 9 D0712 23:58:58.242139 754374 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 23:58:58.242173 754374 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.242182 754374 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc000e7f4d0 10 D0712 23:58:58.242189 754374 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 23:58:58.250423 754374 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.250455 754374 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000e7f4d0 11 D0712 23:58:58.250465 754374 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 23:58:58.253009 754374 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.253046 754374 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc000e7f4d0 12 D0712 23:58:58.253061 754374 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 23:58:58.253127 754374 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.253137 754374 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc000e7f4d0 13 D0712 23:58:58.253146 754374 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 23:58:58.253199 754374 task_signals.go:470] [ 814: 814] Notified of signal 23 D0712 23:58:58.253289 754374 task_signals.go:220] [ 814: 814] Signal 23: delivering to handler I0712 23:58:58.260894 754374 compat.go:120] Unsupported syscall sys_442(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_442 for more information. D0712 23:58:58.261005 754374 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.261018 754374 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000e7f4d0 14 D0712 23:58:58.261028 754374 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 23:58:58.261097 754374 task_exit.go:204] [ 814: 814] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.261122 754374 task_exit.go:204] [ 814: 814] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.261143 754374 task_signals.go:204] [ 814: 817] Signal 814, PID: 817, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.261159 754374 task_signals.go:204] [ 814: 815] Signal 814, PID: 815, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.261137 754374 task_signals.go:204] [ 814: 816] Signal 814, PID: 816, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.261164 754374 task_exit.go:204] [ 814: 817] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.261194 754374 task_exit.go:204] [ 814: 817] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.261213 754374 task_exit.go:204] [ 814: 817] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.261161 754374 task_signals.go:204] [ 814: 819] Signal 814, PID: 819, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.261138 754374 task_signals.go:204] [ 814: 818] Signal 814, PID: 818, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.261229 754374 task_exit.go:204] [ 814: 815] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.261268 754374 task_exit.go:204] [ 814: 815] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.261304 754374 task_exit.go:204] [ 814: 815] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.261318 754374 task_exit.go:204] [ 814: 816] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.261342 754374 task_exit.go:204] [ 814: 816] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.261349 754374 task_exit.go:204] [ 814: 816] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.261363 754374 task_exit.go:204] [ 814: 819] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.261382 754374 task_exit.go:204] [ 814: 819] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.261390 754374 task_exit.go:204] [ 814: 819] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.261424 754374 task_exit.go:204] [ 814: 818] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.262569 754374 task_exit.go:204] [ 814: 818] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.262610 754374 task_exit.go:204] [ 814: 818] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.262626 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.262704 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.262822 754374 task_exit.go:204] [ 814: 814] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.263400 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.265083 754374 syscalls.go:262] [ 820: 820] Allocating stack with size of 8388608 bytes D0712 23:58:58.265212 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.267021 754374 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.267068 754374 usertrap_amd64.go:106] [ 820: 820] Map a usertrap vma at 64000 D0712 23:58:58.267170 754374 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc000e7f830 1 D0712 23:58:58.267196 754374 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 23:58:58.267497 754374 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.267529 754374 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc000e7f830 2 D0712 23:58:58.267540 754374 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 23:58:58.268285 754374 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.268312 754374 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc000e7f830 3 D0712 23:58:58.268322 754374 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 23:58:58.274914 754374 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.274941 754374 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc000e7f830 4 D0712 23:58:58.274949 754374 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 23:58:58.277087 754374 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.277121 754374 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc000e7f830 5 D0712 23:58:58.277131 754374 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 23:58:58.277189 754374 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.277195 754374 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc000e7f830 6 D0712 23:58:58.277200 754374 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 23:58:58.277495 754374 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.277524 754374 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc000e7f830 7 D0712 23:58:58.277530 754374 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 23:58:58.277712 754374 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.277748 754374 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc000e7f830 8 D0712 23:58:58.277760 754374 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 23:58:58.277955 754374 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.277987 754374 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc000e7f830 9 D0712 23:58:58.277998 754374 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 23:58:58.278009 754374 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.278016 754374 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc000e7f830 10 D0712 23:58:58.278024 754374 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 23:58:58.285534 754374 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.285548 754374 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc000e7f830 11 D0712 23:58:58.285556 754374 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 23:58:58.288235 754374 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.288278 754374 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc000e7f830 12 D0712 23:58:58.288294 754374 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 23:58:58.288328 754374 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.288345 754374 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc000e7f830 13 D0712 23:58:58.288357 754374 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 23:58:58.288430 754374 task_signals.go:470] [ 820: 820] Notified of signal 23 D0712 23:58:58.288497 754374 task_signals.go:220] [ 820: 820] Signal 23: delivering to handler I0712 23:58:58.296499 754374 compat.go:120] Unsupported syscall move_mount(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_mount for more information. D0712 23:58:58.296591 754374 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.296602 754374 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc000e7f830 14 D0712 23:58:58.296613 754374 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 23:58:58.296645 754374 task_exit.go:204] [ 820: 820] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.296667 754374 task_exit.go:204] [ 820: 820] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.296685 754374 task_signals.go:204] [ 820: 823] Signal 820, PID: 823, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.296697 754374 task_exit.go:204] [ 820: 823] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.296702 754374 task_exit.go:204] [ 820: 823] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.296705 754374 task_exit.go:204] [ 820: 823] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.296701 754374 task_signals.go:204] [ 820: 822] Signal 820, PID: 822, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.296722 754374 task_signals.go:204] [ 820: 821] Signal 820, PID: 821, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.296723 754374 task_signals.go:204] [ 820: 824] Signal 820, PID: 824, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.296732 754374 task_exit.go:204] [ 820: 821] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.296749 754374 task_exit.go:204] [ 820: 821] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.296766 754374 task_exit.go:204] [ 820: 821] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.296775 754374 task_exit.go:204] [ 820: 824] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.296781 754374 task_exit.go:204] [ 820: 824] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.296785 754374 task_exit.go:204] [ 820: 824] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.296792 754374 task_exit.go:204] [ 820: 822] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.298138 754374 task_exit.go:204] [ 820: 822] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.298168 754374 task_exit.go:204] [ 820: 822] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.298185 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.298200 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.298331 754374 task_exit.go:204] [ 820: 820] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.298513 754374 task_signals.go:470] [ 5: 5] Notified of signal 23 D0712 23:58:58.298648 754374 task_signals.go:220] [ 5: 5] Signal 23: delivering to handler D0712 23:58:58.299107 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.300678 754374 syscalls.go:262] [ 825: 825] Allocating stack with size of 8388608 bytes D0712 23:58:58.300808 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.302082 754374 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.302129 754374 usertrap_amd64.go:106] [ 825: 825] Map a usertrap vma at 63000 D0712 23:58:58.302226 754374 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc002102960 1 D0712 23:58:58.302250 754374 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:58:58.302618 754374 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.302645 754374 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc002102960 2 D0712 23:58:58.302656 754374 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:58:58.303390 754374 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.303417 754374 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc002102960 3 D0712 23:58:58.303430 754374 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:58:58.309833 754374 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.309891 754374 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc002102960 4 D0712 23:58:58.309901 754374 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:58:58.310969 754374 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.311003 754374 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc002102960 5 D0712 23:58:58.311015 754374 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:58:58.311078 754374 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.311096 754374 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc002102960 6 D0712 23:58:58.311104 754374 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:58:58.311499 754374 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.311526 754374 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc002102960 7 D0712 23:58:58.311535 754374 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:58:58.311688 754374 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.311712 754374 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc002102960 8 D0712 23:58:58.311725 754374 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:58:58.311930 754374 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.311955 754374 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc002102960 9 D0712 23:58:58.311967 754374 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:58:58.311991 754374 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.311999 754374 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc002102960 10 D0712 23:58:58.312008 754374 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:58:58.319614 754374 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.319647 754374 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc002102960 11 D0712 23:58:58.319657 754374 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:58:58.323450 754374 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.323480 754374 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc002102960 12 D0712 23:58:58.323494 754374 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:58:58.323563 754374 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.323613 754374 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc002102960 13 D0712 23:58:58.323628 754374 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:58:58.323665 754374 task_signals.go:470] [ 825: 825] Notified of signal 23 D0712 23:58:58.323725 754374 task_signals.go:220] [ 825: 825] Signal 23: delivering to handler I0712 23:58:58.330223 754374 compat.go:120] Unsupported syscall move_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_pages for more information. D0712 23:58:58.330320 754374 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.330336 754374 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc002102960 14 D0712 23:58:58.330348 754374 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:58:58.330436 754374 task_exit.go:204] [ 825: 825] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.330487 754374 task_signals.go:204] [ 825: 826] Signal 825, PID: 826, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.330503 754374 task_exit.go:204] [ 825: 825] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.330523 754374 task_signals.go:204] [ 825: 828] Signal 825, PID: 828, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.330550 754374 task_exit.go:204] [ 825: 828] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.330567 754374 task_signals.go:204] [ 825: 829] Signal 825, PID: 829, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.330587 754374 task_exit.go:204] [ 825: 828] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.330593 754374 task_exit.go:204] [ 825: 828] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.330585 754374 task_signals.go:204] [ 825: 827] Signal 825, PID: 827, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.330611 754374 task_exit.go:204] [ 825: 826] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.330699 754374 task_exit.go:204] [ 825: 826] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.330726 754374 task_exit.go:204] [ 825: 826] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.330793 754374 task_exit.go:204] [ 825: 827] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.330832 754374 task_exit.go:204] [ 825: 827] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.330837 754374 task_exit.go:204] [ 825: 827] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.330851 754374 task_exit.go:204] [ 825: 829] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.332043 754374 task_exit.go:204] [ 825: 829] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.332091 754374 task_exit.go:204] [ 825: 829] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.332109 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.332164 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.332196 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.332329 754374 task_exit.go:204] [ 825: 825] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.332708 754374 task_signals.go:470] [ 5: 5] Notified of signal 23 D0712 23:58:58.333029 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.334489 754374 syscalls.go:262] [ 830: 830] Allocating stack with size of 8388608 bytes D0712 23:58:58.334591 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.334766 754374 task_signals.go:220] [ 5: 5] Signal 23: delivering to handler D0712 23:58:58.335802 754374 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.335841 754374 usertrap_amd64.go:106] [ 830: 830] Map a usertrap vma at 61000 D0712 23:58:58.335937 754374 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000fb3740 1 D0712 23:58:58.335986 754374 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 23:58:58.336348 754374 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.336374 754374 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000fb3740 2 D0712 23:58:58.336383 754374 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 23:58:58.337002 754374 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.337016 754374 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000fb3740 3 D0712 23:58:58.337029 754374 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 23:58:58.344017 754374 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.344056 754374 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000fb3740 4 D0712 23:58:58.344067 754374 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 23:58:58.345871 754374 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.345926 754374 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000fb3740 5 D0712 23:58:58.345948 754374 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 23:58:58.346007 754374 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.346024 754374 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000fb3740 6 D0712 23:58:58.346033 754374 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 23:58:58.346359 754374 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.346398 754374 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000fb3740 7 D0712 23:58:58.346409 754374 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 23:58:58.346606 754374 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.346638 754374 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc000fb3740 8 D0712 23:58:58.346650 754374 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 23:58:58.346846 754374 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.346859 754374 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc000fb3740 9 D0712 23:58:58.346867 754374 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 23:58:58.346998 754374 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.347025 754374 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000fb3740 10 D0712 23:58:58.347035 754374 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 23:58:58.347317 754374 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.347359 754374 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc000fb3740 11 D0712 23:58:58.347372 754374 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 23:58:58.347544 754374 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.347573 754374 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc000fb3740 12 D0712 23:58:58.347583 754374 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 23:58:58.347600 754374 task_signals.go:470] [ 830: 833] Notified of signal 23 D0712 23:58:58.347623 754374 task_signals.go:179] [ 830: 833] Restarting syscall 202: interrupted by signal 23 D0712 23:58:58.347635 754374 task_signals.go:220] [ 830: 833] Signal 23: delivering to handler D0712 23:58:58.357177 754374 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.357285 754374 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000fb3740 13 D0712 23:58:58.357315 754374 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 23:58:58.358433 754374 task_signals.go:470] [ 830: 830] Notified of signal 23 D0712 23:58:58.358720 754374 task_signals.go:220] [ 830: 830] Signal 23: delivering to handler D0712 23:58:58.368794 754374 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.368867 754374 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000fb3740 14 D0712 23:58:58.368887 754374 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 23:58:58.368972 754374 task_exit.go:204] [ 830: 830] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.369024 754374 task_signals.go:204] [ 830: 832] Signal 830, PID: 832, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.369042 754374 task_exit.go:204] [ 830: 830] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.369059 754374 task_signals.go:204] [ 830: 831] Signal 830, PID: 831, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.369081 754374 task_signals.go:204] [ 830: 833] Signal 830, PID: 833, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.369090 754374 task_exit.go:204] [ 830: 831] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.369099 754374 task_signals.go:204] [ 830: 834] Signal 830, PID: 834, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.369108 754374 task_exit.go:204] [ 830: 831] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.369114 754374 task_exit.go:204] [ 830: 831] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.369126 754374 task_exit.go:204] [ 830: 833] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.369133 754374 task_exit.go:204] [ 830: 833] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.369146 754374 task_exit.go:204] [ 830: 833] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.369156 754374 task_exit.go:204] [ 830: 832] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.369182 754374 task_exit.go:204] [ 830: 832] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.369196 754374 task_exit.go:204] [ 830: 832] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.369207 754374 task_exit.go:204] [ 830: 834] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.370356 754374 task_exit.go:204] [ 830: 834] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.370384 754374 task_exit.go:204] [ 830: 834] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.370405 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.370431 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.370447 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.370554 754374 task_exit.go:204] [ 830: 830] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.370679 754374 task_signals.go:470] [ 5: 5] Notified of signal 23 D0712 23:58:58.370699 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 23 D0712 23:58:58.370706 754374 task_signals.go:220] [ 5: 5] Signal 23: delivering to handler D0712 23:58:58.371184 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.372634 754374 syscalls.go:262] [ 835: 835] Allocating stack with size of 8388608 bytes D0712 23:58:58.372715 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.374386 754374 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.374436 754374 usertrap_amd64.go:106] [ 835: 835] Map a usertrap vma at 68000 D0712 23:58:58.374508 754374 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001362060 1 D0712 23:58:58.374546 754374 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 23:58:58.374888 754374 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.374905 754374 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001362060 2 D0712 23:58:58.374918 754374 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 23:58:58.375929 754374 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.375977 754374 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001362060 3 D0712 23:58:58.375991 754374 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 23:58:58.382883 754374 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.382922 754374 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001362060 4 D0712 23:58:58.382938 754374 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 23:58:58.384376 754374 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.384411 754374 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001362060 5 D0712 23:58:58.384424 754374 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 23:58:58.384491 754374 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.384534 754374 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001362060 6 D0712 23:58:58.384546 754374 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 23:58:58.384759 754374 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.384781 754374 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001362060 7 D0712 23:58:58.384790 754374 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 23:58:58.384923 754374 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.384971 754374 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc001362060 8 D0712 23:58:58.385000 754374 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 23:58:58.385233 754374 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.385256 754374 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc001362060 9 D0712 23:58:58.385265 754374 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 23:58:58.385317 754374 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.385336 754374 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001362060 10 D0712 23:58:58.385346 754374 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 23:58:58.392648 754374 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.392683 754374 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001362060 11 D0712 23:58:58.392696 754374 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 23:58:58.395484 754374 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.395564 754374 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc001362060 12 D0712 23:58:58.395591 754374 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 23:58:58.395639 754374 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.395659 754374 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc001362060 13 D0712 23:58:58.395666 754374 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 23:58:58.395690 754374 task_signals.go:470] [ 835: 835] Notified of signal 23 D0712 23:58:58.395765 754374 task_signals.go:220] [ 835: 835] Signal 23: delivering to handler I0712 23:58:58.403226 754374 compat.go:120] Unsupported syscall mq_getsetattr(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_getsetattr for more information. D0712 23:58:58.403344 754374 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.403358 754374 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001362060 14 D0712 23:58:58.403369 754374 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 23:58:58.403430 754374 task_exit.go:204] [ 835: 835] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.403478 754374 task_exit.go:204] [ 835: 835] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.403520 754374 task_signals.go:204] [ 835: 839] Signal 835, PID: 839, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.403532 754374 task_signals.go:204] [ 835: 837] Signal 835, PID: 837, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.403542 754374 task_signals.go:204] [ 835: 838] Signal 835, PID: 838, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.403559 754374 task_exit.go:204] [ 835: 839] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.403586 754374 task_signals.go:204] [ 835: 836] Signal 835, PID: 836, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.403612 754374 task_exit.go:204] [ 835: 836] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.403619 754374 task_exit.go:204] [ 835: 837] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.403632 754374 task_exit.go:204] [ 835: 838] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.403706 754374 task_exit.go:204] [ 835: 839] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.403722 754374 task_exit.go:204] [ 835: 839] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.403739 754374 task_exit.go:204] [ 835: 837] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.403750 754374 task_exit.go:204] [ 835: 837] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.403762 754374 task_exit.go:204] [ 835: 836] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.403768 754374 task_exit.go:204] [ 835: 836] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.404730 754374 task_exit.go:204] [ 835: 838] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.404751 754374 task_exit.go:204] [ 835: 838] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.404769 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.404794 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:58.404808 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.405032 754374 task_exit.go:204] [ 835: 835] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.405375 754374 task_signals.go:470] [ 5: 15] Notified of signal 23 D0712 23:58:58.405406 754374 task_signals.go:220] [ 5: 15] Signal 23: delivering to handler D0712 23:58:58.405705 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.406913 754374 syscalls.go:262] [ 840: 840] Allocating stack with size of 8388608 bytes D0712 23:58:58.407083 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.407947 754374 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.407978 754374 usertrap_amd64.go:106] [ 840: 840] Map a usertrap vma at 69000 D0712 23:58:58.408053 754374 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc0019f40f0 1 D0712 23:58:58.408072 754374 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 23:58:58.408450 754374 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.408473 754374 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc0019f40f0 2 D0712 23:58:58.408484 754374 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 23:58:58.408897 754374 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.408922 754374 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc0019f40f0 3 D0712 23:58:58.408934 754374 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 23:58:58.414454 754374 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.414476 754374 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc0019f40f0 4 D0712 23:58:58.414487 754374 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 23:58:58.415531 754374 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.415558 754374 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc0019f40f0 5 D0712 23:58:58.415565 754374 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 23:58:58.415607 754374 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.415618 754374 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc0019f40f0 6 D0712 23:58:58.415623 754374 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 23:58:58.415856 754374 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.415880 754374 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc0019f40f0 7 D0712 23:58:58.415893 754374 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 23:58:58.416027 754374 usertrap_amd64.go:212] [ 840: 841] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.416050 754374 usertrap_amd64.go:122] [ 840: 841] Allocate a new trap: 0xc0019f40f0 8 D0712 23:58:58.416062 754374 usertrap_amd64.go:225] [ 840: 841] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 23:58:58.416201 754374 usertrap_amd64.go:212] [ 840: 841] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.416226 754374 usertrap_amd64.go:122] [ 840: 841] Allocate a new trap: 0xc0019f40f0 9 D0712 23:58:58.416236 754374 usertrap_amd64.go:225] [ 840: 841] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 23:58:58.416352 754374 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.416370 754374 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc0019f40f0 10 D0712 23:58:58.416379 754374 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 23:58:58.422892 754374 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.422920 754374 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc0019f40f0 11 D0712 23:58:58.422930 754374 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 23:58:58.427058 754374 usertrap_amd64.go:212] [ 840: 841] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.427126 754374 usertrap_amd64.go:122] [ 840: 841] Allocate a new trap: 0xc0019f40f0 12 D0712 23:58:58.427153 754374 usertrap_amd64.go:225] [ 840: 841] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 23:58:58.427205 754374 usertrap_amd64.go:212] [ 840: 841] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.427231 754374 usertrap_amd64.go:122] [ 840: 841] Allocate a new trap: 0xc0019f40f0 13 D0712 23:58:58.427243 754374 usertrap_amd64.go:225] [ 840: 841] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 23:58:58.427321 754374 task_signals.go:470] [ 840: 840] Notified of signal 23 D0712 23:58:58.427519 754374 task_signals.go:220] [ 840: 840] Signal 23: delivering to handler I0712 23:58:58.432522 754374 compat.go:120] Unsupported syscall mq_notify(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_notify for more information. D0712 23:58:58.432604 754374 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.432615 754374 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc0019f40f0 14 D0712 23:58:58.432627 754374 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 23:58:58.432680 754374 task_exit.go:204] [ 840: 840] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.432708 754374 task_exit.go:204] [ 840: 840] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.432726 754374 task_signals.go:204] [ 840: 843] Signal 840, PID: 843, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.432722 754374 task_signals.go:204] [ 840: 841] Signal 840, PID: 841, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.432740 754374 task_exit.go:204] [ 840: 843] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.432769 754374 task_signals.go:204] [ 840: 844] Signal 840, PID: 844, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.432782 754374 task_signals.go:204] [ 840: 842] Signal 840, PID: 842, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.432791 754374 task_exit.go:204] [ 840: 843] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.432795 754374 task_exit.go:204] [ 840: 843] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.432804 754374 task_exit.go:204] [ 840: 844] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.432809 754374 task_exit.go:204] [ 840: 844] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.432812 754374 task_exit.go:204] [ 840: 844] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.432819 754374 task_exit.go:204] [ 840: 842] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.432823 754374 task_exit.go:204] [ 840: 842] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.432826 754374 task_exit.go:204] [ 840: 842] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.432831 754374 task_exit.go:204] [ 840: 841] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.433831 754374 task_exit.go:204] [ 840: 841] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.433861 754374 task_exit.go:204] [ 840: 841] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.433875 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.433958 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:58.433986 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.434094 754374 task_exit.go:204] [ 840: 840] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.434525 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.435589 754374 syscalls.go:262] [ 845: 845] Allocating stack with size of 8388608 bytes D0712 23:58:58.435694 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.436800 754374 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.436861 754374 usertrap_amd64.go:106] [ 845: 845] Map a usertrap vma at 66000 D0712 23:58:58.436990 754374 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001ebc660 1 D0712 23:58:58.437025 754374 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:58.437212 754374 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.437236 754374 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001ebc660 2 D0712 23:58:58.437245 754374 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:58.437675 754374 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.437694 754374 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001ebc660 3 D0712 23:58:58.437702 754374 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:58.442530 754374 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.442569 754374 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001ebc660 4 D0712 23:58:58.442577 754374 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:58.443439 754374 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.443461 754374 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001ebc660 5 D0712 23:58:58.443466 754374 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:58.443512 754374 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.443528 754374 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001ebc660 6 D0712 23:58:58.443538 754374 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:58.444035 754374 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.444063 754374 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001ebc660 7 D0712 23:58:58.444069 754374 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:58.444133 754374 usertrap_amd64.go:212] [ 845: 846] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.444139 754374 usertrap_amd64.go:122] [ 845: 846] Allocate a new trap: 0xc001ebc660 8 D0712 23:58:58.444144 754374 usertrap_amd64.go:225] [ 845: 846] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:58.444269 754374 usertrap_amd64.go:212] [ 845: 846] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.444287 754374 usertrap_amd64.go:122] [ 845: 846] Allocate a new trap: 0xc001ebc660 9 D0712 23:58:58.444293 754374 usertrap_amd64.go:225] [ 845: 846] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:58.444307 754374 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.444311 754374 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001ebc660 10 D0712 23:58:58.444316 754374 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:58.450263 754374 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.450291 754374 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001ebc660 11 D0712 23:58:58.450300 754374 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:58.454531 754374 usertrap_amd64.go:212] [ 845: 846] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.454603 754374 usertrap_amd64.go:122] [ 845: 846] Allocate a new trap: 0xc001ebc660 12 D0712 23:58:58.454615 754374 usertrap_amd64.go:225] [ 845: 846] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:58.456139 754374 usertrap_amd64.go:212] [ 845: 846] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.456301 754374 usertrap_amd64.go:122] [ 845: 846] Allocate a new trap: 0xc001ebc660 13 D0712 23:58:58.456391 754374 usertrap_amd64.go:225] [ 845: 846] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:58.456573 754374 task_signals.go:470] [ 845: 845] Notified of signal 23 D0712 23:58:58.456706 754374 task_signals.go:220] [ 845: 845] Signal 23: delivering to handler D0712 23:58:58.459753 754374 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.459808 754374 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001ebc660 14 D0712 23:58:58.459828 754374 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:58.459961 754374 task_exit.go:204] [ 845: 845] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.460030 754374 task_exit.go:204] [ 845: 845] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.460057 754374 task_signals.go:204] [ 845: 847] Signal 845, PID: 847, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.460094 754374 task_exit.go:204] [ 845: 847] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.460111 754374 task_exit.go:204] [ 845: 847] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.460116 754374 task_exit.go:204] [ 845: 847] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.460129 754374 task_signals.go:204] [ 845: 846] Signal 845, PID: 846, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.460149 754374 task_exit.go:204] [ 845: 846] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.460155 754374 task_exit.go:204] [ 845: 846] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.460158 754374 task_exit.go:204] [ 845: 846] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.460166 754374 task_signals.go:204] [ 845: 848] Signal 845, PID: 848, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.460172 754374 task_exit.go:204] [ 845: 848] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.460176 754374 task_exit.go:204] [ 845: 848] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.460179 754374 task_exit.go:204] [ 845: 848] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.460186 754374 task_signals.go:204] [ 845: 849] Signal 845, PID: 849, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.460191 754374 task_exit.go:204] [ 845: 849] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.461490 754374 task_exit.go:204] [ 845: 849] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.461511 754374 task_exit.go:204] [ 845: 849] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.461530 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.461554 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:58.461569 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.461925 754374 task_exit.go:204] [ 845: 845] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.462632 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.464367 754374 syscalls.go:262] [ 850: 850] Allocating stack with size of 8388608 bytes D0712 23:58:58.464647 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.465721 754374 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.465774 754374 usertrap_amd64.go:106] [ 850: 850] Map a usertrap vma at 69000 D0712 23:58:58.465888 754374 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc001ebc810 1 D0712 23:58:58.465940 754374 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 23:58:58.466180 754374 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.466207 754374 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc001ebc810 2 D0712 23:58:58.466219 754374 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 23:58:58.466892 754374 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.466921 754374 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc001ebc810 3 D0712 23:58:58.466935 754374 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 23:58:58.473078 754374 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.473200 754374 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc001ebc810 4 D0712 23:58:58.473237 754374 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 23:58:58.474229 754374 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.474250 754374 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc001ebc810 5 D0712 23:58:58.474259 754374 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 23:58:58.474312 754374 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.474325 754374 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc001ebc810 6 D0712 23:58:58.474338 754374 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 23:58:58.474503 754374 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.474515 754374 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc001ebc810 7 D0712 23:58:58.474521 754374 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 23:58:58.474649 754374 usertrap_amd64.go:212] [ 850: 851] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.474668 754374 usertrap_amd64.go:122] [ 850: 851] Allocate a new trap: 0xc001ebc810 8 D0712 23:58:58.474677 754374 usertrap_amd64.go:225] [ 850: 851] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 23:58:58.474840 754374 usertrap_amd64.go:212] [ 850: 851] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.474875 754374 usertrap_amd64.go:122] [ 850: 851] Allocate a new trap: 0xc001ebc810 9 D0712 23:58:58.474889 754374 usertrap_amd64.go:225] [ 850: 851] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 23:58:58.474953 754374 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.474965 754374 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc001ebc810 10 D0712 23:58:58.474974 754374 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 23:58:58.475349 754374 usertrap_amd64.go:212] [ 850: 851] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.475378 754374 usertrap_amd64.go:122] [ 850: 851] Allocate a new trap: 0xc001ebc810 11 D0712 23:58:58.475386 754374 usertrap_amd64.go:225] [ 850: 851] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 23:58:58.475518 754374 usertrap_amd64.go:212] [ 850: 851] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.475540 754374 usertrap_amd64.go:122] [ 850: 851] Allocate a new trap: 0xc001ebc810 12 D0712 23:58:58.475640 754374 usertrap_amd64.go:225] [ 850: 851] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 23:58:58.475696 754374 task_signals.go:470] [ 850: 850] Notified of signal 23 D0712 23:58:58.475718 754374 task_signals.go:220] [ 850: 850] Signal 23: delivering to handler D0712 23:58:58.482885 754374 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.482921 754374 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc001ebc810 13 D0712 23:58:58.482933 754374 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 23:58:58.485928 754374 task_signals.go:470] [ 850: 850] Notified of signal 23 D0712 23:58:58.485977 754374 task_signals.go:220] [ 850: 850] Signal 23: delivering to handler executing program I0712 23:58:58.494762 754374 compat.go:120] Unsupported syscall mq_timedreceive(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedreceive for more information. D0712 23:58:58.494905 754374 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.494936 754374 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc001ebc810 14 D0712 23:58:58.494963 754374 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 23:58:58.495013 754374 task_exit.go:204] [ 850: 850] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.495037 754374 task_exit.go:204] [ 850: 850] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.495038 754374 task_signals.go:204] [ 850: 853] Signal 850, PID: 853, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.495058 754374 task_exit.go:204] [ 850: 853] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.495072 754374 task_exit.go:204] [ 850: 853] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.495096 754374 task_exit.go:204] [ 850: 853] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.495116 754374 task_signals.go:204] [ 850: 854] Signal 850, PID: 854, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.495127 754374 task_exit.go:204] [ 850: 854] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.495135 754374 task_exit.go:204] [ 850: 854] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.495140 754374 task_exit.go:204] [ 850: 854] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.495159 754374 task_signals.go:204] [ 850: 852] Signal 850, PID: 852, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.495181 754374 task_exit.go:204] [ 850: 852] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.495190 754374 task_exit.go:204] [ 850: 852] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.495197 754374 task_exit.go:204] [ 850: 852] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.495214 754374 task_signals.go:204] [ 850: 851] Signal 850, PID: 851, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.495240 754374 task_exit.go:204] [ 850: 851] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.496453 754374 task_exit.go:204] [ 850: 851] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.496491 754374 task_exit.go:204] [ 850: 851] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.496506 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.496538 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:58.496547 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.496645 754374 task_exit.go:204] [ 850: 850] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.497409 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.498758 754374 syscalls.go:262] [ 855: 855] Allocating stack with size of 8388608 bytes D0712 23:58:58.498906 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.501485 754374 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.501535 754374 usertrap_amd64.go:106] [ 855: 855] Map a usertrap vma at 60000 D0712 23:58:58.501596 754374 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc000fb2b70 1 D0712 23:58:58.501622 754374 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:58:58.502126 754374 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.502167 754374 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc000fb2b70 2 D0712 23:58:58.502183 754374 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:58:58.503042 754374 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.503073 754374 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc000fb2b70 3 D0712 23:58:58.503085 754374 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:58:58.510886 754374 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.510923 754374 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc000fb2b70 4 D0712 23:58:58.510936 754374 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:58:58.512048 754374 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.512078 754374 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc000fb2b70 5 D0712 23:58:58.512086 754374 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:58:58.512143 754374 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.512148 754374 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc000fb2b70 6 D0712 23:58:58.512152 754374 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:58:58.512385 754374 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.512411 754374 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc000fb2b70 7 D0712 23:58:58.512421 754374 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:58:58.512916 754374 usertrap_amd64.go:212] [ 855: 856] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.513037 754374 usertrap_amd64.go:122] [ 855: 856] Allocate a new trap: 0xc000fb2b70 8 D0712 23:58:58.513074 754374 usertrap_amd64.go:225] [ 855: 856] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:58:58.513234 754374 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.513264 754374 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc000fb2b70 9 D0712 23:58:58.513275 754374 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:58:58.513290 754374 usertrap_amd64.go:212] [ 855: 856] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.513321 754374 usertrap_amd64.go:122] [ 855: 856] Allocate a new trap: 0xc000fb2b70 10 D0712 23:58:58.513332 754374 usertrap_amd64.go:225] [ 855: 856] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:58:58.513853 754374 usertrap_amd64.go:212] [ 855: 856] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.513892 754374 usertrap_amd64.go:122] [ 855: 856] Allocate a new trap: 0xc000fb2b70 11 D0712 23:58:58.513905 754374 usertrap_amd64.go:225] [ 855: 856] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:58:58.513993 754374 usertrap_amd64.go:212] [ 855: 856] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.514010 754374 usertrap_amd64.go:122] [ 855: 856] Allocate a new trap: 0xc000fb2b70 12 D0712 23:58:58.514019 754374 usertrap_amd64.go:225] [ 855: 856] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:58:58.514040 754374 task_signals.go:470] [ 855: 855] Notified of signal 23 D0712 23:58:58.514360 754374 task_signals.go:220] [ 855: 855] Signal 23: delivering to handler D0712 23:58:58.522241 754374 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.522279 754374 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc000fb2b70 13 D0712 23:58:58.522295 754374 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:58:58.525016 754374 task_signals.go:470] [ 855: 855] Notified of signal 23 D0712 23:58:58.525132 754374 task_signals.go:220] [ 855: 855] Signal 23: delivering to handler I0712 23:58:58.533823 754374 compat.go:120] Unsupported syscall mq_timedsend(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedsend for more information. D0712 23:58:58.533899 754374 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.533913 754374 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc000fb2b70 14 D0712 23:58:58.533924 754374 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:58:58.533962 754374 task_exit.go:204] [ 855: 855] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.533982 754374 task_exit.go:204] [ 855: 855] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.534021 754374 task_signals.go:204] [ 855: 858] Signal 855, PID: 858, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.534152 754374 task_exit.go:204] [ 855: 858] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.534169 754374 task_exit.go:204] [ 855: 858] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.534173 754374 task_exit.go:204] [ 855: 858] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.534031 754374 task_signals.go:204] [ 855: 856] Signal 855, PID: 856, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.534188 754374 task_exit.go:204] [ 855: 856] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.534193 754374 task_exit.go:204] [ 855: 856] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.534196 754374 task_exit.go:204] [ 855: 856] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.534023 754374 task_signals.go:204] [ 855: 857] Signal 855, PID: 857, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.534204 754374 task_exit.go:204] [ 855: 857] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.534208 754374 task_exit.go:204] [ 855: 857] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.534212 754374 task_exit.go:204] [ 855: 857] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.534048 754374 task_signals.go:204] [ 855: 859] Signal 855, PID: 859, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.534221 754374 task_exit.go:204] [ 855: 859] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.535493 754374 task_exit.go:204] [ 855: 859] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.535523 754374 task_exit.go:204] [ 855: 859] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.535539 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.535612 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:58.535638 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.535783 754374 task_exit.go:204] [ 855: 855] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.536368 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.537903 754374 syscalls.go:262] [ 860: 860] Allocating stack with size of 8388608 bytes D0712 23:58:58.538025 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.539297 754374 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.539343 754374 usertrap_amd64.go:106] [ 860: 860] Map a usertrap vma at 69000 D0712 23:58:58.539499 754374 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc0009be2d0 1 D0712 23:58:58.539523 754374 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 23:58:58.540016 754374 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.540063 754374 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc0009be2d0 2 D0712 23:58:58.540077 754374 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 23:58:58.540792 754374 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.540823 754374 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc0009be2d0 3 D0712 23:58:58.540841 754374 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 23:58:58.546821 754374 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.546863 754374 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc0009be2d0 4 D0712 23:58:58.546875 754374 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 23:58:58.547951 754374 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.547991 754374 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc0009be2d0 5 D0712 23:58:58.548006 754374 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 23:58:58.548063 754374 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.548083 754374 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc0009be2d0 6 D0712 23:58:58.548093 754374 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 23:58:58.548359 754374 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.548377 754374 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc0009be2d0 7 D0712 23:58:58.548390 754374 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 23:58:58.548569 754374 usertrap_amd64.go:212] [ 860: 861] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.548599 754374 usertrap_amd64.go:122] [ 860: 861] Allocate a new trap: 0xc0009be2d0 8 D0712 23:58:58.548612 754374 usertrap_amd64.go:225] [ 860: 861] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 23:58:58.548993 754374 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.549019 754374 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc0009be2d0 9 D0712 23:58:58.549030 754374 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 23:58:58.549042 754374 usertrap_amd64.go:212] [ 860: 861] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.549049 754374 usertrap_amd64.go:122] [ 860: 861] Allocate a new trap: 0xc0009be2d0 10 D0712 23:58:58.549056 754374 usertrap_amd64.go:225] [ 860: 861] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 23:58:58.557607 754374 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.557648 754374 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc0009be2d0 11 D0712 23:58:58.557663 754374 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 23:58:58.560395 754374 usertrap_amd64.go:212] [ 860: 861] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.560444 754374 usertrap_amd64.go:122] [ 860: 861] Allocate a new trap: 0xc0009be2d0 12 D0712 23:58:58.560464 754374 usertrap_amd64.go:225] [ 860: 861] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 23:58:58.560515 754374 usertrap_amd64.go:212] [ 860: 861] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.560547 754374 usertrap_amd64.go:122] [ 860: 861] Allocate a new trap: 0xc0009be2d0 13 D0712 23:58:58.560560 754374 usertrap_amd64.go:225] [ 860: 861] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 23:58:58.560624 754374 task_signals.go:470] [ 860: 860] Notified of signal 23 D0712 23:58:58.560752 754374 task_signals.go:220] [ 860: 860] Signal 23: delivering to handler D0712 23:58:58.569726 754374 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.569771 754374 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc0009be2d0 14 D0712 23:58:58.569786 754374 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 23:58:58.569968 754374 task_exit.go:204] [ 860: 860] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.570005 754374 task_exit.go:204] [ 860: 860] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.570028 754374 task_signals.go:204] [ 860: 864] Signal 860, PID: 864, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.570025 754374 task_signals.go:204] [ 860: 862] Signal 860, PID: 862, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.570035 754374 task_signals.go:204] [ 860: 863] Signal 860, PID: 863, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.570038 754374 task_exit.go:204] [ 860: 864] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.570070 754374 task_exit.go:204] [ 860: 864] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.570091 754374 task_exit.go:204] [ 860: 864] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.570117 754374 task_signals.go:204] [ 860: 861] Signal 860, PID: 861, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.570137 754374 task_exit.go:204] [ 860: 861] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.570146 754374 task_exit.go:204] [ 860: 861] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.570153 754374 task_exit.go:204] [ 860: 861] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.570164 754374 task_exit.go:204] [ 860: 862] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.570175 754374 task_exit.go:204] [ 860: 862] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.570190 754374 task_exit.go:204] [ 860: 862] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.570209 754374 task_exit.go:204] [ 860: 863] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.571478 754374 task_exit.go:204] [ 860: 863] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.571572 754374 task_exit.go:204] [ 860: 863] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.571609 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.571638 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:58.571648 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.571756 754374 task_exit.go:204] [ 860: 860] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.572449 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.572841 754374 task_signals.go:481] [ 5: 15] No task notified of signal 23 D0712 23:58:58.574445 754374 syscalls.go:262] [ 865: 865] Allocating stack with size of 8388608 bytes D0712 23:58:58.574569 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.574730 754374 task_signals.go:220] [ 5: 15] Signal 23: delivering to handler D0712 23:58:58.574978 754374 task_signals.go:470] [ 5: 15] Notified of signal 23 D0712 23:58:58.575103 754374 task_signals.go:220] [ 5: 15] Signal 23: delivering to handler D0712 23:58:58.576259 754374 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.576319 754374 usertrap_amd64.go:106] [ 865: 865] Map a usertrap vma at 65000 D0712 23:58:58.576441 754374 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001ebcc90 1 D0712 23:58:58.576482 754374 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 23:58:58.576738 754374 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.576759 754374 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001ebcc90 2 D0712 23:58:58.576767 754374 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 23:58:58.577328 754374 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.577363 754374 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001ebcc90 3 D0712 23:58:58.577376 754374 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 23:58:58.583842 754374 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.583878 754374 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001ebcc90 4 D0712 23:58:58.583898 754374 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 23:58:58.585318 754374 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.585372 754374 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001ebcc90 5 D0712 23:58:58.585393 754374 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 23:58:58.585481 754374 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.585503 754374 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001ebcc90 6 D0712 23:58:58.585513 754374 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 23:58:58.586056 754374 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.586081 754374 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001ebcc90 7 D0712 23:58:58.586090 754374 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 23:58:58.586311 754374 usertrap_amd64.go:212] [ 865: 866] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.586325 754374 usertrap_amd64.go:122] [ 865: 866] Allocate a new trap: 0xc001ebcc90 8 D0712 23:58:58.586335 754374 usertrap_amd64.go:225] [ 865: 866] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 23:58:58.586558 754374 usertrap_amd64.go:212] [ 865: 866] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.586588 754374 usertrap_amd64.go:122] [ 865: 866] Allocate a new trap: 0xc001ebcc90 9 D0712 23:58:58.586606 754374 usertrap_amd64.go:225] [ 865: 866] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 23:58:58.586693 754374 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.586703 754374 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001ebcc90 10 D0712 23:58:58.586712 754374 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 23:58:58.587191 754374 usertrap_amd64.go:212] [ 865: 866] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.587223 754374 usertrap_amd64.go:122] [ 865: 866] Allocate a new trap: 0xc001ebcc90 11 D0712 23:58:58.587303 754374 usertrap_amd64.go:225] [ 865: 866] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 23:58:58.587365 754374 usertrap_amd64.go:212] [ 865: 866] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.587388 754374 usertrap_amd64.go:122] [ 865: 866] Allocate a new trap: 0xc001ebcc90 12 D0712 23:58:58.587401 754374 usertrap_amd64.go:225] [ 865: 866] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 23:58:58.587435 754374 task_signals.go:470] [ 865: 865] Notified of signal 23 D0712 23:58:58.587495 754374 task_signals.go:220] [ 865: 865] Signal 23: delivering to handler D0712 23:58:58.594592 754374 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.594621 754374 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001ebcc90 13 D0712 23:58:58.594630 754374 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 23:58:58.598993 754374 task_signals.go:470] [ 865: 865] Notified of signal 23 D0712 23:58:58.599035 754374 task_signals.go:179] [ 865: 865] Restarting syscall 202: interrupted by signal 23 D0712 23:58:58.599046 754374 task_signals.go:220] [ 865: 865] Signal 23: delivering to handler D0712 23:58:58.605077 754374 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.605125 754374 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001ebcc90 14 D0712 23:58:58.605142 754374 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 23:58:58.605223 754374 task_exit.go:204] [ 865: 865] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.605264 754374 task_exit.go:204] [ 865: 865] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.605285 754374 task_signals.go:204] [ 865: 866] Signal 865, PID: 866, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.605307 754374 task_signals.go:204] [ 865: 869] Signal 865, PID: 869, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.605307 754374 task_signals.go:204] [ 865: 867] Signal 865, PID: 867, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.605327 754374 task_signals.go:204] [ 865: 868] Signal 865, PID: 868, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.605328 754374 task_exit.go:204] [ 865: 866] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.605361 754374 task_exit.go:204] [ 865: 866] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.605379 754374 task_exit.go:204] [ 865: 866] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.605398 754374 task_exit.go:204] [ 865: 867] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.605417 754374 task_exit.go:204] [ 865: 867] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.605424 754374 task_exit.go:204] [ 865: 867] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.605438 754374 task_exit.go:204] [ 865: 869] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.605447 754374 task_exit.go:204] [ 865: 869] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.605454 754374 task_exit.go:204] [ 865: 869] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.605468 754374 task_exit.go:204] [ 865: 868] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.606526 754374 task_exit.go:204] [ 865: 868] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.606568 754374 task_exit.go:204] [ 865: 868] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.606589 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.606637 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:58.606657 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.606801 754374 task_exit.go:204] [ 865: 865] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.606916 754374 task_signals.go:470] [ 5: 15] Notified of signal 23 D0712 23:58:58.607051 754374 task_signals.go:220] [ 5: 15] Signal 23: delivering to handler D0712 23:58:58.607590 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.609278 754374 syscalls.go:262] [ 870: 870] Allocating stack with size of 8388608 bytes D0712 23:58:58.609545 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.610550 754374 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.610644 754374 usertrap_amd64.go:106] [ 870: 870] Map a usertrap vma at 63000 D0712 23:58:58.610749 754374 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc001e564e0 1 D0712 23:58:58.610776 754374 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:58:58.611114 754374 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.611136 754374 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc001e564e0 2 D0712 23:58:58.611144 754374 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:58:58.611700 754374 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.611736 754374 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc001e564e0 3 D0712 23:58:58.611752 754374 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:58:58.618334 754374 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.618360 754374 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc001e564e0 4 D0712 23:58:58.618400 754374 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:58:58.620336 754374 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.620374 754374 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc001e564e0 5 D0712 23:58:58.620393 754374 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:58:58.620493 754374 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.620567 754374 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc001e564e0 6 D0712 23:58:58.620594 754374 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:58:58.621202 754374 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.621227 754374 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc001e564e0 7 D0712 23:58:58.621236 754374 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:58:58.621433 754374 usertrap_amd64.go:212] [ 870: 871] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.621490 754374 usertrap_amd64.go:122] [ 870: 871] Allocate a new trap: 0xc001e564e0 8 D0712 23:58:58.621521 754374 usertrap_amd64.go:225] [ 870: 871] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:58:58.621695 754374 usertrap_amd64.go:212] [ 870: 871] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.621731 754374 usertrap_amd64.go:122] [ 870: 871] Allocate a new trap: 0xc001e564e0 9 D0712 23:58:58.621742 754374 usertrap_amd64.go:225] [ 870: 871] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:58:58.621754 754374 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.621762 754374 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc001e564e0 10 D0712 23:58:58.621769 754374 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:58:58.621834 754374 usertrap_amd64.go:212] [ 870: 871] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.621867 754374 usertrap_amd64.go:122] [ 870: 871] Allocate a new trap: 0xc001e564e0 11 D0712 23:58:58.621881 754374 usertrap_amd64.go:225] [ 870: 871] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:58:58.622071 754374 usertrap_amd64.go:212] [ 870: 871] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.622089 754374 usertrap_amd64.go:122] [ 870: 871] Allocate a new trap: 0xc001e564e0 12 D0712 23:58:58.622101 754374 usertrap_amd64.go:225] [ 870: 871] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:58:58.622140 754374 task_signals.go:470] [ 870: 873] Notified of signal 23 D0712 23:58:58.622155 754374 task_signals.go:179] [ 870: 873] Restarting syscall 202: interrupted by signal 23 D0712 23:58:58.622163 754374 task_signals.go:220] [ 870: 873] Signal 23: delivering to handler D0712 23:58:58.629852 754374 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.629882 754374 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc001e564e0 13 D0712 23:58:58.629895 754374 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:58:58.632596 754374 task_signals.go:470] [ 870: 870] Notified of signal 23 D0712 23:58:58.632652 754374 task_signals.go:220] [ 870: 870] Signal 23: delivering to handler D0712 23:58:58.641223 754374 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.641275 754374 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc001e564e0 14 D0712 23:58:58.641292 754374 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:58:58.641387 754374 task_exit.go:204] [ 870: 870] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.641535 754374 task_exit.go:204] [ 870: 870] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.641594 754374 task_signals.go:204] [ 870: 872] Signal 870, PID: 872, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.641614 754374 task_exit.go:204] [ 870: 872] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.641623 754374 task_exit.go:204] [ 870: 872] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.641629 754374 task_exit.go:204] [ 870: 872] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.641651 754374 task_signals.go:204] [ 870: 871] Signal 870, PID: 871, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.641712 754374 task_exit.go:204] [ 870: 871] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.641761 754374 task_exit.go:204] [ 870: 871] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.641768 754374 task_exit.go:204] [ 870: 871] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.641796 754374 task_signals.go:204] [ 870: 873] Signal 870, PID: 873, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.641820 754374 task_exit.go:204] [ 870: 873] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.641829 754374 task_exit.go:204] [ 870: 873] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.641844 754374 task_exit.go:204] [ 870: 873] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.641865 754374 task_signals.go:204] [ 870: 874] Signal 870, PID: 874, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.641889 754374 task_exit.go:204] [ 870: 874] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.643040 754374 task_exit.go:204] [ 870: 874] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.643083 754374 task_exit.go:204] [ 870: 874] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.643100 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.643140 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:58.643162 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.643250 754374 task_exit.go:204] [ 870: 870] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.644214 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.645839 754374 syscalls.go:262] [ 875: 875] Allocating stack with size of 8388608 bytes D0712 23:58:58.646065 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.648616 754374 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.648681 754374 usertrap_amd64.go:106] [ 875: 875] Map a usertrap vma at 65000 D0712 23:58:58.648759 754374 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0009bebd0 1 D0712 23:58:58.648788 754374 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 23:58:58.649426 754374 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.649459 754374 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0009bebd0 2 D0712 23:58:58.649479 754374 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 23:58:58.650487 754374 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.650521 754374 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0009bebd0 3 D0712 23:58:58.650532 754374 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 23:58:58.658318 754374 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.658342 754374 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0009bebd0 4 D0712 23:58:58.658360 754374 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 23:58:58.659474 754374 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.659509 754374 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0009bebd0 5 D0712 23:58:58.659525 754374 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 23:58:58.659580 754374 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.659585 754374 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0009bebd0 6 D0712 23:58:58.659591 754374 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 23:58:58.659818 754374 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.659844 754374 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0009bebd0 7 D0712 23:58:58.659854 754374 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 23:58:58.660053 754374 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.660066 754374 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc0009bebd0 8 D0712 23:58:58.660076 754374 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 23:58:58.660414 754374 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.660447 754374 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc0009bebd0 9 D0712 23:58:58.660459 754374 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 23:58:58.660518 754374 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.660538 754374 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0009bebd0 10 D0712 23:58:58.660546 754374 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 23:58:58.669968 754374 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.670008 754374 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0009bebd0 11 D0712 23:58:58.670024 754374 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 23:58:58.670694 754374 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.670732 754374 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc0009bebd0 12 D0712 23:58:58.670748 754374 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 23:58:58.672643 754374 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.672690 754374 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc0009bebd0 13 D0712 23:58:58.672714 754374 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 23:58:58.672759 754374 task_signals.go:470] [ 875: 875] Notified of signal 23 D0712 23:58:58.672986 754374 task_signals.go:220] [ 875: 875] Signal 23: delivering to handler D0712 23:58:58.673167 754374 task_signals.go:470] [ 875: 875] Notified of signal 23 D0712 23:58:58.673230 754374 task_signals.go:220] [ 875: 875] Signal 23: delivering to handler D0712 23:58:58.682591 754374 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.682627 754374 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0009bebd0 14 D0712 23:58:58.682646 754374 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 23:58:58.682842 754374 task_exit.go:204] [ 875: 875] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.682883 754374 task_exit.go:204] [ 875: 875] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.682913 754374 task_signals.go:204] [ 875: 876] Signal 875, PID: 876, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.682929 754374 task_exit.go:204] [ 875: 876] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.682957 754374 task_exit.go:204] [ 875: 876] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.682976 754374 task_exit.go:204] [ 875: 876] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.683001 754374 task_signals.go:204] [ 875: 877] Signal 875, PID: 877, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.683018 754374 task_signals.go:204] [ 875: 878] Signal 875, PID: 878, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.683029 754374 task_exit.go:204] [ 875: 877] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.683044 754374 task_signals.go:204] [ 875: 879] Signal 875, PID: 879, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.683061 754374 task_exit.go:204] [ 875: 877] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.683080 754374 task_exit.go:204] [ 875: 877] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.683097 754374 task_exit.go:204] [ 875: 878] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.683200 754374 task_exit.go:204] [ 875: 878] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.683212 754374 task_exit.go:204] [ 875: 878] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.683236 754374 task_exit.go:204] [ 875: 879] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.684438 754374 task_exit.go:204] [ 875: 879] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.684490 754374 task_exit.go:204] [ 875: 879] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.684513 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.684547 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:58.684558 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.684739 754374 task_exit.go:204] [ 875: 875] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.685035 754374 task_signals.go:470] [ 5: 15] Notified of signal 23 D0712 23:58:58.685086 754374 task_signals.go:220] [ 5: 15] Signal 23: delivering to handler D0712 23:58:58.685664 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.687355 754374 syscalls.go:262] [ 880: 880] Allocating stack with size of 8388608 bytes D0712 23:58:58.687475 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.688657 754374 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.688697 754374 usertrap_amd64.go:106] [ 880: 880] Map a usertrap vma at 61000 D0712 23:58:58.688794 754374 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc0009bef30 1 D0712 23:58:58.688830 754374 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 23:58:58.689244 754374 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.689270 754374 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc0009bef30 2 D0712 23:58:58.689281 754374 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 23:58:58.690127 754374 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.690192 754374 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc0009bef30 3 D0712 23:58:58.690211 754374 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 23:58:58.699027 754374 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.699060 754374 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc0009bef30 4 D0712 23:58:58.699089 754374 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 23:58:58.700456 754374 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.700475 754374 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc0009bef30 5 D0712 23:58:58.700484 754374 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 23:58:58.700533 754374 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.700542 754374 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc0009bef30 6 D0712 23:58:58.700552 754374 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 23:58:58.700806 754374 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.700829 754374 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc0009bef30 7 D0712 23:58:58.700839 754374 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 23:58:58.701243 754374 usertrap_amd64.go:212] [ 880: 881] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.701272 754374 usertrap_amd64.go:122] [ 880: 881] Allocate a new trap: 0xc0009bef30 8 D0712 23:58:58.701286 754374 usertrap_amd64.go:225] [ 880: 881] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 23:58:58.701560 754374 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.701601 754374 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc0009bef30 9 D0712 23:58:58.701618 754374 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 23:58:58.701653 754374 usertrap_amd64.go:212] [ 880: 881] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.701667 754374 usertrap_amd64.go:122] [ 880: 881] Allocate a new trap: 0xc0009bef30 10 D0712 23:58:58.701679 754374 usertrap_amd64.go:225] [ 880: 881] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 23:58:58.711532 754374 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.711588 754374 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc0009bef30 11 D0712 23:58:58.711603 754374 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 23:58:58.714005 754374 usertrap_amd64.go:212] [ 880: 881] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.714049 754374 usertrap_amd64.go:122] [ 880: 881] Allocate a new trap: 0xc0009bef30 12 D0712 23:58:58.714070 754374 usertrap_amd64.go:225] [ 880: 881] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 23:58:58.714124 754374 usertrap_amd64.go:212] [ 880: 881] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.714147 754374 usertrap_amd64.go:122] [ 880: 881] Allocate a new trap: 0xc0009bef30 13 D0712 23:58:58.714160 754374 usertrap_amd64.go:225] [ 880: 881] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 23:58:58.714238 754374 task_signals.go:470] [ 880: 880] Notified of signal 23 D0712 23:58:58.714331 754374 task_signals.go:220] [ 880: 880] Signal 23: delivering to handler D0712 23:58:58.723428 754374 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.723483 754374 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc0009bef30 14 D0712 23:58:58.723506 754374 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 23:58:58.723581 754374 task_exit.go:204] [ 880: 880] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.723625 754374 task_exit.go:204] [ 880: 880] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.723660 754374 task_signals.go:204] [ 880: 884] Signal 880, PID: 884, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.723649 754374 task_signals.go:204] [ 880: 883] Signal 880, PID: 883, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.723685 754374 task_exit.go:204] [ 880: 884] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.723677 754374 task_signals.go:204] [ 880: 881] Signal 880, PID: 881, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.723698 754374 task_signals.go:204] [ 880: 882] Signal 880, PID: 882, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.723723 754374 task_exit.go:204] [ 880: 884] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.723740 754374 task_exit.go:204] [ 880: 884] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.723757 754374 task_exit.go:204] [ 880: 883] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.723769 754374 task_exit.go:204] [ 880: 883] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.723777 754374 task_exit.go:204] [ 880: 883] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.723791 754374 task_exit.go:204] [ 880: 881] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.723828 754374 task_exit.go:204] [ 880: 881] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.723837 754374 task_exit.go:204] [ 880: 881] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.723860 754374 task_exit.go:204] [ 880: 882] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.725042 754374 task_exit.go:204] [ 880: 882] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.725204 754374 task_exit.go:204] [ 880: 882] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.725236 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.725298 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:58.725320 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.725489 754374 task_exit.go:204] [ 880: 880] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.726299 754374 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.727641 754374 syscalls.go:262] [ 885: 885] Allocating stack with size of 8388608 bytes D0712 23:58:58.727759 754374 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.730025 754374 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.730065 754374 usertrap_amd64.go:106] [ 885: 885] Map a usertrap vma at 68000 D0712 23:58:58.730172 754374 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc000fb3410 1 D0712 23:58:58.730193 754374 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 23:58:58.730597 754374 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.730627 754374 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc000fb3410 2 D0712 23:58:58.730638 754374 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 23:58:58.731533 754374 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.731606 754374 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc000fb3410 3 D0712 23:58:58.731626 754374 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 23:58:58.738300 754374 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.738329 754374 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc000fb3410 4 D0712 23:58:58.738341 754374 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 23:58:58.739727 754374 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.739757 754374 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc000fb3410 5 D0712 23:58:58.739780 754374 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 23:58:58.739856 754374 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.739867 754374 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc000fb3410 6 D0712 23:58:58.739873 754374 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 23:58:58.740241 754374 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.740247 754374 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc000fb3410 7 D0712 23:58:58.740252 754374 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 23:58:58.740382 754374 usertrap_amd64.go:212] [ 885: 886] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.740401 754374 usertrap_amd64.go:122] [ 885: 886] Allocate a new trap: 0xc000fb3410 8 D0712 23:58:58.740408 754374 usertrap_amd64.go:225] [ 885: 886] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 23:58:58.740580 754374 usertrap_amd64.go:212] [ 885: 886] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.740599 754374 usertrap_amd64.go:122] [ 885: 886] Allocate a new trap: 0xc000fb3410 9 D0712 23:58:58.740605 754374 usertrap_amd64.go:225] [ 885: 886] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 23:58:58.740726 754374 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.740759 754374 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc000fb3410 10 D0712 23:58:58.740773 754374 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 23:58:58.741828 754374 usertrap_amd64.go:212] [ 885: 886] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.741863 754374 usertrap_amd64.go:122] [ 885: 886] Allocate a new trap: 0xc000fb3410 11 D0712 23:58:58.741876 754374 usertrap_amd64.go:225] [ 885: 886] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 23:58:58.741979 754374 usertrap_amd64.go:212] [ 885: 886] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.742019 754374 usertrap_amd64.go:122] [ 885: 886] Allocate a new trap: 0xc000fb3410 12 D0712 23:58:58.743484 754374 usertrap_amd64.go:225] [ 885: 886] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 23:58:58.743558 754374 task_signals.go:470] [ 885: 885] Notified of signal 23 D0712 23:58:58.743605 754374 task_signals.go:220] [ 885: 885] Signal 23: delivering to handler D0712 23:58:58.748343 754374 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.748374 754374 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc000fb3410 13 D0712 23:58:58.748383 754374 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 23:58:58.753812 754374 task_signals.go:470] [ 885: 885] Notified of signal 23 D0712 23:58:58.753912 754374 task_signals.go:220] [ 885: 885] Signal 23: delivering to handler D0712 23:58:58.760255 754374 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.760326 754374 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc000fb3410 14 D0712 23:58:58.760342 754374 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 23:58:58.760413 754374 task_exit.go:204] [ 885: 885] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.760446 754374 task_exit.go:204] [ 885: 885] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.760501 754374 task_signals.go:204] [ 885: 886] Signal 885, PID: 886, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.760517 754374 task_exit.go:204] [ 885: 886] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.760525 754374 task_exit.go:204] [ 885: 886] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.760530 754374 task_exit.go:204] [ 885: 886] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.760565 754374 task_signals.go:204] [ 885: 887] Signal 885, PID: 887, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.760577 754374 task_exit.go:204] [ 885: 887] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.760585 754374 task_exit.go:204] [ 885: 887] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.760590 754374 task_exit.go:204] [ 885: 887] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.760608 754374 task_signals.go:204] [ 885: 888] Signal 885, PID: 888, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.760629 754374 task_exit.go:204] [ 885: 888] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.760636 754374 task_exit.go:204] [ 885: 888] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.760641 754374 task_exit.go:204] [ 885: 888] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.760654 754374 task_signals.go:204] [ 885: 889] Signal 885, PID: 889, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.760663 754374 task_exit.go:204] [ 885: 889] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.761914 754374 task_exit.go:204] [ 885: 889] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.761960 754374 task_exit.go:204] [ 885: 889] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.761985 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.762018 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:58.762028 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.762201 754374 task_exit.go:204] [ 885: 885] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.763098 754374 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.764800 754374 syscalls.go:262] [ 890: 890] Allocating stack with size of 8388608 bytes D0712 23:58:58.765179 754374 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.767562 754374 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.767616 754374 usertrap_amd64.go:106] [ 890: 890] Map a usertrap vma at 6a000 D0712 23:58:58.767723 754374 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc001ebd230 1 D0712 23:58:58.767760 754374 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 23:58:58.769427 754374 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.769485 754374 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc001ebd230 2 D0712 23:58:58.769507 754374 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 23:58:58.770558 754374 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.770743 754374 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc001ebd230 3 D0712 23:58:58.770791 754374 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 23:58:58.778570 754374 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.778629 754374 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc001ebd230 4 D0712 23:58:58.778647 754374 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 23:58:58.779928 754374 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.779970 754374 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc001ebd230 5 D0712 23:58:58.779984 754374 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 23:58:58.780066 754374 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.780095 754374 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc001ebd230 6 D0712 23:58:58.780105 754374 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 23:58:58.780390 754374 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.780403 754374 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc001ebd230 7 D0712 23:58:58.780413 754374 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 23:58:58.780592 754374 usertrap_amd64.go:212] [ 890: 891] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.780605 754374 usertrap_amd64.go:122] [ 890: 891] Allocate a new trap: 0xc001ebd230 8 D0712 23:58:58.780617 754374 usertrap_amd64.go:225] [ 890: 891] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 23:58:58.781044 754374 usertrap_amd64.go:212] [ 890: 891] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.781113 754374 usertrap_amd64.go:122] [ 890: 891] Allocate a new trap: 0xc001ebd230 9 D0712 23:58:58.781194 754374 usertrap_amd64.go:225] [ 890: 891] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 23:58:58.781392 754374 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.781425 754374 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc001ebd230 10 D0712 23:58:58.781442 754374 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 23:58:58.790300 754374 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.790350 754374 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc001ebd230 11 D0712 23:58:58.790368 754374 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 23:58:58.793177 754374 usertrap_amd64.go:212] [ 890: 891] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.793223 754374 usertrap_amd64.go:122] [ 890: 891] Allocate a new trap: 0xc001ebd230 12 D0712 23:58:58.793238 754374 usertrap_amd64.go:225] [ 890: 891] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 23:58:58.793311 754374 usertrap_amd64.go:212] [ 890: 891] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.793327 754374 usertrap_amd64.go:122] [ 890: 891] Allocate a new trap: 0xc001ebd230 13 D0712 23:58:58.793333 754374 usertrap_amd64.go:225] [ 890: 891] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 23:58:58.793366 754374 task_signals.go:470] [ 890: 890] Notified of signal 23 D0712 23:58:58.793451 754374 task_signals.go:220] [ 890: 890] Signal 23: delivering to handler D0712 23:58:58.802299 754374 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.802339 754374 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc001ebd230 14 D0712 23:58:58.802351 754374 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 23:58:58.802419 754374 task_exit.go:204] [ 890: 890] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.802439 754374 task_exit.go:204] [ 890: 890] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.802475 754374 task_signals.go:204] [ 890: 893] Signal 890, PID: 893, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.802502 754374 task_exit.go:204] [ 890: 893] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.802511 754374 task_exit.go:204] [ 890: 893] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.802518 754374 task_exit.go:204] [ 890: 893] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.802488 754374 task_signals.go:204] [ 890: 891] Signal 890, PID: 891, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.802540 754374 task_signals.go:204] [ 890: 892] Signal 890, PID: 892, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.802541 754374 task_exit.go:204] [ 890: 891] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.802587 754374 task_signals.go:204] [ 890: 894] Signal 890, PID: 894, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.802604 754374 task_exit.go:204] [ 890: 891] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.802612 754374 task_exit.go:204] [ 890: 891] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.802634 754374 task_exit.go:204] [ 890: 894] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.802656 754374 task_exit.go:204] [ 890: 894] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.802663 754374 task_exit.go:204] [ 890: 894] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.802675 754374 task_exit.go:204] [ 890: 892] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.803789 754374 task_exit.go:204] [ 890: 892] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.803819 754374 task_exit.go:204] [ 890: 892] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.803842 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.803886 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.804007 754374 task_exit.go:204] [ 890: 890] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.804685 754374 task_signals.go:470] [ 5: 5] Notified of signal 23 D0712 23:58:58.804778 754374 task_signals.go:220] [ 5: 5] Signal 23: delivering to handler D0712 23:58:58.805403 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.807224 754374 syscalls.go:262] [ 895: 895] Allocating stack with size of 8388608 bytes D0712 23:58:58.807391 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.808874 754374 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.808986 754374 usertrap_amd64.go:106] [ 895: 895] Map a usertrap vma at 67000 D0712 23:58:58.809113 754374 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001363bf0 1 D0712 23:58:58.809166 754374 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 23:58:58.809492 754374 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.809578 754374 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001363bf0 2 D0712 23:58:58.809641 754374 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 23:58:58.810317 754374 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.810345 754374 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001363bf0 3 D0712 23:58:58.810356 754374 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 23:58:58.817682 754374 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.817738 754374 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001363bf0 4 D0712 23:58:58.817759 754374 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 23:58:58.819043 754374 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.819077 754374 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001363bf0 5 D0712 23:58:58.819091 754374 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 23:58:58.819169 754374 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.819186 754374 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001363bf0 6 D0712 23:58:58.819194 754374 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 23:58:58.819473 754374 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.819494 754374 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001363bf0 7 D0712 23:58:58.819501 754374 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 23:58:58.819694 754374 usertrap_amd64.go:212] [ 895: 896] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.819721 754374 usertrap_amd64.go:122] [ 895: 896] Allocate a new trap: 0xc001363bf0 8 D0712 23:58:58.819732 754374 usertrap_amd64.go:225] [ 895: 896] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 23:58:58.819936 754374 usertrap_amd64.go:212] [ 895: 896] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.820053 754374 usertrap_amd64.go:122] [ 895: 896] Allocate a new trap: 0xc001363bf0 9 D0712 23:58:58.820080 754374 usertrap_amd64.go:225] [ 895: 896] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 23:58:58.820110 754374 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.820115 754374 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001363bf0 10 D0712 23:58:58.820121 754374 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 23:58:58.820745 754374 usertrap_amd64.go:212] [ 895: 896] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.820777 754374 usertrap_amd64.go:122] [ 895: 896] Allocate a new trap: 0xc001363bf0 11 D0712 23:58:58.820788 754374 usertrap_amd64.go:225] [ 895: 896] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 23:58:58.820858 754374 usertrap_amd64.go:212] [ 895: 896] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.820884 754374 usertrap_amd64.go:122] [ 895: 896] Allocate a new trap: 0xc001363bf0 12 D0712 23:58:58.820898 754374 usertrap_amd64.go:225] [ 895: 896] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 23:58:58.820981 754374 task_signals.go:470] [ 895: 895] Notified of signal 23 D0712 23:58:58.821026 754374 task_signals.go:220] [ 895: 895] Signal 23: delivering to handler D0712 23:58:58.829409 754374 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.829440 754374 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001363bf0 13 D0712 23:58:58.829452 754374 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 23:58:58.832015 754374 task_signals.go:470] [ 895: 895] Notified of signal 23 D0712 23:58:58.832081 754374 task_signals.go:220] [ 895: 895] Signal 23: delivering to handler D0712 23:58:58.839541 754374 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.839564 754374 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001363bf0 14 D0712 23:58:58.839587 754374 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 23:58:58.839644 754374 task_exit.go:204] [ 895: 895] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.839662 754374 task_exit.go:204] [ 895: 895] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.839697 754374 task_signals.go:204] [ 895: 896] Signal 895, PID: 896, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.839723 754374 task_signals.go:204] [ 895: 899] Signal 895, PID: 899, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.839723 754374 task_signals.go:204] [ 895: 897] Signal 895, PID: 897, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.839735 754374 task_exit.go:204] [ 895: 899] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.839745 754374 task_exit.go:204] [ 895: 899] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.839751 754374 task_exit.go:204] [ 895: 899] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.839768 754374 task_exit.go:204] [ 895: 897] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.839732 754374 task_signals.go:204] [ 895: 898] Signal 895, PID: 898, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.839776 754374 task_exit.go:204] [ 895: 897] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.839808 754374 task_exit.go:204] [ 895: 897] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.839917 754374 task_exit.go:204] [ 895: 896] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.839958 754374 task_exit.go:204] [ 895: 896] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.839977 754374 task_exit.go:204] [ 895: 896] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.839992 754374 task_exit.go:204] [ 895: 898] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.841129 754374 task_exit.go:204] [ 895: 898] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.841192 754374 task_exit.go:204] [ 895: 898] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.841214 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.841263 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.841302 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.841396 754374 task_exit.go:204] [ 895: 895] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.842004 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.843634 754374 syscalls.go:262] [ 900: 900] Allocating stack with size of 8388608 bytes D0712 23:58:58.843867 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.844928 754374 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.845025 754374 usertrap_amd64.go:106] [ 900: 900] Map a usertrap vma at 6a000 D0712 23:58:58.845103 754374 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc001e57b30 1 D0712 23:58:58.845129 754374 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 23:58:58.845518 754374 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.845544 754374 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc001e57b30 2 D0712 23:58:58.845552 754374 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 23:58:58.846266 754374 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.846294 754374 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc001e57b30 3 D0712 23:58:58.846305 754374 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 23:58:58.854220 754374 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.854253 754374 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc001e57b30 4 D0712 23:58:58.854267 754374 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 23:58:58.855576 754374 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.855612 754374 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc001e57b30 5 D0712 23:58:58.855626 754374 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 23:58:58.855694 754374 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.855703 754374 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc001e57b30 6 D0712 23:58:58.855712 754374 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 23:58:58.855944 754374 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.855970 754374 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc001e57b30 7 D0712 23:58:58.855979 754374 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 23:58:58.856191 754374 usertrap_amd64.go:212] [ 900: 901] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.856214 754374 usertrap_amd64.go:122] [ 900: 901] Allocate a new trap: 0xc001e57b30 8 D0712 23:58:58.856225 754374 usertrap_amd64.go:225] [ 900: 901] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 23:58:58.856699 754374 usertrap_amd64.go:212] [ 900: 901] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.856751 754374 usertrap_amd64.go:122] [ 900: 901] Allocate a new trap: 0xc001e57b30 9 D0712 23:58:58.856769 754374 usertrap_amd64.go:225] [ 900: 901] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 23:58:58.856817 754374 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.856827 754374 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc001e57b30 10 D0712 23:58:58.856836 754374 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 23:58:58.857512 754374 usertrap_amd64.go:212] [ 900: 901] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.857549 754374 usertrap_amd64.go:122] [ 900: 901] Allocate a new trap: 0xc001e57b30 11 D0712 23:58:58.857566 754374 usertrap_amd64.go:225] [ 900: 901] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 23:58:58.857655 754374 usertrap_amd64.go:212] [ 900: 901] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.857682 754374 usertrap_amd64.go:122] [ 900: 901] Allocate a new trap: 0xc001e57b30 12 D0712 23:58:58.857697 754374 usertrap_amd64.go:225] [ 900: 901] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 23:58:58.857742 754374 task_signals.go:470] [ 900: 900] Notified of signal 23 D0712 23:58:58.857796 754374 task_signals.go:220] [ 900: 900] Signal 23: delivering to handler D0712 23:58:58.864404 754374 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.864431 754374 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc001e57b30 13 D0712 23:58:58.864442 754374 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 23:58:58.868078 754374 task_signals.go:470] [ 900: 900] Notified of signal 23 D0712 23:58:58.868232 754374 task_signals.go:220] [ 900: 900] Signal 23: delivering to handler D0712 23:58:58.875219 754374 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.875257 754374 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc001e57b30 14 D0712 23:58:58.875270 754374 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 23:58:58.875338 754374 task_exit.go:204] [ 900: 900] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.875361 754374 task_exit.go:204] [ 900: 900] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.875396 754374 task_signals.go:204] [ 900: 901] Signal 900, PID: 901, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.875436 754374 task_signals.go:204] [ 900: 904] Signal 900, PID: 904, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.875456 754374 task_exit.go:204] [ 900: 901] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.875453 754374 task_signals.go:204] [ 900: 902] Signal 900, PID: 902, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.875470 754374 task_exit.go:204] [ 900: 904] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.875405 754374 task_signals.go:204] [ 900: 903] Signal 900, PID: 903, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.875492 754374 task_exit.go:204] [ 900: 903] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.875549 754374 task_exit.go:204] [ 900: 903] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.875559 754374 task_exit.go:204] [ 900: 903] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.875581 754374 task_exit.go:204] [ 900: 901] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.875596 754374 task_exit.go:204] [ 900: 901] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.875609 754374 task_exit.go:204] [ 900: 902] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.875722 754374 task_exit.go:204] [ 900: 904] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.875755 754374 task_exit.go:204] [ 900: 904] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.876754 754374 task_exit.go:204] [ 900: 902] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.876796 754374 task_exit.go:204] [ 900: 902] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.876815 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.876851 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.876874 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.877644 754374 task_exit.go:204] [ 900: 900] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.878470 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.880075 754374 syscalls.go:262] [ 905: 905] Allocating stack with size of 8388608 bytes D0712 23:58:58.880204 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.881310 754374 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.881378 754374 usertrap_amd64.go:106] [ 905: 905] Map a usertrap vma at 6a000 D0712 23:58:58.881464 754374 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc0009bfbc0 1 D0712 23:58:58.881504 754374 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 23:58:58.881886 754374 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.881925 754374 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc0009bfbc0 2 D0712 23:58:58.881948 754374 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 23:58:58.882548 754374 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.882581 754374 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc0009bfbc0 3 D0712 23:58:58.882595 754374 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 23:58:58.889662 754374 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.889773 754374 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc0009bfbc0 4 D0712 23:58:58.889811 754374 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 23:58:58.890997 754374 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.891042 754374 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc0009bfbc0 5 D0712 23:58:58.891059 754374 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 23:58:58.891132 754374 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.891164 754374 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc0009bfbc0 6 D0712 23:58:58.891177 754374 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 23:58:58.891659 754374 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.891696 754374 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc0009bfbc0 7 D0712 23:58:58.891709 754374 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 23:58:58.891919 754374 usertrap_amd64.go:212] [ 905: 906] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.891946 754374 usertrap_amd64.go:122] [ 905: 906] Allocate a new trap: 0xc0009bfbc0 8 D0712 23:58:58.891961 754374 usertrap_amd64.go:225] [ 905: 906] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 23:58:58.892253 754374 usertrap_amd64.go:212] [ 905: 906] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.892302 754374 usertrap_amd64.go:122] [ 905: 906] Allocate a new trap: 0xc0009bfbc0 9 D0712 23:58:58.892316 754374 usertrap_amd64.go:225] [ 905: 906] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 23:58:58.892366 754374 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.892426 754374 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc0009bfbc0 10 D0712 23:58:58.892488 754374 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 23:58:58.901024 754374 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.901095 754374 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc0009bfbc0 11 D0712 23:58:58.901111 754374 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 23:58:58.903955 754374 usertrap_amd64.go:212] [ 905: 906] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.904015 754374 usertrap_amd64.go:122] [ 905: 906] Allocate a new trap: 0xc0009bfbc0 12 D0712 23:58:58.904032 754374 usertrap_amd64.go:225] [ 905: 906] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 23:58:58.904107 754374 usertrap_amd64.go:212] [ 905: 906] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.904130 754374 usertrap_amd64.go:122] [ 905: 906] Allocate a new trap: 0xc0009bfbc0 13 D0712 23:58:58.904141 754374 usertrap_amd64.go:225] [ 905: 906] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 23:58:58.904295 754374 task_signals.go:470] [ 905: 905] Notified of signal 23 D0712 23:58:58.904417 754374 task_signals.go:220] [ 905: 905] Signal 23: delivering to handler D0712 23:58:58.913119 754374 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.913175 754374 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc0009bfbc0 14 D0712 23:58:58.913198 754374 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 23:58:58.913278 754374 task_exit.go:204] [ 905: 905] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.913324 754374 task_exit.go:204] [ 905: 905] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.913401 754374 task_signals.go:204] [ 905: 906] Signal 905, PID: 906, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.913421 754374 task_exit.go:204] [ 905: 906] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.913432 754374 task_exit.go:204] [ 905: 906] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.913446 754374 task_exit.go:204] [ 905: 906] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.913480 754374 task_signals.go:204] [ 905: 910] Signal 905, PID: 910, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.913483 754374 task_signals.go:204] [ 905: 908] Signal 905, PID: 908, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.913494 754374 task_exit.go:204] [ 905: 910] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.913528 754374 task_exit.go:204] [ 905: 910] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.913543 754374 task_exit.go:204] [ 905: 910] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.913565 754374 task_exit.go:204] [ 905: 908] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.913580 754374 task_exit.go:204] [ 905: 908] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.913586 754374 task_exit.go:204] [ 905: 908] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.913607 754374 task_signals.go:204] [ 905: 907] Signal 905, PID: 907, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.913635 754374 task_exit.go:204] [ 905: 907] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.913650 754374 task_exit.go:204] [ 905: 907] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.913657 754374 task_exit.go:204] [ 905: 907] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.913615 754374 task_signals.go:204] [ 905: 909] Signal 905, PID: 909, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.913712 754374 task_exit.go:204] [ 905: 909] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.918322 754374 task_exit.go:204] [ 905: 909] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.918358 754374 task_exit.go:204] [ 905: 909] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.918385 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.918461 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:58:58.918486 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.918648 754374 task_exit.go:204] [ 905: 905] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.919336 754374 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.921164 754374 syscalls.go:262] [ 911: 911] Allocating stack with size of 8388608 bytes D0712 23:58:58.921317 754374 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.933394 754374 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.933442 754374 usertrap_amd64.go:106] [ 911: 911] Map a usertrap vma at 61000 D0712 23:58:58.934084 754374 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc0009bfef0 1 D0712 23:58:58.934135 754374 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 23:58:58.934438 754374 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.934456 754374 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc0009bfef0 2 D0712 23:58:58.934473 754374 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 23:58:58.935200 754374 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.935219 754374 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc0009bfef0 3 D0712 23:58:58.935254 754374 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 23:58:58.941467 754374 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.941494 754374 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc0009bfef0 4 D0712 23:58:58.941506 754374 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 23:58:58.942624 754374 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.942657 754374 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc0009bfef0 5 D0712 23:58:58.942670 754374 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 23:58:58.942711 754374 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.942721 754374 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc0009bfef0 6 D0712 23:58:58.942729 754374 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 23:58:58.942984 754374 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.943001 754374 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc0009bfef0 7 D0712 23:58:58.943010 754374 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 23:58:58.943142 754374 usertrap_amd64.go:212] [ 911: 912] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.943152 754374 usertrap_amd64.go:122] [ 911: 912] Allocate a new trap: 0xc0009bfef0 8 D0712 23:58:58.943161 754374 usertrap_amd64.go:225] [ 911: 912] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 23:58:58.943406 754374 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.943432 754374 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc0009bfef0 9 D0712 23:58:58.943478 754374 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 23:58:58.943600 754374 usertrap_amd64.go:212] [ 911: 912] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.943624 754374 usertrap_amd64.go:122] [ 911: 912] Allocate a new trap: 0xc0009bfef0 10 D0712 23:58:58.943635 754374 usertrap_amd64.go:225] [ 911: 912] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 23:58:58.953251 754374 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.953284 754374 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc0009bfef0 11 D0712 23:58:58.953297 754374 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 23:58:58.953845 754374 usertrap_amd64.go:212] [ 911: 912] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.953867 754374 usertrap_amd64.go:122] [ 911: 912] Allocate a new trap: 0xc0009bfef0 12 D0712 23:58:58.953880 754374 usertrap_amd64.go:225] [ 911: 912] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 23:58:58.953933 754374 usertrap_amd64.go:212] [ 911: 912] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.953952 754374 usertrap_amd64.go:122] [ 911: 912] Allocate a new trap: 0xc0009bfef0 13 D0712 23:58:58.953960 754374 usertrap_amd64.go:225] [ 911: 912] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 23:58:58.953975 754374 task_signals.go:470] [ 911: 911] Notified of signal 23 D0712 23:58:58.953996 754374 task_signals.go:179] [ 911: 911] Restarting syscall 202: interrupted by signal 23 D0712 23:58:58.954005 754374 task_signals.go:220] [ 911: 911] Signal 23: delivering to handler D0712 23:58:58.964188 754374 task_signals.go:470] [ 911: 911] Notified of signal 23 D0712 23:58:58.964853 754374 task_signals.go:220] [ 911: 911] Signal 23: delivering to handler D0712 23:58:58.965373 754374 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:58.965401 754374 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc0009bfef0 14 D0712 23:58:58.965415 754374 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 23:58:58.965480 754374 task_exit.go:204] [ 911: 911] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.965498 754374 task_exit.go:204] [ 911: 911] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.965520 754374 task_signals.go:204] [ 911: 914] Signal 911, PID: 914, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.965536 754374 task_exit.go:204] [ 911: 914] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.965545 754374 task_exit.go:204] [ 911: 914] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.965551 754374 task_exit.go:204] [ 911: 914] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.965569 754374 task_signals.go:204] [ 911: 916] Signal 911, PID: 916, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.965572 754374 task_signals.go:204] [ 911: 915] Signal 911, PID: 915, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.965581 754374 task_exit.go:204] [ 911: 916] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.965548 754374 task_signals.go:204] [ 911: 913] Signal 911, PID: 913, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.965595 754374 task_exit.go:204] [ 911: 916] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.965621 754374 task_exit.go:204] [ 911: 916] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.965655 754374 task_signals.go:204] [ 911: 912] Signal 911, PID: 912, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:58.965669 754374 task_exit.go:204] [ 911: 912] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.965685 754374 task_exit.go:204] [ 911: 912] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.965692 754374 task_exit.go:204] [ 911: 912] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.965708 754374 task_exit.go:204] [ 911: 915] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.965749 754374 task_exit.go:204] [ 911: 915] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.965756 754374 task_exit.go:204] [ 911: 915] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.965780 754374 task_exit.go:204] [ 911: 913] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:58.967119 754374 task_exit.go:204] [ 911: 913] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:58.967150 754374 task_exit.go:204] [ 911: 913] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.967176 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:58.967217 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:58.967246 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:58.967316 754374 task_exit.go:204] [ 911: 911] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:58.967520 754374 task_signals.go:470] [ 5: 25] Notified of signal 23 D0712 23:58:58.967608 754374 task_signals.go:220] [ 5: 25] Signal 23: delivering to handler D0712 23:58:58.968068 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.969700 754374 syscalls.go:262] [ 917: 917] Allocating stack with size of 8388608 bytes D0712 23:58:58.969822 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:58.971882 754374 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:58.971930 754374 usertrap_amd64.go:106] [ 917: 917] Map a usertrap vma at 62000 D0712 23:58:58.972023 754374 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000e7f680 1 D0712 23:58:58.972046 754374 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:58:58.972328 754374 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:58.972353 754374 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000e7f680 2 D0712 23:58:58.972364 754374 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:58:58.973061 754374 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:58.973110 754374 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000e7f680 3 D0712 23:58:58.973120 754374 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:58:58.980572 754374 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:58.980611 754374 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000e7f680 4 D0712 23:58:58.980625 754374 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:58:58.982104 754374 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:58.982301 754374 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000e7f680 5 D0712 23:58:58.982338 754374 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:58:58.982406 754374 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b214:sysno 13 D0712 23:58:58.982441 754374 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000e7f680 6 D0712 23:58:58.982450 754374 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:58:58.983013 754374 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:58.983036 754374 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000e7f680 7 D0712 23:58:58.983046 754374 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:58:58.983244 754374 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:58.983266 754374 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc000e7f680 8 D0712 23:58:58.983275 754374 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:58:58.983563 754374 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46af76:sysno 35 D0712 23:58:58.983594 754374 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc000e7f680 9 D0712 23:58:58.983604 754374 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:58:58.983659 754374 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:58.983689 754374 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000e7f680 10 D0712 23:58:58.983753 754374 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:58:58.983834 754374 usertrap_amd64.go:212] [ 917: 920] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:58.983859 754374 usertrap_amd64.go:122] [ 917: 920] Allocate a new trap: 0xc000e7f680 11 D0712 23:58:58.983870 754374 usertrap_amd64.go:225] [ 917: 920] Apply the binary patch addr 46b6e0 trap addr 62370 ([184 24 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:58:58.984356 754374 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b020:sysno 39 D0712 23:58:58.984387 754374 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc000e7f680 12 D0712 23:58:58.984397 754374 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:58:58.984467 754374 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:58.984493 754374 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc000e7f680 13 D0712 23:58:58.984505 754374 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:58:58.984561 754374 task_signals.go:470] [ 917: 917] Notified of signal 23 D0712 23:58:58.984585 754374 task_signals.go:179] [ 917: 917] Restarting syscall 202: interrupted by signal 23 D0712 23:58:58.984594 754374 task_signals.go:220] [ 917: 917] Signal 23: delivering to handler D0712 23:58:58.992200 754374 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46af29:sysno 293 D0712 23:58:58.992230 754374 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000e7f680 14 D0712 23:58:58.992241 754374 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46af29 trap addr 62460 ([184 37 1 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:58:58.994794 754374 task_signals.go:470] [ 917: 917] Notified of signal 23 D0712 23:58:58.994828 754374 task_signals.go:220] [ 917: 917] Signal 23: delivering to handler D0712 23:58:59.003062 754374 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.003096 754374 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000e7f680 15 D0712 23:58:59.003128 754374 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0712 23:58:59.003247 754374 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.003286 754374 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.003311 754374 task_signals.go:204] [ 917: 922] Signal 917, PID: 922, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.003328 754374 task_exit.go:204] [ 917: 922] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.003339 754374 task_exit.go:204] [ 917: 922] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.003345 754374 task_exit.go:204] [ 917: 922] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.003316 754374 task_signals.go:204] [ 917: 921] Signal 917, PID: 921, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.003369 754374 task_signals.go:204] [ 917: 918] Signal 917, PID: 918, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.003379 754374 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.003412 754374 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.003422 754374 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.003447 754374 task_signals.go:204] [ 917: 920] Signal 917, PID: 920, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.003464 754374 task_signals.go:204] [ 917: 919] Signal 917, PID: 919, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.003472 754374 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.003488 754374 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.003496 754374 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.003515 754374 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.003526 754374 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.003549 754374 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.003565 754374 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.004722 754374 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.004743 754374 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.004757 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.004831 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:59.004874 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.005012 754374 task_signals.go:470] [ 5: 25] Notified of signal 23 D0712 23:58:59.005059 754374 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.005155 754374 task_signals.go:220] [ 5: 25] Signal 23: delivering to handler D0712 23:58:59.005932 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.007713 754374 syscalls.go:262] [ 923: 923] Allocating stack with size of 8388608 bytes D0712 23:58:59.007833 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.009085 754374 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.009133 754374 usertrap_amd64.go:106] [ 923: 923] Map a usertrap vma at 67000 D0712 23:58:59.009241 754374 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000c82360 1 D0712 23:58:59.009304 754374 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 23:58:59.009789 754374 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.009808 754374 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000c82360 2 D0712 23:58:59.009819 754374 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 23:58:59.010458 754374 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.010477 754374 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000c82360 3 D0712 23:58:59.010487 754374 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 23:58:59.019913 754374 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.019942 754374 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000c82360 4 D0712 23:58:59.019955 754374 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 23:58:59.021322 754374 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.021359 754374 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000c82360 5 D0712 23:58:59.021373 754374 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 23:58:59.021433 754374 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.021479 754374 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000c82360 6 D0712 23:58:59.021497 754374 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 23:58:59.021985 754374 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.022004 754374 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000c82360 7 D0712 23:58:59.022015 754374 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 23:58:59.022222 754374 usertrap_amd64.go:212] [ 923: 924] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.022278 754374 usertrap_amd64.go:122] [ 923: 924] Allocate a new trap: 0xc000c82360 8 D0712 23:58:59.022293 754374 usertrap_amd64.go:225] [ 923: 924] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 23:58:59.022526 754374 usertrap_amd64.go:212] [ 923: 924] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.022558 754374 usertrap_amd64.go:122] [ 923: 924] Allocate a new trap: 0xc000c82360 9 D0712 23:58:59.022572 754374 usertrap_amd64.go:225] [ 923: 924] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 23:58:59.022785 754374 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.022802 754374 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000c82360 10 D0712 23:58:59.022817 754374 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 23:58:59.023476 754374 usertrap_amd64.go:212] [ 923: 924] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.023534 754374 usertrap_amd64.go:122] [ 923: 924] Allocate a new trap: 0xc000c82360 11 D0712 23:58:59.023555 754374 usertrap_amd64.go:225] [ 923: 924] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 23:58:59.023658 754374 usertrap_amd64.go:212] [ 923: 924] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.023691 754374 usertrap_amd64.go:122] [ 923: 924] Allocate a new trap: 0xc000c82360 12 D0712 23:58:59.023706 754374 usertrap_amd64.go:225] [ 923: 924] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 23:58:59.023736 754374 task_signals.go:470] [ 923: 923] Notified of signal 23 D0712 23:58:59.023811 754374 task_signals.go:220] [ 923: 923] Signal 23: delivering to handler D0712 23:58:59.031055 754374 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.031084 754374 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000c82360 13 D0712 23:58:59.031100 754374 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 23:58:59.034459 754374 task_signals.go:470] [ 923: 923] Notified of signal 23 D0712 23:58:59.034509 754374 task_signals.go:220] [ 923: 923] Signal 23: delivering to handler D0712 23:58:59.042612 754374 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.042649 754374 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000c82360 14 D0712 23:58:59.042666 754374 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 23:58:59.042734 754374 task_exit.go:204] [ 923: 923] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.042757 754374 task_exit.go:204] [ 923: 923] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.042778 754374 task_signals.go:204] [ 923: 924] Signal 923, PID: 924, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.042792 754374 task_exit.go:204] [ 923: 924] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.042798 754374 task_exit.go:204] [ 923: 924] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.042802 754374 task_exit.go:204] [ 923: 924] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.042816 754374 task_signals.go:204] [ 923: 925] Signal 923, PID: 925, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.042831 754374 task_exit.go:204] [ 923: 925] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.042836 754374 task_exit.go:204] [ 923: 925] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.042840 754374 task_exit.go:204] [ 923: 925] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.042851 754374 task_signals.go:204] [ 923: 926] Signal 923, PID: 926, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.042857 754374 task_exit.go:204] [ 923: 926] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.042863 754374 task_exit.go:204] [ 923: 926] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.042867 754374 task_exit.go:204] [ 923: 926] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.042892 754374 task_signals.go:204] [ 923: 927] Signal 923, PID: 927, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.042899 754374 task_exit.go:204] [ 923: 927] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.043926 754374 task_exit.go:204] [ 923: 927] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.043954 754374 task_exit.go:204] [ 923: 927] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.043965 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.045101 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:59.045139 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.045338 754374 task_exit.go:204] [ 923: 923] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.045428 754374 task_signals.go:470] [ 5: 25] Notified of signal 23 D0712 23:58:59.045484 754374 task_signals.go:220] [ 5: 25] Signal 23: delivering to handler D0712 23:58:59.046495 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.048050 754374 syscalls.go:262] [ 928: 928] Allocating stack with size of 8388608 bytes D0712 23:58:59.048196 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.050019 754374 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.050066 754374 usertrap_amd64.go:106] [ 928: 928] Map a usertrap vma at 65000 D0712 23:58:59.050133 754374 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000c827e0 1 D0712 23:58:59.050152 754374 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 23:58:59.050444 754374 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.050467 754374 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000c827e0 2 D0712 23:58:59.050476 754374 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 23:58:59.051193 754374 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.051242 754374 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000c827e0 3 D0712 23:58:59.051260 754374 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 23:58:59.058476 754374 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.058528 754374 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000c827e0 4 D0712 23:58:59.058548 754374 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 23:58:59.059683 754374 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.059728 754374 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000c827e0 5 D0712 23:58:59.059740 754374 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 23:58:59.059838 754374 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.059846 754374 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000c827e0 6 D0712 23:58:59.059853 754374 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 23:58:59.060289 754374 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.060314 754374 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000c827e0 7 D0712 23:58:59.060323 754374 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 23:58:59.060500 754374 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.060527 754374 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc000c827e0 8 D0712 23:58:59.060537 754374 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 23:58:59.060718 754374 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.060751 754374 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc000c827e0 9 D0712 23:58:59.060764 754374 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 23:58:59.060844 754374 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.060869 754374 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000c827e0 10 D0712 23:58:59.060879 754374 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 23:58:59.069890 754374 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.069947 754374 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000c827e0 11 D0712 23:58:59.069963 754374 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 23:58:59.072560 754374 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.072635 754374 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc000c827e0 12 D0712 23:58:59.072670 754374 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 23:58:59.072700 754374 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.072708 754374 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc000c827e0 13 D0712 23:58:59.072717 754374 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 23:58:59.072739 754374 task_signals.go:470] [ 928: 928] Notified of signal 23 D0712 23:58:59.072848 754374 task_signals.go:220] [ 928: 928] Signal 23: delivering to handler D0712 23:58:59.081111 754374 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.081227 754374 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000c827e0 14 D0712 23:58:59.081302 754374 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 23:58:59.081396 754374 task_exit.go:204] [ 928: 928] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.081421 754374 task_exit.go:204] [ 928: 928] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.081449 754374 task_signals.go:204] [ 928: 931] Signal 928, PID: 931, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.081477 754374 task_exit.go:204] [ 928: 931] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.081475 754374 task_signals.go:204] [ 928: 929] Signal 928, PID: 929, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.081487 754374 task_exit.go:204] [ 928: 931] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.081511 754374 task_exit.go:204] [ 928: 931] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.081450 754374 task_signals.go:204] [ 928: 930] Signal 928, PID: 930, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.081547 754374 task_exit.go:204] [ 928: 930] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.081557 754374 task_signals.go:204] [ 928: 932] Signal 928, PID: 932, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.081571 754374 task_exit.go:204] [ 928: 930] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.081577 754374 task_exit.go:204] [ 928: 930] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.081599 754374 task_exit.go:204] [ 928: 932] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.081638 754374 task_exit.go:204] [ 928: 932] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.081644 754374 task_exit.go:204] [ 928: 932] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.081657 754374 task_exit.go:204] [ 928: 929] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.082758 754374 task_exit.go:204] [ 928: 929] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.082801 754374 task_exit.go:204] [ 928: 929] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.082820 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.082847 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:59.082856 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.082929 754374 task_exit.go:204] [ 928: 928] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.083680 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.085312 754374 syscalls.go:262] [ 933: 933] Allocating stack with size of 8388608 bytes D0712 23:58:59.085442 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.087077 754374 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.087115 754374 usertrap_amd64.go:106] [ 933: 933] Map a usertrap vma at 66000 D0712 23:58:59.087216 754374 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc000c82930 1 D0712 23:58:59.087243 754374 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:59.087620 754374 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.087673 754374 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc000c82930 2 D0712 23:58:59.087686 754374 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:59.088270 754374 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.088317 754374 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc000c82930 3 D0712 23:58:59.088330 754374 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:59.096037 754374 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.096079 754374 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc000c82930 4 D0712 23:58:59.096093 754374 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:59.097190 754374 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.097223 754374 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc000c82930 5 D0712 23:58:59.097252 754374 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:59.097339 754374 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.097355 754374 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc000c82930 6 D0712 23:58:59.097361 754374 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:59.098839 754374 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.098874 754374 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc000c82930 7 D0712 23:58:59.098890 754374 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:59.099053 754374 usertrap_amd64.go:212] [ 933: 934] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.099068 754374 usertrap_amd64.go:122] [ 933: 934] Allocate a new trap: 0xc000c82930 8 D0712 23:58:59.099081 754374 usertrap_amd64.go:225] [ 933: 934] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:59.099412 754374 usertrap_amd64.go:212] [ 933: 934] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.099446 754374 usertrap_amd64.go:122] [ 933: 934] Allocate a new trap: 0xc000c82930 9 D0712 23:58:59.099464 754374 usertrap_amd64.go:225] [ 933: 934] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:59.099533 754374 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.099563 754374 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc000c82930 10 D0712 23:58:59.099579 754374 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:59.107972 754374 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.108039 754374 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc000c82930 11 D0712 23:58:59.108054 754374 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:59.110768 754374 usertrap_amd64.go:212] [ 933: 934] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.110808 754374 usertrap_amd64.go:122] [ 933: 934] Allocate a new trap: 0xc000c82930 12 D0712 23:58:59.110824 754374 usertrap_amd64.go:225] [ 933: 934] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:59.110884 754374 usertrap_amd64.go:212] [ 933: 934] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.110934 754374 usertrap_amd64.go:122] [ 933: 934] Allocate a new trap: 0xc000c82930 13 D0712 23:58:59.110959 754374 usertrap_amd64.go:225] [ 933: 934] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:59.111019 754374 task_signals.go:470] [ 933: 933] Notified of signal 23 D0712 23:58:59.111082 754374 task_signals.go:220] [ 933: 933] Signal 23: delivering to handler D0712 23:58:59.120137 754374 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.120222 754374 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc000c82930 14 D0712 23:58:59.120240 754374 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:59.120332 754374 task_exit.go:204] [ 933: 933] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.120361 754374 task_exit.go:204] [ 933: 933] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.120393 754374 task_signals.go:204] [ 933: 936] Signal 933, PID: 936, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.120422 754374 task_exit.go:204] [ 933: 936] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.120423 754374 task_signals.go:204] [ 933: 937] Signal 933, PID: 937, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.120434 754374 task_exit.go:204] [ 933: 936] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.120409 754374 task_signals.go:204] [ 933: 935] Signal 933, PID: 935, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.120445 754374 task_exit.go:204] [ 933: 936] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.120499 754374 task_signals.go:204] [ 933: 934] Signal 933, PID: 934, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.120525 754374 task_exit.go:204] [ 933: 934] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.120582 754374 task_exit.go:204] [ 933: 934] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.120598 754374 task_exit.go:204] [ 933: 934] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.120616 754374 task_exit.go:204] [ 933: 937] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.120648 754374 task_exit.go:204] [ 933: 937] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.120666 754374 task_exit.go:204] [ 933: 937] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.120678 754374 task_exit.go:204] [ 933: 935] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.121930 754374 task_exit.go:204] [ 933: 935] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.121952 754374 task_exit.go:204] [ 933: 935] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.121966 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.122024 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:59.122044 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.122147 754374 task_exit.go:204] [ 933: 933] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.122578 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.125123 754374 syscalls.go:262] [ 938: 938] Allocating stack with size of 8388608 bytes D0712 23:58:59.125256 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.126823 754374 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.126866 754374 usertrap_amd64.go:106] [ 938: 938] Map a usertrap vma at 68000 D0712 23:58:59.127011 754374 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc0009b8c30 1 D0712 23:58:59.127051 754374 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 23:58:59.127410 754374 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.127437 754374 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc0009b8c30 2 D0712 23:58:59.127449 754374 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 23:58:59.128147 754374 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.128175 754374 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc0009b8c30 3 D0712 23:58:59.128190 754374 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 23:58:59.135084 754374 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.135126 754374 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc0009b8c30 4 D0712 23:58:59.135142 754374 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 23:58:59.137954 754374 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.138022 754374 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc0009b8c30 5 D0712 23:58:59.138041 754374 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 23:58:59.138107 754374 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.138122 754374 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc0009b8c30 6 D0712 23:58:59.138129 754374 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 23:58:59.138673 754374 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.138721 754374 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc0009b8c30 7 D0712 23:58:59.138737 754374 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 23:58:59.138978 754374 usertrap_amd64.go:212] [ 938: 939] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.139014 754374 usertrap_amd64.go:122] [ 938: 939] Allocate a new trap: 0xc0009b8c30 8 D0712 23:58:59.139025 754374 usertrap_amd64.go:225] [ 938: 939] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 23:58:59.139299 754374 usertrap_amd64.go:212] [ 938: 939] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.139320 754374 usertrap_amd64.go:122] [ 938: 939] Allocate a new trap: 0xc0009b8c30 9 D0712 23:58:59.139332 754374 usertrap_amd64.go:225] [ 938: 939] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 23:58:59.139667 754374 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.139803 754374 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc0009b8c30 10 D0712 23:58:59.140137 754374 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 23:58:59.140200 754374 usertrap_amd64.go:212] [ 938: 941] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:59.140210 754374 usertrap_amd64.go:122] [ 938: 941] Allocate a new trap: 0xc0009b8c30 11 D0712 23:58:59.140220 754374 usertrap_amd64.go:225] [ 938: 941] Apply the binary patch addr 46b6e0 trap addr 68370 ([184 24 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 23:58:59.153377 754374 usertrap_amd64.go:212] [ 938: 939] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.153447 754374 usertrap_amd64.go:122] [ 938: 939] Allocate a new trap: 0xc0009b8c30 12 D0712 23:58:59.153468 754374 usertrap_amd64.go:225] [ 938: 939] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 23:58:59.153576 754374 usertrap_amd64.go:212] [ 938: 939] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.153702 754374 usertrap_amd64.go:122] [ 938: 939] Allocate a new trap: 0xc0009b8c30 13 D0712 23:58:59.153744 754374 usertrap_amd64.go:225] [ 938: 939] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 23:58:59.153855 754374 task_signals.go:470] [ 938: 938] Notified of signal 23 D0712 23:58:59.153993 754374 task_signals.go:220] [ 938: 938] Signal 23: delivering to handler D0712 23:58:59.159810 754374 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.159845 754374 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc0009b8c30 14 D0712 23:58:59.159862 754374 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46af29 trap addr 68460 ([184 37 1 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 23:58:59.164808 754374 task_signals.go:470] [ 938: 938] Notified of signal 23 D0712 23:58:59.164869 754374 task_signals.go:220] [ 938: 938] Signal 23: delivering to handler I0712 23:58:59.172768 754374 compat.go:120] Unsupported syscall open_tree(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/open_tree for more information. D0712 23:58:59.172877 754374 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.172902 754374 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc0009b8c30 15 D0712 23:58:59.172917 754374 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0712 23:58:59.173043 754374 task_exit.go:204] [ 938: 938] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.173069 754374 task_exit.go:204] [ 938: 938] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.173097 754374 task_signals.go:204] [ 938: 942] Signal 938, PID: 942, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.173109 754374 task_exit.go:204] [ 938: 942] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.173115 754374 task_exit.go:204] [ 938: 942] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.173119 754374 task_exit.go:204] [ 938: 942] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.173100 754374 task_signals.go:204] [ 938: 940] Signal 938, PID: 940, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.173135 754374 task_signals.go:204] [ 938: 943] Signal 938, PID: 943, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.173153 754374 task_exit.go:204] [ 938: 940] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.173154 754374 task_signals.go:204] [ 938: 939] Signal 938, PID: 939, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.173111 754374 task_signals.go:204] [ 938: 941] Signal 938, PID: 941, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.173180 754374 task_exit.go:204] [ 938: 939] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.173221 754374 task_exit.go:204] [ 938: 939] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.173285 754374 task_exit.go:204] [ 938: 939] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.173301 754374 task_exit.go:204] [ 938: 941] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.173333 754374 task_exit.go:204] [ 938: 941] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.173353 754374 task_exit.go:204] [ 938: 941] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.173399 754374 task_exit.go:204] [ 938: 940] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.173435 754374 task_exit.go:204] [ 938: 940] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.173462 754374 task_exit.go:204] [ 938: 943] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.174706 754374 task_exit.go:204] [ 938: 943] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.174743 754374 task_exit.go:204] [ 938: 943] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.174763 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.174797 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:58:59.174834 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.174911 754374 task_exit.go:204] [ 938: 938] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.175558 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.177350 754374 syscalls.go:262] [ 944: 944] Allocating stack with size of 8388608 bytes D0712 23:58:59.177489 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.178797 754374 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.178838 754374 usertrap_amd64.go:106] [ 944: 944] Map a usertrap vma at 63000 D0712 23:58:59.179147 754374 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc000e7fb90 1 D0712 23:58:59.179197 754374 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:58:59.179590 754374 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.179612 754374 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc000e7fb90 2 D0712 23:58:59.179621 754374 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:58:59.180295 754374 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.180322 754374 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc000e7fb90 3 D0712 23:58:59.180334 754374 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:58:59.187030 754374 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.187071 754374 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc000e7fb90 4 D0712 23:58:59.187085 754374 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:58:59.188433 754374 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.188473 754374 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc000e7fb90 5 D0712 23:58:59.188487 754374 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:58:59.188589 754374 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.188604 754374 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc000e7fb90 6 D0712 23:58:59.188613 754374 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:58:59.189267 754374 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.189297 754374 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc000e7fb90 7 D0712 23:58:59.189313 754374 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:58:59.189516 754374 usertrap_amd64.go:212] [ 944: 945] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.189529 754374 usertrap_amd64.go:122] [ 944: 945] Allocate a new trap: 0xc000e7fb90 8 D0712 23:58:59.189539 754374 usertrap_amd64.go:225] [ 944: 945] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:58:59.189723 754374 usertrap_amd64.go:212] [ 944: 945] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.189741 754374 usertrap_amd64.go:122] [ 944: 945] Allocate a new trap: 0xc000e7fb90 9 D0712 23:58:59.189752 754374 usertrap_amd64.go:225] [ 944: 945] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:58:59.189801 754374 usertrap_amd64.go:212] [ 944: 946] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:59.189811 754374 usertrap_amd64.go:122] [ 944: 946] Allocate a new trap: 0xc000e7fb90 10 D0712 23:58:59.189819 754374 usertrap_amd64.go:225] [ 944: 946] Apply the binary patch addr 46b6e0 trap addr 63320 ([184 24 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:58:59.189830 754374 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.189839 754374 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc000e7fb90 11 D0712 23:58:59.189847 754374 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b57c trap addr 63370 ([184 202 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:58:59.201371 754374 usertrap_amd64.go:212] [ 944: 945] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.201420 754374 usertrap_amd64.go:122] [ 944: 945] Allocate a new trap: 0xc000e7fb90 12 D0712 23:58:59.201456 754374 usertrap_amd64.go:225] [ 944: 945] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:58:59.201869 754374 usertrap_amd64.go:212] [ 944: 945] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.201931 754374 usertrap_amd64.go:122] [ 944: 945] Allocate a new trap: 0xc000e7fb90 13 D0712 23:58:59.202033 754374 usertrap_amd64.go:225] [ 944: 945] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:58:59.202112 754374 task_signals.go:470] [ 944: 944] Notified of signal 23 D0712 23:58:59.202379 754374 task_signals.go:220] [ 944: 944] Signal 23: delivering to handler D0712 23:58:59.204078 754374 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.204098 754374 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc000e7fb90 14 D0712 23:58:59.204110 754374 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46af29 trap addr 63460 ([184 37 1 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:58:59.213122 754374 task_signals.go:470] [ 944: 944] Notified of signal 23 D0712 23:58:59.214599 754374 task_signals.go:220] [ 944: 944] Signal 23: delivering to handler D0712 23:58:59.215036 754374 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.215079 754374 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc000e7fb90 15 D0712 23:58:59.215096 754374 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0712 23:58:59.215143 754374 task_exit.go:204] [ 944: 944] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.215213 754374 task_exit.go:204] [ 944: 944] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.215258 754374 task_signals.go:204] [ 944: 945] Signal 944, PID: 945, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.215276 754374 task_exit.go:204] [ 944: 945] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.215285 754374 task_exit.go:204] [ 944: 945] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.215292 754374 task_exit.go:204] [ 944: 945] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.215322 754374 task_signals.go:204] [ 944: 946] Signal 944, PID: 946, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.215349 754374 task_exit.go:204] [ 944: 946] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.215360 754374 task_exit.go:204] [ 944: 946] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.215367 754374 task_exit.go:204] [ 944: 946] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.215384 754374 task_signals.go:204] [ 944: 947] Signal 944, PID: 947, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.215406 754374 task_exit.go:204] [ 944: 947] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.215415 754374 task_exit.go:204] [ 944: 947] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.215431 754374 task_exit.go:204] [ 944: 947] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.215453 754374 task_signals.go:204] [ 944: 948] Signal 944, PID: 948, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.215465 754374 task_exit.go:204] [ 944: 948] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.216685 754374 task_exit.go:204] [ 944: 948] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.216728 754374 task_exit.go:204] [ 944: 948] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.216742 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.217263 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.217501 754374 task_exit.go:204] [ 944: 944] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.226789 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.228113 754374 task_signals.go:481] [ 5: 5] No task notified of signal 23 D0712 23:58:59.228151 754374 syscalls.go:262] [ 949: 949] Allocating stack with size of 8388608 bytes D0712 23:58:59.228241 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.228353 754374 task_signals.go:220] [ 5: 5] Signal 23: delivering to handler D0712 23:58:59.229911 754374 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.229954 754374 usertrap_amd64.go:106] [ 949: 949] Map a usertrap vma at 61000 D0712 23:58:59.230085 754374 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0006e1500 1 D0712 23:58:59.230113 754374 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 23:58:59.230696 754374 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.230737 754374 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0006e1500 2 D0712 23:58:59.230756 754374 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 23:58:59.231384 754374 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.231448 754374 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0006e1500 3 D0712 23:58:59.231465 754374 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 23:58:59.239659 754374 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.239690 754374 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0006e1500 4 D0712 23:58:59.239701 754374 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 23:58:59.240911 754374 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.240991 754374 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0006e1500 5 D0712 23:58:59.241010 754374 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 23:58:59.241078 754374 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.241085 754374 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0006e1500 6 D0712 23:58:59.241092 754374 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 23:58:59.241463 754374 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.241484 754374 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0006e1500 7 D0712 23:58:59.241491 754374 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 23:58:59.241712 754374 usertrap_amd64.go:212] [ 949: 950] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.241742 754374 usertrap_amd64.go:122] [ 949: 950] Allocate a new trap: 0xc0006e1500 8 D0712 23:58:59.241753 754374 usertrap_amd64.go:225] [ 949: 950] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 23:58:59.241946 754374 usertrap_amd64.go:212] [ 949: 950] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.241978 754374 usertrap_amd64.go:122] [ 949: 950] Allocate a new trap: 0xc0006e1500 9 D0712 23:58:59.241994 754374 usertrap_amd64.go:225] [ 949: 950] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 23:58:59.242224 754374 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.242255 754374 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0006e1500 10 D0712 23:58:59.242270 754374 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 23:58:59.249887 754374 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.249926 754374 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0006e1500 11 D0712 23:58:59.249942 754374 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 23:58:59.252527 754374 usertrap_amd64.go:212] [ 949: 950] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.252561 754374 usertrap_amd64.go:122] [ 949: 950] Allocate a new trap: 0xc0006e1500 12 D0712 23:58:59.252575 754374 usertrap_amd64.go:225] [ 949: 950] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 23:58:59.252648 754374 usertrap_amd64.go:212] [ 949: 950] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.252676 754374 usertrap_amd64.go:122] [ 949: 950] Allocate a new trap: 0xc0006e1500 13 D0712 23:58:59.252691 754374 usertrap_amd64.go:225] [ 949: 950] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 23:58:59.252749 754374 task_signals.go:470] [ 949: 949] Notified of signal 23 D0712 23:58:59.252841 754374 task_signals.go:220] [ 949: 949] Signal 23: delivering to handler D0712 23:58:59.269080 754374 task_signals.go:470] [ 949: 949] Notified of signal 23 D0712 23:58:59.269142 754374 task_signals.go:220] [ 949: 949] Signal 23: delivering to handler I0712 23:58:59.269534 754374 compat.go:120] Unsupported syscall sys_437(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_437 for more information. D0712 23:58:59.269668 754374 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.269696 754374 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0006e1500 14 D0712 23:58:59.269711 754374 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 23:58:59.269773 754374 task_exit.go:204] [ 949: 949] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.269818 754374 task_exit.go:204] [ 949: 949] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.269848 754374 task_signals.go:204] [ 949: 952] Signal 949, PID: 952, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.269863 754374 task_exit.go:204] [ 949: 952] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.269853 754374 task_signals.go:204] [ 949: 950] Signal 949, PID: 950, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.269859 754374 task_signals.go:204] [ 949: 951] Signal 949, PID: 951, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.269871 754374 task_exit.go:204] [ 949: 952] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.269892 754374 task_exit.go:204] [ 949: 952] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.269937 754374 task_signals.go:204] [ 949: 953] Signal 949, PID: 953, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.269955 754374 task_exit.go:204] [ 949: 953] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.269971 754374 task_exit.go:204] [ 949: 953] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.269978 754374 task_exit.go:204] [ 949: 953] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.269990 754374 task_exit.go:204] [ 949: 950] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.270000 754374 task_exit.go:204] [ 949: 950] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.270007 754374 task_exit.go:204] [ 949: 950] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.270019 754374 task_exit.go:204] [ 949: 951] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.271093 754374 task_exit.go:204] [ 949: 951] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.271116 754374 task_exit.go:204] [ 949: 951] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.271134 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.271179 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:58:59.271191 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.271299 754374 task_exit.go:204] [ 949: 949] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.271940 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.273485 754374 syscalls.go:262] [ 954: 954] Allocating stack with size of 8388608 bytes D0712 23:58:59.273603 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.274878 754374 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.274922 754374 usertrap_amd64.go:106] [ 954: 954] Map a usertrap vma at 66000 D0712 23:58:59.275149 754374 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc0009b9230 1 D0712 23:58:59.275196 754374 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:59.275659 754374 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.275698 754374 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc0009b9230 2 D0712 23:58:59.275713 754374 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:59.276376 754374 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.276416 754374 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc0009b9230 3 D0712 23:58:59.276431 754374 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:59.283012 754374 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.283047 754374 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc0009b9230 4 D0712 23:58:59.283062 754374 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:59.284157 754374 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.284185 754374 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc0009b9230 5 D0712 23:58:59.284196 754374 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:59.284253 754374 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.284272 754374 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc0009b9230 6 D0712 23:58:59.284282 754374 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:59.285052 754374 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.285082 754374 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc0009b9230 7 D0712 23:58:59.285096 754374 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:59.285258 754374 usertrap_amd64.go:212] [ 954: 955] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.285283 754374 usertrap_amd64.go:122] [ 954: 955] Allocate a new trap: 0xc0009b9230 8 D0712 23:58:59.285293 754374 usertrap_amd64.go:225] [ 954: 955] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:59.285545 754374 usertrap_amd64.go:212] [ 954: 955] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.285566 754374 usertrap_amd64.go:122] [ 954: 955] Allocate a new trap: 0xc0009b9230 9 D0712 23:58:59.285578 754374 usertrap_amd64.go:225] [ 954: 955] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:59.285841 754374 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.285874 754374 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc0009b9230 10 D0712 23:58:59.285885 754374 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:59.293955 754374 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.293981 754374 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc0009b9230 11 D0712 23:58:59.293995 754374 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:59.296828 754374 usertrap_amd64.go:212] [ 954: 955] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.296878 754374 usertrap_amd64.go:122] [ 954: 955] Allocate a new trap: 0xc0009b9230 12 D0712 23:58:59.296895 754374 usertrap_amd64.go:225] [ 954: 955] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:59.297113 754374 usertrap_amd64.go:212] [ 954: 955] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.297147 754374 usertrap_amd64.go:122] [ 954: 955] Allocate a new trap: 0xc0009b9230 13 D0712 23:58:59.297159 754374 usertrap_amd64.go:225] [ 954: 955] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:59.297229 754374 task_signals.go:470] [ 954: 954] Notified of signal 23 D0712 23:58:59.297309 754374 task_signals.go:220] [ 954: 954] Signal 23: delivering to handler I0712 23:58:59.305522 754374 compat.go:120] Unsupported syscall perf_event_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/perf_event_open for more information. D0712 23:58:59.305638 754374 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.305659 754374 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc0009b9230 14 D0712 23:58:59.305673 754374 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:59.305793 754374 task_exit.go:204] [ 954: 954] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.305837 754374 task_exit.go:204] [ 954: 954] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.305840 754374 task_signals.go:204] [ 954: 956] Signal 954, PID: 956, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.305865 754374 task_signals.go:204] [ 954: 957] Signal 954, PID: 957, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.305868 754374 task_exit.go:204] [ 954: 956] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.305895 754374 task_exit.go:204] [ 954: 956] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.305903 754374 task_exit.go:204] [ 954: 956] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.305924 754374 task_signals.go:204] [ 954: 955] Signal 954, PID: 955, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.305937 754374 task_signals.go:204] [ 954: 958] Signal 954, PID: 958, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.305958 754374 task_exit.go:204] [ 954: 955] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.305969 754374 task_signals.go:204] [ 954: 959] Signal 954, PID: 959, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.305979 754374 task_exit.go:204] [ 954: 959] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.305986 754374 task_exit.go:204] [ 954: 959] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.305991 754374 task_exit.go:204] [ 954: 959] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.306003 754374 task_exit.go:204] [ 954: 957] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.306011 754374 task_exit.go:204] [ 954: 957] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.306016 754374 task_exit.go:204] [ 954: 957] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.306026 754374 task_exit.go:204] [ 954: 958] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.306079 754374 task_exit.go:204] [ 954: 955] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.306105 754374 task_exit.go:204] [ 954: 955] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.307592 754374 task_exit.go:204] [ 954: 958] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.307632 754374 task_exit.go:204] [ 954: 958] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.307693 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.307755 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:58:59.307778 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.307909 754374 task_exit.go:204] [ 954: 954] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.308718 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.310172 754374 syscalls.go:262] [ 960: 960] Allocating stack with size of 8388608 bytes D0712 23:58:59.310291 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.311960 754374 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.312017 754374 usertrap_amd64.go:106] [ 960: 960] Map a usertrap vma at 60000 D0712 23:58:59.312098 754374 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc001724e10 1 D0712 23:58:59.312127 754374 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:58:59.312528 754374 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.312550 754374 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc001724e10 2 D0712 23:58:59.312567 754374 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:58:59.313298 754374 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.313361 754374 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc001724e10 3 D0712 23:58:59.313402 754374 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:58:59.322554 754374 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.322587 754374 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc001724e10 4 D0712 23:58:59.322607 754374 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:58:59.323726 754374 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.323758 754374 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc001724e10 5 D0712 23:58:59.323768 754374 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:58:59.323822 754374 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.323844 754374 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc001724e10 6 D0712 23:58:59.323852 754374 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:58:59.324056 754374 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.324074 754374 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc001724e10 7 D0712 23:58:59.324080 754374 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:58:59.324240 754374 usertrap_amd64.go:212] [ 960: 961] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.324248 754374 usertrap_amd64.go:122] [ 960: 961] Allocate a new trap: 0xc001724e10 8 D0712 23:58:59.324254 754374 usertrap_amd64.go:225] [ 960: 961] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:58:59.324490 754374 usertrap_amd64.go:212] [ 960: 961] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.324522 754374 usertrap_amd64.go:122] [ 960: 961] Allocate a new trap: 0xc001724e10 9 D0712 23:58:59.324536 754374 usertrap_amd64.go:225] [ 960: 961] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:58:59.324573 754374 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.324581 754374 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc001724e10 10 D0712 23:58:59.324590 754374 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:58:59.324781 754374 usertrap_amd64.go:212] [ 960: 961] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.324802 754374 usertrap_amd64.go:122] [ 960: 961] Allocate a new trap: 0xc001724e10 11 D0712 23:58:59.324815 754374 usertrap_amd64.go:225] [ 960: 961] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:58:59.325107 754374 usertrap_amd64.go:212] [ 960: 961] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.325170 754374 usertrap_amd64.go:122] [ 960: 961] Allocate a new trap: 0xc001724e10 12 D0712 23:58:59.325195 754374 usertrap_amd64.go:225] [ 960: 961] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:58:59.325234 754374 task_signals.go:470] [ 960: 963] Notified of signal 23 D0712 23:58:59.325268 754374 task_signals.go:179] [ 960: 963] Restarting syscall 202: interrupted by signal 23 D0712 23:58:59.325284 754374 task_signals.go:220] [ 960: 963] Signal 23: delivering to handler D0712 23:58:59.325503 754374 task_signals.go:470] [ 960: 960] Notified of signal 23 D0712 23:58:59.325578 754374 task_signals.go:220] [ 960: 960] Signal 23: delivering to handler D0712 23:58:59.332831 754374 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.332860 754374 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc001724e10 13 D0712 23:58:59.332870 754374 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:58:59.335752 754374 task_signals.go:470] [ 960: 960] Notified of signal 23 D0712 23:58:59.335811 754374 task_signals.go:220] [ 960: 960] Signal 23: delivering to handler I0712 23:58:59.345998 754374 compat.go:120] Unsupported syscall personality(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/personality for more information. D0712 23:58:59.346140 754374 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.346181 754374 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc001724e10 14 D0712 23:58:59.346201 754374 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:58:59.346306 754374 task_exit.go:204] [ 960: 960] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.346348 754374 task_exit.go:204] [ 960: 960] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.346387 754374 task_signals.go:204] [ 960: 963] Signal 960, PID: 963, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.346417 754374 task_exit.go:204] [ 960: 963] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.346429 754374 task_exit.go:204] [ 960: 963] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.346435 754374 task_exit.go:204] [ 960: 963] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.346414 754374 task_signals.go:204] [ 960: 962] Signal 960, PID: 962, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.346494 754374 task_exit.go:204] [ 960: 962] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.346521 754374 task_exit.go:204] [ 960: 962] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.346542 754374 task_exit.go:204] [ 960: 962] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.346451 754374 task_signals.go:204] [ 960: 961] Signal 960, PID: 961, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.346461 754374 task_signals.go:204] [ 960: 964] Signal 960, PID: 964, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.346591 754374 task_exit.go:204] [ 960: 961] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.346635 754374 task_exit.go:204] [ 960: 961] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.346682 754374 task_exit.go:204] [ 960: 961] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.346705 754374 task_exit.go:204] [ 960: 964] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.348106 754374 task_exit.go:204] [ 960: 964] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.348170 754374 task_exit.go:204] [ 960: 964] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.348189 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.348231 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:58:59.348240 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.348416 754374 task_exit.go:204] [ 960: 960] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.349115 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.350979 754374 syscalls.go:262] [ 965: 965] Allocating stack with size of 8388608 bytes D0712 23:58:59.351108 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.353200 754374 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.353297 754374 usertrap_amd64.go:106] [ 965: 965] Map a usertrap vma at 61000 D0712 23:58:59.353422 754374 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc0005e4780 1 D0712 23:58:59.353469 754374 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 23:58:59.353936 754374 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.353980 754374 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc0005e4780 2 D0712 23:58:59.353999 754374 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 23:58:59.354866 754374 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.354902 754374 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc0005e4780 3 D0712 23:58:59.354917 754374 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 23:58:59.361954 754374 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.361998 754374 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc0005e4780 4 D0712 23:58:59.362022 754374 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 23:58:59.363361 754374 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.363402 754374 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc0005e4780 5 D0712 23:58:59.363417 754374 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 23:58:59.363909 754374 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.363940 754374 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc0005e4780 6 D0712 23:58:59.363952 754374 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 23:58:59.364494 754374 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.364512 754374 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc0005e4780 7 D0712 23:58:59.364519 754374 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 23:58:59.364652 754374 usertrap_amd64.go:212] [ 965: 966] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.364665 754374 usertrap_amd64.go:122] [ 965: 966] Allocate a new trap: 0xc0005e4780 8 D0712 23:58:59.364674 754374 usertrap_amd64.go:225] [ 965: 966] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 23:58:59.364883 754374 usertrap_amd64.go:212] [ 965: 966] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.364909 754374 usertrap_amd64.go:122] [ 965: 966] Allocate a new trap: 0xc0005e4780 9 D0712 23:58:59.364920 754374 usertrap_amd64.go:225] [ 965: 966] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 23:58:59.365175 754374 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.365205 754374 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc0005e4780 10 D0712 23:58:59.365214 754374 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 23:58:59.374073 754374 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.374145 754374 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc0005e4780 11 D0712 23:58:59.374165 754374 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 23:58:59.376886 754374 usertrap_amd64.go:212] [ 965: 966] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.376933 754374 usertrap_amd64.go:122] [ 965: 966] Allocate a new trap: 0xc0005e4780 12 D0712 23:58:59.377013 754374 usertrap_amd64.go:225] [ 965: 966] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 23:58:59.377960 754374 usertrap_amd64.go:212] [ 965: 966] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.378017 754374 usertrap_amd64.go:122] [ 965: 966] Allocate a new trap: 0xc0005e4780 13 D0712 23:58:59.378043 754374 usertrap_amd64.go:225] [ 965: 966] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 23:58:59.378124 754374 task_signals.go:470] [ 965: 965] Notified of signal 23 D0712 23:58:59.378254 754374 task_signals.go:220] [ 965: 965] Signal 23: delivering to handler I0712 23:58:59.386058 754374 compat.go:120] Unsupported syscall sys_438(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_438 for more information. D0712 23:58:59.386167 754374 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.386180 754374 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc0005e4780 14 D0712 23:58:59.386192 754374 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 23:58:59.386241 754374 task_exit.go:204] [ 965: 965] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.386285 754374 task_exit.go:204] [ 965: 965] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.386309 754374 task_signals.go:204] [ 965: 968] Signal 965, PID: 968, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.386334 754374 task_exit.go:204] [ 965: 968] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.386315 754374 task_signals.go:204] [ 965: 967] Signal 965, PID: 967, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.386350 754374 task_exit.go:204] [ 965: 968] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.386361 754374 task_exit.go:204] [ 965: 968] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.386414 754374 task_signals.go:204] [ 965: 969] Signal 965, PID: 969, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.386442 754374 task_exit.go:204] [ 965: 969] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.386454 754374 task_exit.go:204] [ 965: 969] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.386461 754374 task_exit.go:204] [ 965: 969] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.386453 754374 task_signals.go:204] [ 965: 966] Signal 965, PID: 966, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.386477 754374 task_exit.go:204] [ 965: 967] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.386523 754374 task_exit.go:204] [ 965: 967] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.386532 754374 task_exit.go:204] [ 965: 967] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.386551 754374 task_exit.go:204] [ 965: 966] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.387824 754374 task_exit.go:204] [ 965: 966] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.387881 754374 task_exit.go:204] [ 965: 966] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.387910 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.387986 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:58:59.388028 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.388126 754374 task_exit.go:204] [ 965: 965] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.388771 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.390521 754374 syscalls.go:262] [ 970: 970] Allocating stack with size of 8388608 bytes D0712 23:58:59.390642 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.392446 754374 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.392496 754374 usertrap_amd64.go:106] [ 970: 970] Map a usertrap vma at 66000 D0712 23:58:59.392612 754374 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc001725800 1 D0712 23:58:59.392648 754374 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:59.393068 754374 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.393113 754374 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc001725800 2 D0712 23:58:59.393132 754374 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:59.394347 754374 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.394377 754374 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc001725800 3 D0712 23:58:59.394389 754374 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:59.402180 754374 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.402225 754374 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc001725800 4 D0712 23:58:59.402246 754374 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:59.403397 754374 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.403436 754374 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc001725800 5 D0712 23:58:59.403450 754374 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:59.404723 754374 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.404752 754374 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc001725800 6 D0712 23:58:59.404767 754374 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:59.405526 754374 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.405569 754374 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc001725800 7 D0712 23:58:59.405589 754374 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:59.405785 754374 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.405794 754374 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc001725800 8 D0712 23:58:59.405802 754374 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:59.406225 754374 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.406245 754374 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc001725800 9 D0712 23:58:59.406361 754374 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:59.406395 754374 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.406403 754374 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc001725800 10 D0712 23:58:59.406410 754374 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:59.414611 754374 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.414635 754374 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc001725800 11 D0712 23:58:59.414655 754374 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:59.417458 754374 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.417493 754374 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc001725800 12 D0712 23:58:59.417511 754374 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:59.417567 754374 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.417576 754374 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc001725800 13 D0712 23:58:59.417596 754374 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:59.417655 754374 task_signals.go:470] [ 970: 970] Notified of signal 23 D0712 23:58:59.417759 754374 task_signals.go:220] [ 970: 970] Signal 23: delivering to handler I0712 23:58:59.425827 754374 compat.go:120] Unsupported syscall pidfd_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_open for more information. D0712 23:58:59.425925 754374 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.425941 754374 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc001725800 14 D0712 23:58:59.426014 754374 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:59.426095 754374 task_exit.go:204] [ 970: 970] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.426120 754374 task_exit.go:204] [ 970: 970] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.426160 754374 task_signals.go:204] [ 970: 971] Signal 970, PID: 971, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.426183 754374 task_exit.go:204] [ 970: 971] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.426193 754374 task_exit.go:204] [ 970: 971] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.426199 754374 task_exit.go:204] [ 970: 971] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.426227 754374 task_signals.go:204] [ 970: 972] Signal 970, PID: 972, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.426239 754374 task_exit.go:204] [ 970: 972] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.426278 754374 task_exit.go:204] [ 970: 972] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.426298 754374 task_exit.go:204] [ 970: 972] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.426352 754374 task_signals.go:204] [ 970: 974] Signal 970, PID: 974, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.426338 754374 task_signals.go:204] [ 970: 973] Signal 970, PID: 973, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.426378 754374 task_exit.go:204] [ 970: 974] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.426426 754374 task_exit.go:204] [ 970: 974] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.426443 754374 task_exit.go:204] [ 970: 974] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.426471 754374 task_exit.go:204] [ 970: 973] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.427699 754374 task_exit.go:204] [ 970: 973] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.427749 754374 task_exit.go:204] [ 970: 973] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.427774 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.427809 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:58:59.427819 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.427975 754374 task_exit.go:204] [ 970: 970] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.428800 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.430727 754374 syscalls.go:262] [ 975: 975] Allocating stack with size of 8388608 bytes D0712 23:58:59.430863 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.432405 754374 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.432457 754374 usertrap_amd64.go:106] [ 975: 975] Map a usertrap vma at 61000 D0712 23:58:59.432665 754374 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc001725860 1 D0712 23:58:59.432711 754374 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 23:58:59.433222 754374 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.433235 754374 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc001725860 2 D0712 23:58:59.433244 754374 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 23:58:59.434037 754374 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.434069 754374 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc001725860 3 D0712 23:58:59.434084 754374 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 23:58:59.442015 754374 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.442074 754374 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc001725860 4 D0712 23:58:59.442094 754374 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 23:58:59.443750 754374 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.443779 754374 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc001725860 5 D0712 23:58:59.443796 754374 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 23:58:59.443864 754374 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.443886 754374 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc001725860 6 D0712 23:58:59.443896 754374 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 23:58:59.444410 754374 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.444531 754374 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc001725860 7 D0712 23:58:59.444551 754374 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 23:58:59.444767 754374 usertrap_amd64.go:212] [ 975: 976] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.444791 754374 usertrap_amd64.go:122] [ 975: 976] Allocate a new trap: 0xc001725860 8 D0712 23:58:59.444802 754374 usertrap_amd64.go:225] [ 975: 976] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 23:58:59.445015 754374 usertrap_amd64.go:212] [ 975: 976] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:59.445047 754374 usertrap_amd64.go:122] [ 975: 976] Allocate a new trap: 0xc001725860 9 D0712 23:58:59.445057 754374 usertrap_amd64.go:225] [ 975: 976] Apply the binary patch addr 46b6e0 trap addr 612d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 23:58:59.445132 754374 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.445152 754374 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc001725860 10 D0712 23:58:59.445167 754374 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 23:58:59.445252 754374 usertrap_amd64.go:212] [ 975: 976] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.445271 754374 usertrap_amd64.go:122] [ 975: 976] Allocate a new trap: 0xc001725860 11 D0712 23:58:59.445281 754374 usertrap_amd64.go:225] [ 975: 976] Apply the binary patch addr 46af76 trap addr 61370 ([184 35 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 23:58:59.453816 754374 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.453867 754374 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc001725860 12 D0712 23:58:59.453885 754374 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 23:58:59.457143 754374 usertrap_amd64.go:212] [ 975: 976] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.457207 754374 usertrap_amd64.go:122] [ 975: 976] Allocate a new trap: 0xc001725860 13 D0712 23:58:59.457231 754374 usertrap_amd64.go:225] [ 975: 976] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 23:58:59.457268 754374 usertrap_amd64.go:212] [ 975: 976] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.457291 754374 usertrap_amd64.go:122] [ 975: 976] Allocate a new trap: 0xc001725860 14 D0712 23:58:59.457316 754374 usertrap_amd64.go:225] [ 975: 976] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 23:58:59.457362 754374 task_signals.go:470] [ 975: 975] Notified of signal 23 D0712 23:58:59.459868 754374 task_signals.go:220] [ 975: 975] Signal 23: delivering to handler I0712 23:58:59.467925 754374 compat.go:120] Unsupported syscall pidfd_send_signal(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_send_signal for more information. D0712 23:58:59.468001 754374 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.468014 754374 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc001725860 15 D0712 23:58:59.468026 754374 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0712 23:58:59.468081 754374 task_exit.go:204] [ 975: 975] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.468103 754374 task_exit.go:204] [ 975: 975] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.468130 754374 task_signals.go:204] [ 975: 978] Signal 975, PID: 978, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.468154 754374 task_exit.go:204] [ 975: 978] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.468165 754374 task_exit.go:204] [ 975: 978] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.468181 754374 task_exit.go:204] [ 975: 978] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.468153 754374 task_signals.go:204] [ 975: 977] Signal 975, PID: 977, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.468200 754374 task_signals.go:204] [ 975: 979] Signal 975, PID: 979, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.468198 754374 task_signals.go:204] [ 975: 976] Signal 975, PID: 976, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.468204 754374 task_exit.go:204] [ 975: 977] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.468235 754374 task_exit.go:204] [ 975: 977] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.468250 754374 task_exit.go:204] [ 975: 977] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.468260 754374 task_exit.go:204] [ 975: 979] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.468266 754374 task_exit.go:204] [ 975: 979] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.468270 754374 task_exit.go:204] [ 975: 979] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.468277 754374 task_exit.go:204] [ 975: 976] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.469438 754374 task_exit.go:204] [ 975: 976] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.469457 754374 task_exit.go:204] [ 975: 976] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.469471 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.469587 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:58:59.469611 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.469808 754374 task_exit.go:204] [ 975: 975] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.470580 754374 task_stop.go:118] [ 5: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.472231 754374 syscalls.go:262] [ 980: 980] Allocating stack with size of 8388608 bytes D0712 23:58:59.472482 754374 task_stop.go:138] [ 5: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.478369 754374 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.478433 754374 usertrap_amd64.go:106] [ 980: 980] Map a usertrap vma at 66000 D0712 23:58:59.478563 754374 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc00149ff50 1 D0712 23:58:59.478598 754374 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:59.479239 754374 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.479299 754374 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc00149ff50 2 D0712 23:58:59.479317 754374 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:59.480157 754374 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.480191 754374 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc00149ff50 3 D0712 23:58:59.480204 754374 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:59.487028 754374 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.487077 754374 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc00149ff50 4 D0712 23:58:59.487091 754374 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:59.488466 754374 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.488502 754374 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc00149ff50 5 D0712 23:58:59.488516 754374 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:59.488584 754374 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.488602 754374 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc00149ff50 6 D0712 23:58:59.488615 754374 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:59.489189 754374 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.489214 754374 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc00149ff50 7 D0712 23:58:59.489223 754374 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:59.489439 754374 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.489486 754374 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc00149ff50 8 D0712 23:58:59.489506 754374 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:59.489687 754374 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.489710 754374 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc00149ff50 9 D0712 23:58:59.489720 754374 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:59.489746 754374 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.489753 754374 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc00149ff50 10 D0712 23:58:59.489788 754374 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:59.490394 754374 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.490425 754374 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc00149ff50 11 D0712 23:58:59.490439 754374 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:59.490483 754374 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.490499 754374 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc00149ff50 12 D0712 23:58:59.490507 754374 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:59.490527 754374 task_signals.go:470] [ 980: 980] Notified of signal 23 D0712 23:58:59.490597 754374 task_signals.go:220] [ 980: 980] Signal 23: delivering to handler D0712 23:58:59.497562 754374 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.497604 754374 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc00149ff50 13 D0712 23:58:59.497626 754374 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:59.500915 754374 task_signals.go:470] [ 980: 980] Notified of signal 23 D0712 23:58:59.501020 754374 task_signals.go:220] [ 980: 980] Signal 23: delivering to handler D0712 23:58:59.509669 754374 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.509794 754374 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc00149ff50 14 D0712 23:58:59.509859 754374 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:59.510642 754374 task_exit.go:204] [ 980: 980] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.510684 754374 task_exit.go:204] [ 980: 980] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.510719 754374 task_signals.go:204] [ 980: 982] Signal 980, PID: 982, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.510746 754374 task_exit.go:204] [ 980: 982] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.510756 754374 task_exit.go:204] [ 980: 982] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.510762 754374 task_exit.go:204] [ 980: 982] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.510792 754374 task_signals.go:204] [ 980: 984] Signal 980, PID: 984, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.510816 754374 task_exit.go:204] [ 980: 984] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.510791 754374 task_signals.go:204] [ 980: 983] Signal 980, PID: 983, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.510837 754374 task_exit.go:204] [ 980: 984] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.510826 754374 task_signals.go:204] [ 980: 981] Signal 980, PID: 981, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.510845 754374 task_exit.go:204] [ 980: 984] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.510880 754374 task_exit.go:204] [ 980: 983] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.510900 754374 task_exit.go:204] [ 980: 983] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.510907 754374 task_exit.go:204] [ 980: 983] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.510920 754374 task_exit.go:204] [ 980: 981] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.512098 754374 task_exit.go:204] [ 980: 981] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.512153 754374 task_exit.go:204] [ 980: 981] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.512174 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.513114 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.513277 754374 task_exit.go:204] [ 980: 980] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.513361 754374 task_signals.go:470] [ 5: 10] Notified of signal 23 D0712 23:58:59.513403 754374 task_signals.go:220] [ 5: 10] Signal 23: delivering to handler D0712 23:58:59.514046 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.515654 754374 syscalls.go:262] [ 985: 985] Allocating stack with size of 8388608 bytes D0712 23:58:59.515758 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.517031 754374 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.517108 754374 usertrap_amd64.go:106] [ 985: 985] Map a usertrap vma at 60000 D0712 23:58:59.517252 754374 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc000ee0300 1 D0712 23:58:59.517305 754374 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:58:59.517827 754374 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.517863 754374 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc000ee0300 2 D0712 23:58:59.517882 754374 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:58:59.518805 754374 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.518856 754374 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc000ee0300 3 D0712 23:58:59.518875 754374 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:58:59.527742 754374 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.527780 754374 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc000ee0300 4 D0712 23:58:59.527794 754374 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:58:59.529065 754374 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.529130 754374 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc000ee0300 5 D0712 23:58:59.529150 754374 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:58:59.529242 754374 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.529267 754374 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc000ee0300 6 D0712 23:58:59.529274 754374 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:58:59.529822 754374 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.529865 754374 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc000ee0300 7 D0712 23:58:59.529882 754374 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:58:59.530077 754374 usertrap_amd64.go:212] [ 985: 986] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.530100 754374 usertrap_amd64.go:122] [ 985: 986] Allocate a new trap: 0xc000ee0300 8 D0712 23:58:59.530110 754374 usertrap_amd64.go:225] [ 985: 986] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:58:59.530664 754374 usertrap_amd64.go:212] [ 985: 986] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.530690 754374 usertrap_amd64.go:122] [ 985: 986] Allocate a new trap: 0xc000ee0300 9 D0712 23:58:59.530701 754374 usertrap_amd64.go:225] [ 985: 986] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:58:59.530721 754374 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.530726 754374 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc000ee0300 10 D0712 23:58:59.530731 754374 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:58:59.530783 754374 usertrap_amd64.go:212] [ 985: 988] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:59.530821 754374 usertrap_amd64.go:122] [ 985: 988] Allocate a new trap: 0xc000ee0300 11 D0712 23:58:59.530836 754374 usertrap_amd64.go:225] [ 985: 988] Apply the binary patch addr 46b6e0 trap addr 60370 ([184 24 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:58:59.531227 754374 usertrap_amd64.go:212] [ 985: 986] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.531255 754374 usertrap_amd64.go:122] [ 985: 986] Allocate a new trap: 0xc000ee0300 12 D0712 23:58:59.531270 754374 usertrap_amd64.go:225] [ 985: 986] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:58:59.531343 754374 usertrap_amd64.go:212] [ 985: 986] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.531363 754374 usertrap_amd64.go:122] [ 985: 986] Allocate a new trap: 0xc000ee0300 13 D0712 23:58:59.531375 754374 usertrap_amd64.go:225] [ 985: 986] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:58:59.531408 754374 task_signals.go:470] [ 985: 985] Notified of signal 23 D0712 23:58:59.531510 754374 task_signals.go:220] [ 985: 985] Signal 23: delivering to handler D0712 23:58:59.539418 754374 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.539476 754374 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc000ee0300 14 D0712 23:58:59.539498 754374 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46af29 trap addr 60460 ([184 37 1 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:58:59.542289 754374 task_signals.go:470] [ 985: 985] Notified of signal 23 D0712 23:58:59.543195 754374 task_signals.go:220] [ 985: 985] Signal 23: delivering to handler D0712 23:58:59.552249 754374 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.552308 754374 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc000ee0300 15 D0712 23:58:59.552326 754374 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0712 23:58:59.552400 754374 task_exit.go:204] [ 985: 985] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.552435 754374 task_exit.go:204] [ 985: 985] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.552491 754374 task_signals.go:204] [ 985: 986] Signal 985, PID: 986, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.553763 754374 task_exit.go:204] [ 985: 986] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.552543 754374 task_signals.go:204] [ 985: 988] Signal 985, PID: 988, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.552597 754374 task_signals.go:204] [ 985: 989] Signal 985, PID: 989, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.553805 754374 task_exit.go:204] [ 985: 986] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.553848 754374 task_exit.go:204] [ 985: 986] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.552577 754374 task_signals.go:204] [ 985: 987] Signal 985, PID: 987, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.553895 754374 task_exit.go:204] [ 985: 987] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.553913 754374 task_exit.go:204] [ 985: 987] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.553930 754374 task_exit.go:204] [ 985: 987] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.553956 754374 task_exit.go:204] [ 985: 988] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.554006 754374 task_exit.go:204] [ 985: 988] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.554031 754374 task_exit.go:204] [ 985: 988] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.554052 754374 task_exit.go:204] [ 985: 989] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.555391 754374 task_exit.go:204] [ 985: 989] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.555453 754374 task_exit.go:204] [ 985: 989] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.555479 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.555529 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:58:59.555565 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.555695 754374 task_exit.go:204] [ 985: 985] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.556528 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.558320 754374 syscalls.go:262] [ 990: 990] Allocating stack with size of 8388608 bytes D0712 23:58:59.558454 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.559364 754374 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.559412 754374 usertrap_amd64.go:106] [ 990: 990] Map a usertrap vma at 63000 D0712 23:58:59.559529 754374 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc0005e4db0 1 D0712 23:58:59.559574 754374 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:58:59.559933 754374 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.559956 754374 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc0005e4db0 2 D0712 23:58:59.559969 754374 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:58:59.560622 754374 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.560651 754374 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc0005e4db0 3 D0712 23:58:59.560666 754374 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:58:59.567467 754374 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.567514 754374 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc0005e4db0 4 D0712 23:58:59.567535 754374 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:58:59.568683 754374 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.568709 754374 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc0005e4db0 5 D0712 23:58:59.568718 754374 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:58:59.568775 754374 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.568793 754374 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc0005e4db0 6 D0712 23:58:59.568798 754374 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:58:59.569282 754374 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.569313 754374 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc0005e4db0 7 D0712 23:58:59.569323 754374 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:58:59.569512 754374 usertrap_amd64.go:212] [ 990: 991] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.569537 754374 usertrap_amd64.go:122] [ 990: 991] Allocate a new trap: 0xc0005e4db0 8 D0712 23:58:59.569549 754374 usertrap_amd64.go:225] [ 990: 991] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:58:59.569766 754374 usertrap_amd64.go:212] [ 990: 991] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.569800 754374 usertrap_amd64.go:122] [ 990: 991] Allocate a new trap: 0xc0005e4db0 9 D0712 23:58:59.569813 754374 usertrap_amd64.go:225] [ 990: 991] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:58:59.569988 754374 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.570014 754374 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc0005e4db0 10 D0712 23:58:59.570023 754374 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:58:59.577672 754374 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.577703 754374 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc0005e4db0 11 D0712 23:58:59.577716 754374 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:58:59.581039 754374 usertrap_amd64.go:212] [ 990: 991] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.581072 754374 usertrap_amd64.go:122] [ 990: 991] Allocate a new trap: 0xc0005e4db0 12 D0712 23:58:59.581084 754374 usertrap_amd64.go:225] [ 990: 991] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:58:59.581164 754374 usertrap_amd64.go:212] [ 990: 991] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.581184 754374 usertrap_amd64.go:122] [ 990: 991] Allocate a new trap: 0xc0005e4db0 13 D0712 23:58:59.581196 754374 usertrap_amd64.go:225] [ 990: 991] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:58:59.581256 754374 task_signals.go:470] [ 990: 990] Notified of signal 23 D0712 23:58:59.581323 754374 task_signals.go:220] [ 990: 990] Signal 23: delivering to handler D0712 23:58:59.589760 754374 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.589793 754374 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc0005e4db0 14 D0712 23:58:59.589809 754374 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:58:59.589879 754374 task_exit.go:204] [ 990: 990] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.589912 754374 task_exit.go:204] [ 990: 990] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.589947 754374 task_signals.go:204] [ 990: 994] Signal 990, PID: 994, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.589951 754374 task_signals.go:204] [ 990: 992] Signal 990, PID: 992, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.589984 754374 task_exit.go:204] [ 990: 994] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.590022 754374 task_exit.go:204] [ 990: 994] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.590049 754374 task_exit.go:204] [ 990: 994] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.589972 754374 task_signals.go:204] [ 990: 991] Signal 990, PID: 991, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.590075 754374 task_exit.go:204] [ 990: 991] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.590084 754374 task_exit.go:204] [ 990: 991] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.590079 754374 task_signals.go:204] [ 990: 993] Signal 990, PID: 993, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.590092 754374 task_exit.go:204] [ 990: 991] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.590115 754374 task_exit.go:204] [ 990: 992] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.590145 754374 task_exit.go:204] [ 990: 992] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.590161 754374 task_exit.go:204] [ 990: 992] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.590175 754374 task_exit.go:204] [ 990: 993] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.591243 754374 task_exit.go:204] [ 990: 993] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.591277 754374 task_exit.go:204] [ 990: 993] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.591301 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.591332 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:58:59.591374 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.591519 754374 task_exit.go:204] [ 990: 990] Transitioning from exit state TaskExitZombie to TaskExitDead I0712 23:58:59.591666 754374 compat.go:120] Unsupported syscall pkey_alloc(0x0,0x0,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_alloc for more information. D0712 23:58:59.592370 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.594070 754374 syscalls.go:262] [ 995: 995] Allocating stack with size of 8388608 bytes D0712 23:58:59.594217 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.595331 754374 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.595376 754374 usertrap_amd64.go:106] [ 995: 995] Map a usertrap vma at 67000 D0712 23:58:59.595456 754374 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc000c83380 1 D0712 23:58:59.595486 754374 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 23:58:59.595814 754374 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.595842 754374 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc000c83380 2 D0712 23:58:59.595852 754374 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 23:58:59.596395 754374 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.596469 754374 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc000c83380 3 D0712 23:58:59.596500 754374 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 23:58:59.602475 754374 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.602510 754374 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc000c83380 4 D0712 23:58:59.602525 754374 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 23:58:59.603814 754374 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.603841 754374 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc000c83380 5 D0712 23:58:59.603851 754374 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 23:58:59.603901 754374 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.603906 754374 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc000c83380 6 D0712 23:58:59.603911 754374 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 23:58:59.604083 754374 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.604101 754374 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc000c83380 7 D0712 23:58:59.604107 754374 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 23:58:59.604209 754374 usertrap_amd64.go:212] [ 995: 996] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.604230 754374 usertrap_amd64.go:122] [ 995: 996] Allocate a new trap: 0xc000c83380 8 D0712 23:58:59.604241 754374 usertrap_amd64.go:225] [ 995: 996] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 23:58:59.604443 754374 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.604472 754374 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc000c83380 9 D0712 23:58:59.604484 754374 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 23:58:59.604505 754374 usertrap_amd64.go:212] [ 995: 996] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.604511 754374 usertrap_amd64.go:122] [ 995: 996] Allocate a new trap: 0xc000c83380 10 D0712 23:58:59.604516 754374 usertrap_amd64.go:225] [ 995: 996] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 23:58:59.612102 754374 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.612254 754374 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc000c83380 11 D0712 23:58:59.612353 754374 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 23:58:59.615085 754374 usertrap_amd64.go:212] [ 995: 996] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.615125 754374 usertrap_amd64.go:122] [ 995: 996] Allocate a new trap: 0xc000c83380 12 D0712 23:58:59.615137 754374 usertrap_amd64.go:225] [ 995: 996] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 23:58:59.615214 754374 usertrap_amd64.go:212] [ 995: 996] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.615236 754374 usertrap_amd64.go:122] [ 995: 996] Allocate a new trap: 0xc000c83380 13 D0712 23:58:59.615245 754374 usertrap_amd64.go:225] [ 995: 996] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 23:58:59.615329 754374 task_signals.go:470] [ 995: 995] Notified of signal 23 D0712 23:58:59.615430 754374 task_signals.go:220] [ 995: 995] Signal 23: delivering to handler I0712 23:58:59.622624 754374 compat.go:120] Unsupported syscall pkey_free(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_free for more information. D0712 23:58:59.622712 754374 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.622746 754374 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc000c83380 14 D0712 23:58:59.622759 754374 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 23:58:59.622841 754374 task_exit.go:204] [ 995: 995] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.622877 754374 task_exit.go:204] [ 995: 995] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.622915 754374 task_signals.go:204] [ 995: 996] Signal 995, PID: 996, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.622967 754374 task_signals.go:204] [ 995: 999] Signal 995, PID: 999, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.622978 754374 task_signals.go:204] [ 995: 997] Signal 995, PID: 997, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.623002 754374 task_exit.go:204] [ 995: 996] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.622915 754374 task_signals.go:204] [ 995: 998] Signal 995, PID: 998, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.623076 754374 task_exit.go:204] [ 995: 996] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.623111 754374 task_exit.go:204] [ 995: 996] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.623139 754374 task_exit.go:204] [ 995: 999] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.623169 754374 task_exit.go:204] [ 995: 999] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.623178 754374 task_exit.go:204] [ 995: 999] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.623193 754374 task_exit.go:204] [ 995: 997] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.623205 754374 task_exit.go:204] [ 995: 997] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.623252 754374 task_exit.go:204] [ 995: 997] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.623287 754374 task_exit.go:204] [ 995: 998] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.624297 754374 task_exit.go:204] [ 995: 998] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.624324 754374 task_exit.go:204] [ 995: 998] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.624336 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.624403 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:58:59.624424 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.624555 754374 task_exit.go:204] [ 995: 995] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.625371 754374 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.627317 754374 syscalls.go:262] [ 1000: 1000] Allocating stack with size of 8388608 bytes D0712 23:58:59.627491 754374 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.628679 754374 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.628739 754374 usertrap_amd64.go:106] [ 1000: 1000] Map a usertrap vma at 62000 D0712 23:58:59.629297 754374 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0009b9920 1 D0712 23:58:59.629386 754374 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:58:59.629821 754374 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.629840 754374 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0009b9920 2 D0712 23:58:59.629854 754374 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:58:59.630763 754374 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.630804 754374 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0009b9920 3 D0712 23:58:59.630824 754374 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:58:59.638612 754374 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.638645 754374 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0009b9920 4 D0712 23:58:59.638660 754374 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:58:59.640081 754374 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.640133 754374 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0009b9920 5 D0712 23:58:59.640164 754374 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:58:59.640278 754374 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.640293 754374 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0009b9920 6 D0712 23:58:59.640303 754374 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:58:59.640840 754374 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.640869 754374 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0009b9920 7 D0712 23:58:59.640877 754374 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:58:59.641239 754374 usertrap_amd64.go:212] [ 1000: 1001] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.641272 754374 usertrap_amd64.go:122] [ 1000: 1001] Allocate a new trap: 0xc0009b9920 8 D0712 23:58:59.641285 754374 usertrap_amd64.go:225] [ 1000: 1001] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:58:59.641469 754374 usertrap_amd64.go:212] [ 1000: 1001] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.641493 754374 usertrap_amd64.go:122] [ 1000: 1001] Allocate a new trap: 0xc0009b9920 9 D0712 23:58:59.641501 754374 usertrap_amd64.go:225] [ 1000: 1001] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:58:59.641540 754374 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.641547 754374 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0009b9920 10 D0712 23:58:59.641556 754374 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:58:59.641937 754374 usertrap_amd64.go:212] [ 1000: 1001] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.642023 754374 usertrap_amd64.go:122] [ 1000: 1001] Allocate a new trap: 0xc0009b9920 11 D0712 23:58:59.642058 754374 usertrap_amd64.go:225] [ 1000: 1001] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:58:59.642089 754374 usertrap_amd64.go:212] [ 1000: 1001] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.642104 754374 usertrap_amd64.go:122] [ 1000: 1001] Allocate a new trap: 0xc0009b9920 12 D0712 23:58:59.642122 754374 usertrap_amd64.go:225] [ 1000: 1001] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:58:59.642189 754374 task_signals.go:470] [ 1000: 1003] Notified of signal 23 D0712 23:58:59.642226 754374 task_signals.go:179] [ 1000: 1003] Restarting syscall 202: interrupted by signal 23 D0712 23:58:59.642238 754374 task_signals.go:220] [ 1000: 1003] Signal 23: delivering to handler D0712 23:58:59.651001 754374 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.651053 754374 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0009b9920 13 D0712 23:58:59.651070 754374 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:58:59.652577 754374 task_signals.go:470] [ 1000: 1000] Notified of signal 23 D0712 23:58:59.653670 754374 task_signals.go:220] [ 1000: 1000] Signal 23: delivering to handler D0712 23:58:59.653826 754374 task_signals.go:481] [ 1000: 1000] No task notified of signal 23 D0712 23:58:59.653880 754374 task_signals.go:220] [ 1000: 1000] Signal 23: delivering to handler I0712 23:58:59.663694 754374 compat.go:120] Unsupported syscall pkey_mprotect(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_mprotect for more information. D0712 23:58:59.663856 754374 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.663879 754374 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0009b9920 14 D0712 23:58:59.663893 754374 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:58:59.663987 754374 task_exit.go:204] [ 1000: 1000] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.664010 754374 task_exit.go:204] [ 1000: 1000] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.664041 754374 task_signals.go:204] [ 1000: 1001] Signal 1000, PID: 1001, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.664066 754374 task_exit.go:204] [ 1000: 1001] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.664075 754374 task_exit.go:204] [ 1000: 1001] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.664086 754374 task_exit.go:204] [ 1000: 1001] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.664109 754374 task_signals.go:204] [ 1000: 1002] Signal 1000, PID: 1002, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.664133 754374 task_exit.go:204] [ 1000: 1002] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.664142 754374 task_exit.go:204] [ 1000: 1002] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.664158 754374 task_exit.go:204] [ 1000: 1002] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.664182 754374 task_signals.go:204] [ 1000: 1003] Signal 1000, PID: 1003, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.664202 754374 task_exit.go:204] [ 1000: 1003] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.664211 754374 task_exit.go:204] [ 1000: 1003] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.664217 754374 task_exit.go:204] [ 1000: 1003] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.664243 754374 task_signals.go:204] [ 1000: 1004] Signal 1000, PID: 1004, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.664261 754374 task_exit.go:204] [ 1000: 1004] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.665713 754374 task_exit.go:204] [ 1000: 1004] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.665778 754374 task_exit.go:204] [ 1000: 1004] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.665798 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.665869 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.666013 754374 task_exit.go:204] [ 1000: 1000] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.666187 754374 task_signals.go:470] [ 5: 8] Notified of signal 23 D0712 23:58:59.666311 754374 task_signals.go:179] [ 5: 8] Restarting syscall 202: interrupted by signal 23 D0712 23:58:59.666381 754374 task_signals.go:220] [ 5: 8] Signal 23: delivering to handler D0712 23:58:59.666935 754374 task_stop.go:118] [ 5: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.669091 754374 syscalls.go:262] [ 1005: 1005] Allocating stack with size of 8388608 bytes D0712 23:58:59.669283 754374 task_stop.go:138] [ 5: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.672962 754374 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.673038 754374 usertrap_amd64.go:106] [ 1005: 1005] Map a usertrap vma at 66000 D0712 23:58:59.673332 754374 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc000c83b60 1 D0712 23:58:59.673393 754374 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:59.673991 754374 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.674027 754374 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc000c83b60 2 D0712 23:58:59.674044 754374 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:59.674803 754374 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.674834 754374 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc000c83b60 3 D0712 23:58:59.674847 754374 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:59.681870 754374 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.681926 754374 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc000c83b60 4 D0712 23:58:59.681946 754374 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:59.683203 754374 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.683243 754374 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc000c83b60 5 D0712 23:58:59.683259 754374 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:59.683332 754374 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.683352 754374 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc000c83b60 6 D0712 23:58:59.683362 754374 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:59.683835 754374 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.683870 754374 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc000c83b60 7 D0712 23:58:59.683881 754374 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:59.684161 754374 usertrap_amd64.go:212] [ 1005: 1006] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.684198 754374 usertrap_amd64.go:122] [ 1005: 1006] Allocate a new trap: 0xc000c83b60 8 D0712 23:58:59.684213 754374 usertrap_amd64.go:225] [ 1005: 1006] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:59.684421 754374 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.684447 754374 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc000c83b60 9 D0712 23:58:59.684458 754374 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:59.684501 754374 usertrap_amd64.go:212] [ 1005: 1006] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.684520 754374 usertrap_amd64.go:122] [ 1005: 1006] Allocate a new trap: 0xc000c83b60 10 D0712 23:58:59.684532 754374 usertrap_amd64.go:225] [ 1005: 1006] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:59.692095 754374 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.692118 754374 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc000c83b60 11 D0712 23:58:59.692128 754374 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:59.694877 754374 usertrap_amd64.go:212] [ 1005: 1006] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.694906 754374 usertrap_amd64.go:122] [ 1005: 1006] Allocate a new trap: 0xc000c83b60 12 D0712 23:58:59.694919 754374 usertrap_amd64.go:225] [ 1005: 1006] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:59.694983 754374 usertrap_amd64.go:212] [ 1005: 1006] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.695006 754374 usertrap_amd64.go:122] [ 1005: 1006] Allocate a new trap: 0xc000c83b60 13 D0712 23:58:59.695017 754374 usertrap_amd64.go:225] [ 1005: 1006] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:59.695068 754374 task_signals.go:470] [ 1005: 1005] Notified of signal 23 D0712 23:58:59.695120 754374 task_signals.go:220] [ 1005: 1005] Signal 23: delivering to handler D0712 23:58:59.702101 754374 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.702157 754374 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc000c83b60 14 D0712 23:58:59.702172 754374 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:59.702242 754374 task_exit.go:204] [ 1005: 1005] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.702273 754374 task_exit.go:204] [ 1005: 1005] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.702305 754374 task_signals.go:204] [ 1005: 1009] Signal 1005, PID: 1009, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.702338 754374 task_exit.go:204] [ 1005: 1009] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.702277 754374 task_signals.go:204] [ 1005: 1007] Signal 1005, PID: 1007, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.702349 754374 task_exit.go:204] [ 1005: 1009] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.702357 754374 task_exit.go:204] [ 1005: 1009] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.702374 754374 task_signals.go:204] [ 1005: 1006] Signal 1005, PID: 1006, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.702382 754374 task_exit.go:204] [ 1005: 1006] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.702388 754374 task_exit.go:204] [ 1005: 1006] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.702393 754374 task_exit.go:204] [ 1005: 1006] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.702308 754374 task_signals.go:204] [ 1005: 1008] Signal 1005, PID: 1008, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.702400 754374 task_exit.go:204] [ 1005: 1007] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.702406 754374 task_exit.go:204] [ 1005: 1007] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.702409 754374 task_exit.go:204] [ 1005: 1007] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.702417 754374 task_exit.go:204] [ 1005: 1008] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.703621 754374 task_exit.go:204] [ 1005: 1008] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.703656 754374 task_exit.go:204] [ 1005: 1008] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.703670 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.703703 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.703772 754374 task_exit.go:204] [ 1005: 1005] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.704414 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.706073 754374 syscalls.go:262] [ 1010: 1010] Allocating stack with size of 8388608 bytes D0712 23:58:59.706183 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.707101 754374 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.707141 754374 usertrap_amd64.go:106] [ 1010: 1010] Map a usertrap vma at 66000 D0712 23:58:59.707528 754374 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0009b9c50 1 D0712 23:58:59.707569 754374 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:58:59.708024 754374 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.708042 754374 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0009b9c50 2 D0712 23:58:59.708054 754374 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:58:59.708737 754374 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.708763 754374 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0009b9c50 3 D0712 23:58:59.708774 754374 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:58:59.714263 754374 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.714291 754374 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0009b9c50 4 D0712 23:58:59.714306 754374 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:58:59.715514 754374 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.715524 754374 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0009b9c50 5 D0712 23:58:59.715531 754374 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:58:59.715547 754374 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.715552 754374 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0009b9c50 6 D0712 23:58:59.715558 754374 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:58:59.715936 754374 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.715958 754374 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0009b9c50 7 D0712 23:58:59.715964 754374 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:58:59.716358 754374 usertrap_amd64.go:212] [ 1010: 1011] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.716387 754374 usertrap_amd64.go:122] [ 1010: 1011] Allocate a new trap: 0xc0009b9c50 8 D0712 23:58:59.716396 754374 usertrap_amd64.go:225] [ 1010: 1011] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:58:59.716633 754374 usertrap_amd64.go:212] [ 1010: 1011] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.716659 754374 usertrap_amd64.go:122] [ 1010: 1011] Allocate a new trap: 0xc0009b9c50 9 D0712 23:58:59.716671 754374 usertrap_amd64.go:225] [ 1010: 1011] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:58:59.716972 754374 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.717008 754374 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0009b9c50 10 D0712 23:58:59.717024 754374 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:58:59.717050 754374 usertrap_amd64.go:212] [ 1010: 1013] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:59.717059 754374 usertrap_amd64.go:122] [ 1010: 1013] Allocate a new trap: 0xc0009b9c50 11 D0712 23:58:59.717068 754374 usertrap_amd64.go:225] [ 1010: 1013] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:58:59.725736 754374 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.725772 754374 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0009b9c50 12 D0712 23:58:59.725784 754374 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:58:59.729946 754374 usertrap_amd64.go:212] [ 1010: 1011] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.729979 754374 usertrap_amd64.go:122] [ 1010: 1011] Allocate a new trap: 0xc0009b9c50 13 D0712 23:58:59.729992 754374 usertrap_amd64.go:225] [ 1010: 1011] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:58:59.730029 754374 usertrap_amd64.go:212] [ 1010: 1011] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.730056 754374 usertrap_amd64.go:122] [ 1010: 1011] Allocate a new trap: 0xc0009b9c50 14 D0712 23:58:59.730070 754374 usertrap_amd64.go:225] [ 1010: 1011] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:58:59.730201 754374 task_signals.go:470] [ 1010: 1010] Notified of signal 23 D0712 23:58:59.730336 754374 task_signals.go:220] [ 1010: 1010] Signal 23: delivering to handler D0712 23:58:59.736808 754374 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.736841 754374 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0009b9c50 15 D0712 23:58:59.736855 754374 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0712 23:58:59.736996 754374 task_exit.go:204] [ 1010: 1010] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.737043 754374 task_signals.go:204] [ 1010: 1011] Signal 1010, PID: 1011, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.737040 754374 task_signals.go:204] [ 1010: 1012] Signal 1010, PID: 1012, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.737053 754374 task_exit.go:204] [ 1010: 1010] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.737080 754374 task_signals.go:204] [ 1010: 1014] Signal 1010, PID: 1014, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.737111 754374 task_exit.go:204] [ 1010: 1014] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.737128 754374 task_signals.go:204] [ 1010: 1013] Signal 1010, PID: 1013, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.737140 754374 task_exit.go:204] [ 1010: 1014] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.737145 754374 task_exit.go:204] [ 1010: 1014] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.737160 754374 task_exit.go:204] [ 1010: 1013] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.737183 754374 task_exit.go:204] [ 1010: 1013] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.737191 754374 task_exit.go:204] [ 1010: 1013] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.737201 754374 task_exit.go:204] [ 1010: 1011] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.737210 754374 task_exit.go:204] [ 1010: 1011] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.737216 754374 task_exit.go:204] [ 1010: 1011] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.737234 754374 task_exit.go:204] [ 1010: 1012] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.738279 754374 task_exit.go:204] [ 1010: 1012] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.738320 754374 task_exit.go:204] [ 1010: 1012] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.738335 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.738366 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:58:59.738378 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.738465 754374 task_exit.go:204] [ 1010: 1010] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.739345 754374 task_stop.go:118] [ 5: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.741265 754374 syscalls.go:262] [ 1015: 1015] Allocating stack with size of 8388608 bytes D0712 23:58:59.741460 754374 task_stop.go:138] [ 5: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.742737 754374 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.742852 754374 usertrap_amd64.go:106] [ 1015: 1015] Map a usertrap vma at 6a000 D0712 23:58:59.743053 754374 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc000ee0bd0 1 D0712 23:58:59.743107 754374 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 23:58:59.743525 754374 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.743544 754374 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc000ee0bd0 2 D0712 23:58:59.743557 754374 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 23:58:59.744366 754374 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.744399 754374 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc000ee0bd0 3 D0712 23:58:59.744411 754374 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 23:58:59.750690 754374 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.750734 754374 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc000ee0bd0 4 D0712 23:58:59.750753 754374 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 23:58:59.751768 754374 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.751795 754374 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc000ee0bd0 5 D0712 23:58:59.751806 754374 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 23:58:59.751871 754374 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.751879 754374 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc000ee0bd0 6 D0712 23:58:59.751888 754374 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 23:58:59.752361 754374 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.752378 754374 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc000ee0bd0 7 D0712 23:58:59.752389 754374 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 23:58:59.752684 754374 usertrap_amd64.go:212] [ 1015: 1016] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.752762 754374 usertrap_amd64.go:122] [ 1015: 1016] Allocate a new trap: 0xc000ee0bd0 8 D0712 23:58:59.752786 754374 usertrap_amd64.go:225] [ 1015: 1016] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 23:58:59.752935 754374 usertrap_amd64.go:212] [ 1015: 1016] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.752995 754374 usertrap_amd64.go:122] [ 1015: 1016] Allocate a new trap: 0xc000ee0bd0 9 D0712 23:58:59.753006 754374 usertrap_amd64.go:225] [ 1015: 1016] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 23:58:59.753080 754374 usertrap_amd64.go:212] [ 1015: 1016] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.753147 754374 usertrap_amd64.go:122] [ 1015: 1016] Allocate a new trap: 0xc000ee0bd0 10 D0712 23:58:59.753197 754374 usertrap_amd64.go:225] [ 1015: 1016] Apply the binary patch addr 46b020 trap addr 6a320 ([184 39 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 23:58:59.753257 754374 usertrap_amd64.go:212] [ 1015: 1016] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.753267 754374 usertrap_amd64.go:122] [ 1015: 1016] Allocate a new trap: 0xc000ee0bd0 11 D0712 23:58:59.753277 754374 usertrap_amd64.go:225] [ 1015: 1016] Apply the binary patch addr 46b04f trap addr 6a370 ([184 234 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 23:58:59.753347 754374 task_signals.go:481] [ 1015: 1015] No task notified of signal 23 D0712 23:58:59.753401 754374 task_signals.go:220] [ 1015: 1015] Signal 23: delivering to handler D0712 23:58:59.753464 754374 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.753487 754374 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc000ee0bd0 12 D0712 23:58:59.753498 754374 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b57c trap addr 6a3c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 23:58:59.753645 754374 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b6e0:sysno 24 D0712 23:58:59.753673 754374 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc000ee0bd0 13 D0712 23:58:59.753683 754374 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b6e0 trap addr 6a410 ([184 24 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 23:58:59.762113 754374 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.762148 754374 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc000ee0bd0 14 D0712 23:58:59.762163 754374 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46af29 trap addr 6a460 ([184 37 1 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 23:58:59.763714 754374 sampler.go:191] Time: Adjusting syscall overhead down to 875 D0712 23:58:59.764686 754374 task_signals.go:470] [ 1015: 1015] Notified of signal 23 D0712 23:58:59.764773 754374 task_signals.go:220] [ 1015: 1015] Signal 23: delivering to handler D0712 23:58:59.773470 754374 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.773521 754374 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc000ee0bd0 15 D0712 23:58:59.773539 754374 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0712 23:58:59.773616 754374 task_exit.go:204] [ 1015: 1015] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.773655 754374 task_exit.go:204] [ 1015: 1015] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.773691 754374 task_signals.go:204] [ 1015: 1018] Signal 1015, PID: 1018, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.773708 754374 task_signals.go:204] [ 1015: 1016] Signal 1015, PID: 1016, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.773708 754374 task_exit.go:204] [ 1015: 1018] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.773686 754374 task_signals.go:204] [ 1015: 1017] Signal 1015, PID: 1017, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.773776 754374 task_exit.go:204] [ 1015: 1018] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.773891 754374 task_exit.go:204] [ 1015: 1018] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.774009 754374 task_exit.go:204] [ 1015: 1016] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.774007 754374 task_signals.go:204] [ 1015: 1019] Signal 1015, PID: 1019, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.774039 754374 task_exit.go:204] [ 1015: 1016] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.774048 754374 task_exit.go:204] [ 1015: 1016] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.774066 754374 task_exit.go:204] [ 1015: 1019] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.774087 754374 task_exit.go:204] [ 1015: 1019] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.774094 754374 task_exit.go:204] [ 1015: 1019] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.774108 754374 task_exit.go:204] [ 1015: 1017] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.775167 754374 task_exit.go:204] [ 1015: 1017] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.775223 754374 task_exit.go:204] [ 1015: 1017] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.775245 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.775282 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.775454 754374 task_exit.go:204] [ 1015: 1015] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.775635 754374 task_signals.go:470] [ 5: 10] Notified of signal 23 D0712 23:58:59.775732 754374 task_signals.go:220] [ 5: 10] Signal 23: delivering to handler D0712 23:58:59.776229 754374 task_stop.go:118] [ 5: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.777985 754374 syscalls.go:262] [ 1020: 1020] Allocating stack with size of 8388608 bytes D0712 23:58:59.778087 754374 task_stop.go:138] [ 5: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.779950 754374 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.780008 754374 usertrap_amd64.go:106] [ 1020: 1020] Map a usertrap vma at 61000 D0712 23:58:59.780098 754374 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0005e5920 1 D0712 23:58:59.780135 754374 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 23:58:59.780560 754374 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.780590 754374 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0005e5920 2 D0712 23:58:59.780612 754374 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 23:58:59.781546 754374 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.781576 754374 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0005e5920 3 D0712 23:58:59.781590 754374 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 23:58:59.788840 754374 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.788882 754374 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0005e5920 4 D0712 23:58:59.788905 754374 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 23:58:59.790186 754374 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.790247 754374 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0005e5920 5 D0712 23:58:59.790268 754374 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 23:58:59.790416 754374 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.790450 754374 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0005e5920 6 D0712 23:58:59.790467 754374 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 23:58:59.790786 754374 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.790813 754374 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0005e5920 7 D0712 23:58:59.790824 754374 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 23:58:59.791067 754374 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.791099 754374 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc0005e5920 8 D0712 23:58:59.791112 754374 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 23:58:59.791322 754374 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.791359 754374 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc0005e5920 9 D0712 23:58:59.791369 754374 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 23:58:59.791399 754374 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.791417 754374 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0005e5920 10 D0712 23:58:59.791426 754374 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 23:58:59.791879 754374 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.791907 754374 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc0005e5920 11 D0712 23:58:59.791919 754374 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 23:58:59.791965 754374 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.791981 754374 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc0005e5920 12 D0712 23:58:59.791993 754374 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 23:58:59.792013 754374 task_signals.go:470] [ 1020: 1020] Notified of signal 23 D0712 23:58:59.792042 754374 task_signals.go:220] [ 1020: 1020] Signal 23: delivering to handler D0712 23:58:59.800427 754374 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.800458 754374 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0005e5920 13 D0712 23:58:59.800468 754374 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 23:58:59.802205 754374 task_signals.go:470] [ 1020: 1020] Notified of signal 23 D0712 23:58:59.802965 754374 task_signals.go:220] [ 1020: 1020] Signal 23: delivering to handler D0712 23:58:59.803190 754374 task_signals.go:481] [ 1020: 1020] No task notified of signal 23 D0712 23:58:59.803215 754374 task_signals.go:220] [ 1020: 1020] Signal 23: delivering to handler D0712 23:58:59.803300 754374 task_signals.go:470] [ 1020: 1020] Notified of signal 23 D0712 23:58:59.803355 754374 task_signals.go:220] [ 1020: 1020] Signal 23: delivering to handler D0712 23:58:59.811910 754374 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.811961 754374 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0005e5920 14 D0712 23:58:59.811977 754374 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 23:58:59.812061 754374 task_exit.go:204] [ 1020: 1020] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.812106 754374 task_exit.go:204] [ 1020: 1020] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.812128 754374 task_signals.go:204] [ 1020: 1021] Signal 1020, PID: 1021, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.812148 754374 task_signals.go:204] [ 1020: 1023] Signal 1020, PID: 1023, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.812174 754374 task_exit.go:204] [ 1020: 1021] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.812194 754374 task_signals.go:204] [ 1020: 1024] Signal 1020, PID: 1024, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.812226 754374 task_signals.go:204] [ 1020: 1022] Signal 1020, PID: 1022, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.812251 754374 task_exit.go:204] [ 1020: 1021] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.812268 754374 task_exit.go:204] [ 1020: 1021] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.812291 754374 task_exit.go:204] [ 1020: 1023] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.812302 754374 task_exit.go:204] [ 1020: 1023] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.812308 754374 task_exit.go:204] [ 1020: 1023] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.812328 754374 task_exit.go:204] [ 1020: 1024] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.812335 754374 task_exit.go:204] [ 1020: 1024] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.812338 754374 task_exit.go:204] [ 1020: 1024] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.812346 754374 task_exit.go:204] [ 1020: 1022] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.813632 754374 task_exit.go:204] [ 1020: 1022] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.813687 754374 task_exit.go:204] [ 1020: 1022] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.813706 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.813752 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.813875 754374 task_exit.go:204] [ 1020: 1020] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.814674 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.816216 754374 syscalls.go:262] [ 1025: 1025] Allocating stack with size of 8388608 bytes D0712 23:58:59.816331 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.817575 754374 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.817618 754374 usertrap_amd64.go:106] [ 1025: 1025] Map a usertrap vma at 64000 D0712 23:58:59.817741 754374 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000786960 1 D0712 23:58:59.817771 754374 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 23:58:59.818161 754374 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.818184 754374 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000786960 2 D0712 23:58:59.818192 754374 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 23:58:59.819027 754374 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.819060 754374 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000786960 3 D0712 23:58:59.819075 754374 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 23:58:59.827065 754374 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.827140 754374 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000786960 4 D0712 23:58:59.827166 754374 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 23:58:59.828653 754374 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.828687 754374 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000786960 5 D0712 23:58:59.828701 754374 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 23:58:59.828775 754374 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.828801 754374 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000786960 6 D0712 23:58:59.828811 754374 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 23:58:59.829136 754374 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.829162 754374 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000786960 7 D0712 23:58:59.829171 754374 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 23:58:59.829405 754374 usertrap_amd64.go:212] [ 1025: 1026] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.829452 754374 usertrap_amd64.go:122] [ 1025: 1026] Allocate a new trap: 0xc000786960 8 D0712 23:58:59.829470 754374 usertrap_amd64.go:225] [ 1025: 1026] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 23:58:59.829817 754374 usertrap_amd64.go:212] [ 1025: 1026] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.829856 754374 usertrap_amd64.go:122] [ 1025: 1026] Allocate a new trap: 0xc000786960 9 D0712 23:58:59.829880 754374 usertrap_amd64.go:225] [ 1025: 1026] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 23:58:59.829987 754374 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.830020 754374 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000786960 10 D0712 23:58:59.830034 754374 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 23:58:59.830654 754374 usertrap_amd64.go:212] [ 1025: 1026] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.830686 754374 usertrap_amd64.go:122] [ 1025: 1026] Allocate a new trap: 0xc000786960 11 D0712 23:58:59.830704 754374 usertrap_amd64.go:225] [ 1025: 1026] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 23:58:59.830740 754374 usertrap_amd64.go:212] [ 1025: 1026] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.830749 754374 usertrap_amd64.go:122] [ 1025: 1026] Allocate a new trap: 0xc000786960 12 D0712 23:58:59.830768 754374 usertrap_amd64.go:225] [ 1025: 1026] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 23:58:59.830798 754374 task_signals.go:470] [ 1025: 1025] Notified of signal 23 D0712 23:58:59.830996 754374 task_signals.go:220] [ 1025: 1025] Signal 23: delivering to handler D0712 23:58:59.838430 754374 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.838464 754374 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000786960 13 D0712 23:58:59.838473 754374 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 23:58:59.841389 754374 task_signals.go:470] [ 1025: 1025] Notified of signal 23 D0712 23:58:59.841560 754374 task_signals.go:220] [ 1025: 1025] Signal 23: delivering to handler D0712 23:58:59.850280 754374 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.850337 754374 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000786960 14 D0712 23:58:59.850358 754374 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 23:58:59.850418 754374 task_exit.go:204] [ 1025: 1025] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.850445 754374 task_exit.go:204] [ 1025: 1025] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.850497 754374 task_signals.go:204] [ 1025: 1026] Signal 1025, PID: 1026, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.850529 754374 task_exit.go:204] [ 1025: 1026] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.850539 754374 task_exit.go:204] [ 1025: 1026] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.850526 754374 task_signals.go:204] [ 1025: 1028] Signal 1025, PID: 1028, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.850545 754374 task_exit.go:204] [ 1025: 1026] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.850576 754374 task_signals.go:204] [ 1025: 1027] Signal 1025, PID: 1027, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.850570 754374 task_signals.go:204] [ 1025: 1029] Signal 1025, PID: 1029, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.850591 754374 task_exit.go:204] [ 1025: 1028] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.850615 754374 task_exit.go:204] [ 1025: 1028] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.850626 754374 task_exit.go:204] [ 1025: 1028] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.850644 754374 task_exit.go:204] [ 1025: 1027] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.850654 754374 task_exit.go:204] [ 1025: 1027] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.850661 754374 task_exit.go:204] [ 1025: 1027] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.850674 754374 task_exit.go:204] [ 1025: 1029] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.851918 754374 task_exit.go:204] [ 1025: 1029] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.851947 754374 task_exit.go:204] [ 1025: 1029] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.851965 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.853058 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:58:59.853094 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.853316 754374 task_exit.go:204] [ 1025: 1025] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.854043 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.855993 754374 syscalls.go:262] [ 1030: 1030] Allocating stack with size of 8388608 bytes D0712 23:58:59.856118 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.857617 754374 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.857673 754374 usertrap_amd64.go:106] [ 1030: 1030] Map a usertrap vma at 62000 D0712 23:58:59.857799 754374 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000786c00 1 D0712 23:58:59.857834 754374 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:58:59.858307 754374 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.858329 754374 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000786c00 2 D0712 23:58:59.858342 754374 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:58:59.859045 754374 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.859063 754374 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000786c00 3 D0712 23:58:59.859075 754374 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:58:59.865888 754374 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.865928 754374 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000786c00 4 D0712 23:58:59.865940 754374 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:58:59.867142 754374 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.867170 754374 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000786c00 5 D0712 23:58:59.867180 754374 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:58:59.867262 754374 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.867307 754374 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000786c00 6 D0712 23:58:59.867325 754374 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:58:59.867599 754374 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.867621 754374 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000786c00 7 D0712 23:58:59.867631 754374 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:58:59.867837 754374 usertrap_amd64.go:212] [ 1030: 1031] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.867861 754374 usertrap_amd64.go:122] [ 1030: 1031] Allocate a new trap: 0xc000786c00 8 D0712 23:58:59.867876 754374 usertrap_amd64.go:225] [ 1030: 1031] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:58:59.868138 754374 usertrap_amd64.go:212] [ 1030: 1031] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.868165 754374 usertrap_amd64.go:122] [ 1030: 1031] Allocate a new trap: 0xc000786c00 9 D0712 23:58:59.868174 754374 usertrap_amd64.go:225] [ 1030: 1031] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:58:59.868199 754374 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.868205 754374 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000786c00 10 D0712 23:58:59.868212 754374 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:58:59.876311 754374 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.876359 754374 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000786c00 11 D0712 23:58:59.876378 754374 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:58:59.878910 754374 usertrap_amd64.go:212] [ 1030: 1031] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.878947 754374 usertrap_amd64.go:122] [ 1030: 1031] Allocate a new trap: 0xc000786c00 12 D0712 23:58:59.878963 754374 usertrap_amd64.go:225] [ 1030: 1031] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:58:59.879060 754374 usertrap_amd64.go:212] [ 1030: 1031] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.879088 754374 usertrap_amd64.go:122] [ 1030: 1031] Allocate a new trap: 0xc000786c00 13 D0712 23:58:59.879102 754374 usertrap_amd64.go:225] [ 1030: 1031] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:58:59.879169 754374 task_signals.go:470] [ 1030: 1030] Notified of signal 23 D0712 23:58:59.879263 754374 task_signals.go:220] [ 1030: 1030] Signal 23: delivering to handler D0712 23:58:59.887408 754374 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.887476 754374 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000786c00 14 D0712 23:58:59.887500 754374 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:58:59.887750 754374 task_exit.go:204] [ 1030: 1030] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.887816 754374 task_exit.go:204] [ 1030: 1030] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.887858 754374 task_signals.go:204] [ 1030: 1033] Signal 1030, PID: 1033, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.887843 754374 task_signals.go:204] [ 1030: 1032] Signal 1030, PID: 1032, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.887878 754374 task_exit.go:204] [ 1030: 1033] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.887939 754374 task_exit.go:204] [ 1030: 1033] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.887967 754374 task_exit.go:204] [ 1030: 1033] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.888007 754374 task_signals.go:204] [ 1030: 1034] Signal 1030, PID: 1034, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.888098 754374 task_exit.go:204] [ 1030: 1034] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.888108 754374 task_exit.go:204] [ 1030: 1034] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.888113 754374 task_exit.go:204] [ 1030: 1034] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.888133 754374 task_exit.go:204] [ 1030: 1032] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.888133 754374 task_signals.go:204] [ 1030: 1031] Signal 1030, PID: 1031, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.888163 754374 task_exit.go:204] [ 1030: 1032] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.888170 754374 task_exit.go:204] [ 1030: 1032] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.888190 754374 task_exit.go:204] [ 1030: 1031] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.889452 754374 task_exit.go:204] [ 1030: 1031] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.889482 754374 task_exit.go:204] [ 1030: 1031] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.889505 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.889541 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:58:59.889549 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.889655 754374 task_exit.go:204] [ 1030: 1030] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.890299 754374 task_stop.go:118] [ 5: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.891622 754374 syscalls.go:262] [ 1035: 1035] Allocating stack with size of 8388608 bytes D0712 23:58:59.891739 754374 task_stop.go:138] [ 5: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.893178 754374 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.893219 754374 usertrap_amd64.go:106] [ 1035: 1035] Map a usertrap vma at 67000 D0712 23:58:59.893306 754374 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc000ee10e0 1 D0712 23:58:59.893337 754374 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 23:58:59.894205 754374 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.894255 754374 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc000ee10e0 2 D0712 23:58:59.894275 754374 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 23:58:59.895075 754374 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.895095 754374 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc000ee10e0 3 D0712 23:58:59.895110 754374 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 23:58:59.901381 754374 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.901419 754374 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc000ee10e0 4 D0712 23:58:59.901437 754374 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 23:58:59.902587 754374 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.902610 754374 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc000ee10e0 5 D0712 23:58:59.902626 754374 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 23:58:59.902699 754374 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.902705 754374 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc000ee10e0 6 D0712 23:58:59.902712 754374 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 23:58:59.903102 754374 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.903128 754374 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc000ee10e0 7 D0712 23:58:59.903142 754374 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 23:58:59.903486 754374 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.903518 754374 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc000ee10e0 8 D0712 23:58:59.903534 754374 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 23:58:59.903693 754374 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.903727 754374 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc000ee10e0 9 D0712 23:58:59.903742 754374 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 23:58:59.903975 754374 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.904004 754374 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc000ee10e0 10 D0712 23:58:59.904018 754374 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 23:58:59.904897 754374 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.904929 754374 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc000ee10e0 11 D0712 23:58:59.904960 754374 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 23:58:59.905040 754374 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.905063 754374 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc000ee10e0 12 D0712 23:58:59.905073 754374 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 23:58:59.905097 754374 task_signals.go:470] [ 1035: 1035] Notified of signal 23 D0712 23:58:59.905210 754374 task_signals.go:220] [ 1035: 1035] Signal 23: delivering to handler D0712 23:58:59.912174 754374 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.912224 754374 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc000ee10e0 13 D0712 23:58:59.912240 754374 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 23:58:59.915409 754374 task_signals.go:470] [ 1035: 1035] Notified of signal 23 D0712 23:58:59.915523 754374 task_signals.go:220] [ 1035: 1035] Signal 23: delivering to handler D0712 23:58:59.925273 754374 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.925343 754374 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc000ee10e0 14 D0712 23:58:59.925365 754374 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 23:58:59.925453 754374 task_exit.go:204] [ 1035: 1035] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.925482 754374 task_exit.go:204] [ 1035: 1035] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.925529 754374 task_signals.go:204] [ 1035: 1036] Signal 1035, PID: 1036, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.925560 754374 task_exit.go:204] [ 1035: 1036] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.925570 754374 task_exit.go:204] [ 1035: 1036] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.925576 754374 task_exit.go:204] [ 1035: 1036] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.925600 754374 task_signals.go:204] [ 1035: 1039] Signal 1035, PID: 1039, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.925619 754374 task_signals.go:204] [ 1035: 1037] Signal 1035, PID: 1037, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.925648 754374 task_exit.go:204] [ 1035: 1039] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.925736 754374 task_signals.go:204] [ 1035: 1038] Signal 1035, PID: 1038, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.925780 754374 task_exit.go:204] [ 1035: 1039] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.925806 754374 task_exit.go:204] [ 1035: 1039] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.925829 754374 task_exit.go:204] [ 1035: 1037] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.925941 754374 task_exit.go:204] [ 1035: 1037] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.925956 754374 task_exit.go:204] [ 1035: 1037] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.925978 754374 task_exit.go:204] [ 1035: 1038] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.927263 754374 task_exit.go:204] [ 1035: 1038] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.927313 754374 task_exit.go:204] [ 1035: 1038] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.927334 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.927369 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.927434 754374 task_exit.go:204] [ 1035: 1035] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.928296 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.929990 754374 syscalls.go:262] [ 1040: 1040] Allocating stack with size of 8388608 bytes D0712 23:58:59.930134 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.932665 754374 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.932708 754374 usertrap_amd64.go:106] [ 1040: 1040] Map a usertrap vma at 6a000 D0712 23:58:59.932838 754374 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc000e612c0 1 D0712 23:58:59.932872 754374 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 23:58:59.933459 754374 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.933517 754374 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc000e612c0 2 D0712 23:58:59.933531 754374 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 23:58:59.934895 754374 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.934953 754374 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc000e612c0 3 D0712 23:58:59.934978 754374 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 23:58:59.942698 754374 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.942751 754374 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc000e612c0 4 D0712 23:58:59.942767 754374 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 23:58:59.943801 754374 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.943829 754374 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc000e612c0 5 D0712 23:58:59.943838 754374 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 23:58:59.943917 754374 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.943930 754374 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc000e612c0 6 D0712 23:58:59.943936 754374 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 23:58:59.944397 754374 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.944416 754374 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc000e612c0 7 D0712 23:58:59.944423 754374 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 23:58:59.944599 754374 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.944637 754374 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc000e612c0 8 D0712 23:58:59.944651 754374 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 23:58:59.944826 754374 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.944855 754374 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc000e612c0 9 D0712 23:58:59.944865 754374 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 23:58:59.944879 754374 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.944886 754374 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc000e612c0 10 D0712 23:58:59.944894 754374 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 23:58:59.953071 754374 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.953132 754374 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc000e612c0 11 D0712 23:58:59.953184 754374 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 23:58:59.955868 754374 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.955906 754374 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc000e612c0 12 D0712 23:58:59.955920 754374 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 23:58:59.956029 754374 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.956065 754374 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc000e612c0 13 D0712 23:58:59.956077 754374 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 23:58:59.956133 754374 task_signals.go:470] [ 1040: 1040] Notified of signal 23 D0712 23:58:59.956234 754374 task_signals.go:220] [ 1040: 1040] Signal 23: delivering to handler I0712 23:58:59.964680 754374 compat.go:120] Unsupported syscall sys_440(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_440 for more information. D0712 23:58:59.964778 754374 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46ae44:sysno 231 D0712 23:58:59.964793 754374 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc000e612c0 14 D0712 23:58:59.964808 754374 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 23:58:59.964892 754374 task_exit.go:204] [ 1040: 1040] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.964931 754374 task_exit.go:204] [ 1040: 1040] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.965015 754374 task_signals.go:204] [ 1040: 1043] Signal 1040, PID: 1043, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.965034 754374 task_exit.go:204] [ 1040: 1043] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.965045 754374 task_exit.go:204] [ 1040: 1043] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.965051 754374 task_exit.go:204] [ 1040: 1043] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.965037 754374 task_signals.go:204] [ 1040: 1041] Signal 1040, PID: 1041, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.965013 754374 task_signals.go:204] [ 1040: 1042] Signal 1040, PID: 1042, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.965066 754374 task_exit.go:204] [ 1040: 1041] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.965125 754374 task_exit.go:204] [ 1040: 1041] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.965163 754374 task_exit.go:204] [ 1040: 1041] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.965189 754374 task_signals.go:204] [ 1040: 1044] Signal 1040, PID: 1044, TID: 0, fault addr: 0x9: terminating thread group D0712 23:58:59.965204 754374 task_exit.go:204] [ 1040: 1044] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.965214 754374 task_exit.go:204] [ 1040: 1044] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.965220 754374 task_exit.go:204] [ 1040: 1044] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.965236 754374 task_exit.go:204] [ 1040: 1042] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:58:59.966567 754374 task_exit.go:204] [ 1040: 1042] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:58:59.966611 754374 task_exit.go:204] [ 1040: 1042] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.966641 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:58:59.966670 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:58:59.966676 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:58:59.966776 754374 task_exit.go:204] [ 1040: 1040] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:58:59.967391 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.969047 754374 syscalls.go:262] [ 1045: 1045] Allocating stack with size of 8388608 bytes D0712 23:58:59.969145 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:58:59.970712 754374 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b70f:sysno 204 D0712 23:58:59.970792 754374 usertrap_amd64.go:106] [ 1045: 1045] Map a usertrap vma at 6a000 D0712 23:58:59.970948 754374 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000786e70 1 D0712 23:58:59.971029 754374 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 23:58:59.971409 754374 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46ae93:sysno 257 D0712 23:58:59.971436 754374 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000786e70 2 D0712 23:58:59.971446 754374 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 23:58:59.972416 754374 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b41d:sysno 9 D0712 23:58:59.972459 754374 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000786e70 3 D0712 23:58:59.972472 754374 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 23:58:59.978681 754374 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b1d3:sysno 14 D0712 23:58:59.978725 754374 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000786e70 4 D0712 23:58:59.978740 754374 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 23:58:59.980163 754374 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46afa0:sysno 186 D0712 23:58:59.980192 754374 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000786e70 5 D0712 23:58:59.980203 754374 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 23:58:59.980261 754374 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b214:sysno 13 D0712 23:58:59.980279 754374 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000786e70 6 D0712 23:58:59.980287 754374 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 23:58:59.980489 754374 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b5eb:sysno 56 D0712 23:58:59.980512 754374 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000786e70 7 D0712 23:58:59.980520 754374 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 23:58:59.980772 754374 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b60c:sysno 186 D0712 23:58:59.980838 754374 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc000786e70 8 D0712 23:58:59.980855 754374 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 23:58:59.981159 754374 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b57c:sysno 202 D0712 23:58:59.981204 754374 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000786e70 9 D0712 23:58:59.981220 754374 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 23:58:59.981248 754374 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46af76:sysno 35 D0712 23:58:59.981257 754374 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc000786e70 10 D0712 23:58:59.981279 754374 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 23:58:59.990740 754374 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46af29:sysno 293 D0712 23:58:59.990798 754374 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000786e70 11 D0712 23:58:59.990813 754374 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 23:58:59.993235 754374 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b020:sysno 39 D0712 23:58:59.993281 754374 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc000786e70 12 D0712 23:58:59.993296 754374 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 23:58:59.993528 754374 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b04f:sysno 234 D0712 23:58:59.993576 754374 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc000786e70 13 D0712 23:58:59.993592 754374 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 23:58:59.993654 754374 task_signals.go:470] [ 1045: 1045] Notified of signal 23 D0712 23:58:59.993748 754374 task_signals.go:220] [ 1045: 1045] Signal 23: delivering to handler I0712 23:59:00.002038 754374 compat.go:120] Unsupported syscall sys_448(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_448 for more information. D0712 23:59:00.002162 754374 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.002182 754374 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000786e70 14 D0712 23:59:00.002195 754374 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 23:59:00.002312 754374 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.002341 754374 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.002373 754374 task_signals.go:204] [ 1045: 1046] Signal 1045, PID: 1046, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.002410 754374 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.002422 754374 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.002430 754374 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.002413 754374 task_signals.go:204] [ 1045: 1048] Signal 1045, PID: 1048, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.002457 754374 task_signals.go:204] [ 1045: 1049] Signal 1045, PID: 1049, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.002455 754374 task_signals.go:204] [ 1045: 1047] Signal 1045, PID: 1047, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.002474 754374 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.002519 754374 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.002541 754374 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.002561 754374 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.002583 754374 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.002592 754374 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.002605 754374 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.003792 754374 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.003828 754374 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.003843 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.003875 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:59:00.003887 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.003981 754374 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.004182 754374 task_signals.go:470] [ 5: 5] Notified of signal 23 D0712 23:59:00.004238 754374 task_signals.go:220] [ 5: 5] Signal 23: delivering to handler D0712 23:59:00.005167 754374 task_stop.go:118] [ 5: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.007088 754374 syscalls.go:262] [ 1050: 1050] Allocating stack with size of 8388608 bytes D0712 23:59:00.007347 754374 task_stop.go:138] [ 5: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.008910 754374 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.009027 754374 usertrap_amd64.go:106] [ 1050: 1050] Map a usertrap vma at 61000 D0712 23:59:00.009346 754374 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0009b9f20 1 D0712 23:59:00.009405 754374 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 23:59:00.009942 754374 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.009998 754374 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0009b9f20 2 D0712 23:59:00.010022 754374 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 23:59:00.011008 754374 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.011043 754374 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0009b9f20 3 D0712 23:59:00.011060 754374 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 23:59:00.018695 754374 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.018759 754374 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0009b9f20 4 D0712 23:59:00.018778 754374 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 23:59:00.020212 754374 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.020249 754374 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0009b9f20 5 D0712 23:59:00.020263 754374 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 23:59:00.020350 754374 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.020373 754374 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0009b9f20 6 D0712 23:59:00.020382 754374 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 23:59:00.021043 754374 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.021083 754374 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0009b9f20 7 D0712 23:59:00.021109 754374 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 23:59:00.021319 754374 usertrap_amd64.go:212] [ 1050: 1051] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.021348 754374 usertrap_amd64.go:122] [ 1050: 1051] Allocate a new trap: 0xc0009b9f20 8 D0712 23:59:00.021360 754374 usertrap_amd64.go:225] [ 1050: 1051] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 23:59:00.021645 754374 usertrap_amd64.go:212] [ 1050: 1051] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.021706 754374 usertrap_amd64.go:122] [ 1050: 1051] Allocate a new trap: 0xc0009b9f20 9 D0712 23:59:00.021725 754374 usertrap_amd64.go:225] [ 1050: 1051] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 23:59:00.021762 754374 usertrap_amd64.go:212] [ 1050: 1052] Found the pattern at ip 46b6e0:sysno 24 D0712 23:59:00.021823 754374 usertrap_amd64.go:122] [ 1050: 1052] Allocate a new trap: 0xc0009b9f20 10 D0712 23:59:00.021841 754374 usertrap_amd64.go:225] [ 1050: 1052] Apply the binary patch addr 46b6e0 trap addr 61320 ([184 24 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 23:59:00.021901 754374 usertrap_amd64.go:212] [ 1050: 1052] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.021909 754374 usertrap_amd64.go:122] [ 1050: 1052] Allocate a new trap: 0xc0009b9f20 11 D0712 23:59:00.021917 754374 usertrap_amd64.go:225] [ 1050: 1052] Apply the binary patch addr 46b57c trap addr 61370 ([184 202 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 23:59:00.022791 754374 usertrap_amd64.go:212] [ 1050: 1051] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.022837 754374 usertrap_amd64.go:122] [ 1050: 1051] Allocate a new trap: 0xc0009b9f20 12 D0712 23:59:00.022856 754374 usertrap_amd64.go:225] [ 1050: 1051] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 23:59:00.022919 754374 usertrap_amd64.go:212] [ 1050: 1051] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.022986 754374 usertrap_amd64.go:122] [ 1050: 1051] Allocate a new trap: 0xc0009b9f20 13 D0712 23:59:00.022999 754374 usertrap_amd64.go:225] [ 1050: 1051] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 23:59:00.023131 754374 task_signals.go:470] [ 1050: 1050] Notified of signal 23 D0712 23:59:00.023263 754374 task_signals.go:220] [ 1050: 1050] Signal 23: delivering to handler D0712 23:59:00.031262 754374 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.031296 754374 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0009b9f20 14 D0712 23:59:00.031310 754374 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46af29 trap addr 61460 ([184 37 1 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 23:59:00.034190 754374 task_signals.go:470] [ 1050: 1050] Notified of signal 23 D0712 23:59:00.034288 754374 task_signals.go:220] [ 1050: 1050] Signal 23: delivering to handler D0712 23:59:00.034400 754374 task_signals.go:470] [ 1050: 1050] Notified of signal 23 D0712 23:59:00.034448 754374 task_signals.go:220] [ 1050: 1050] Signal 23: delivering to handler I0712 23:59:00.043365 754374 compat.go:120] Unsupported syscall process_vm_readv(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_readv for more information. D0712 23:59:00.043469 754374 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.043484 754374 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0009b9f20 15 D0712 23:59:00.043497 754374 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0712 23:59:00.043570 754374 task_exit.go:204] [ 1050: 1050] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.043609 754374 task_exit.go:204] [ 1050: 1050] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.043648 754374 task_signals.go:204] [ 1050: 1053] Signal 1050, PID: 1053, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.043664 754374 task_exit.go:204] [ 1050: 1053] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.043674 754374 task_exit.go:204] [ 1050: 1053] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.043701 754374 task_exit.go:204] [ 1050: 1053] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.043643 754374 task_signals.go:204] [ 1050: 1052] Signal 1050, PID: 1052, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.043727 754374 task_signals.go:204] [ 1050: 1054] Signal 1050, PID: 1054, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.043746 754374 task_exit.go:204] [ 1050: 1052] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.043755 754374 task_signals.go:204] [ 1050: 1051] Signal 1050, PID: 1051, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.043782 754374 task_exit.go:204] [ 1050: 1052] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.043790 754374 task_exit.go:204] [ 1050: 1052] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.043807 754374 task_exit.go:204] [ 1050: 1054] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.043837 754374 task_exit.go:204] [ 1050: 1054] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.043843 754374 task_exit.go:204] [ 1050: 1054] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.043852 754374 task_exit.go:204] [ 1050: 1051] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.044971 754374 task_exit.go:204] [ 1050: 1051] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.045045 754374 task_exit.go:204] [ 1050: 1051] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.045061 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.045104 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.045250 754374 task_exit.go:204] [ 1050: 1050] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.046148 754374 task_stop.go:118] [ 5: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.047736 754374 syscalls.go:262] [ 1055: 1055] Allocating stack with size of 8388608 bytes D0712 23:59:00.047893 754374 task_stop.go:138] [ 5: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.049804 754374 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.049861 754374 usertrap_amd64.go:106] [ 1055: 1055] Map a usertrap vma at 63000 D0712 23:59:00.049966 754374 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc00251c360 1 D0712 23:59:00.050007 754374 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:59:00.050681 754374 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.050739 754374 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc00251c360 2 D0712 23:59:00.050758 754374 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:59:00.051669 754374 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.051716 754374 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc00251c360 3 D0712 23:59:00.051733 754374 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:59:00.060192 754374 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.060245 754374 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc00251c360 4 D0712 23:59:00.060260 754374 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:59:00.061512 754374 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.061551 754374 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc00251c360 5 D0712 23:59:00.061563 754374 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:59:00.061684 754374 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.061708 754374 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc00251c360 6 D0712 23:59:00.061717 754374 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:59:00.062382 754374 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.062421 754374 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc00251c360 7 D0712 23:59:00.062437 754374 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:59:00.062674 754374 usertrap_amd64.go:212] [ 1055: 1056] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.062724 754374 usertrap_amd64.go:122] [ 1055: 1056] Allocate a new trap: 0xc00251c360 8 D0712 23:59:00.062743 754374 usertrap_amd64.go:225] [ 1055: 1056] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:59:00.062974 754374 usertrap_amd64.go:212] [ 1055: 1056] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.063000 754374 usertrap_amd64.go:122] [ 1055: 1056] Allocate a new trap: 0xc00251c360 9 D0712 23:59:00.063009 754374 usertrap_amd64.go:225] [ 1055: 1056] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:59:00.063022 754374 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.063028 754374 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc00251c360 10 D0712 23:59:00.063035 754374 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:59:00.063482 754374 usertrap_amd64.go:212] [ 1055: 1056] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.063494 754374 usertrap_amd64.go:122] [ 1055: 1056] Allocate a new trap: 0xc00251c360 11 D0712 23:59:00.063501 754374 usertrap_amd64.go:225] [ 1055: 1056] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:59:00.063515 754374 usertrap_amd64.go:212] [ 1055: 1056] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.063519 754374 usertrap_amd64.go:122] [ 1055: 1056] Allocate a new trap: 0xc00251c360 12 D0712 23:59:00.063524 754374 usertrap_amd64.go:225] [ 1055: 1056] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:59:00.063537 754374 task_signals.go:470] [ 1055: 1055] Notified of signal 23 D0712 23:59:00.063600 754374 task_signals.go:220] [ 1055: 1055] Signal 23: delivering to handler D0712 23:59:00.071628 754374 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.071677 754374 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc00251c360 13 D0712 23:59:00.071690 754374 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:59:00.075422 754374 task_signals.go:470] [ 1055: 1055] Notified of signal 23 D0712 23:59:00.075490 754374 task_signals.go:220] [ 1055: 1055] Signal 23: delivering to handler I0712 23:59:00.083503 754374 compat.go:120] Unsupported syscall process_vm_writev(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_writev for more information. D0712 23:59:00.083618 754374 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.083634 754374 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc00251c360 14 D0712 23:59:00.083647 754374 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:59:00.083765 754374 task_exit.go:204] [ 1055: 1055] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.083804 754374 task_exit.go:204] [ 1055: 1055] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.083826 754374 task_signals.go:204] [ 1055: 1056] Signal 1055, PID: 1056, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.083838 754374 task_signals.go:204] [ 1055: 1058] Signal 1055, PID: 1058, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.083855 754374 task_exit.go:204] [ 1055: 1056] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.083870 754374 task_signals.go:204] [ 1055: 1059] Signal 1055, PID: 1059, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.083910 754374 task_signals.go:204] [ 1055: 1057] Signal 1055, PID: 1057, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.083973 754374 task_exit.go:204] [ 1055: 1056] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.083986 754374 task_exit.go:204] [ 1055: 1056] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.084014 754374 task_exit.go:204] [ 1055: 1058] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.084030 754374 task_exit.go:204] [ 1055: 1058] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.084048 754374 task_exit.go:204] [ 1055: 1058] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.084067 754374 task_exit.go:204] [ 1055: 1059] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.084088 754374 task_exit.go:204] [ 1055: 1059] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.084093 754374 task_exit.go:204] [ 1055: 1059] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.084108 754374 task_exit.go:204] [ 1055: 1057] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.085452 754374 task_exit.go:204] [ 1055: 1057] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.085481 754374 task_exit.go:204] [ 1055: 1057] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.085498 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.085548 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.085645 754374 task_exit.go:204] [ 1055: 1055] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.086279 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.087738 754374 syscalls.go:262] [ 1060: 1060] Allocating stack with size of 8388608 bytes D0712 23:59:00.087820 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.089506 754374 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.089566 754374 usertrap_amd64.go:106] [ 1060: 1060] Map a usertrap vma at 63000 D0712 23:59:00.089663 754374 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc000787410 1 D0712 23:59:00.089689 754374 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:59:00.090240 754374 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.090270 754374 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc000787410 2 D0712 23:59:00.090279 754374 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:59:00.091034 754374 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.091074 754374 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc000787410 3 D0712 23:59:00.091089 754374 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:59:00.098192 754374 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.098249 754374 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc000787410 4 D0712 23:59:00.098264 754374 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:59:00.099489 754374 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.099536 754374 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc000787410 5 D0712 23:59:00.099550 754374 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:59:00.099718 754374 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.099743 754374 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc000787410 6 D0712 23:59:00.099757 754374 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:59:00.100181 754374 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.100203 754374 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc000787410 7 D0712 23:59:00.100210 754374 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:59:00.100388 754374 usertrap_amd64.go:212] [ 1060: 1061] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.100413 754374 usertrap_amd64.go:122] [ 1060: 1061] Allocate a new trap: 0xc000787410 8 D0712 23:59:00.100425 754374 usertrap_amd64.go:225] [ 1060: 1061] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:59:00.100619 754374 usertrap_amd64.go:212] [ 1060: 1061] Found the pattern at ip 46b6e0:sysno 24 D0712 23:59:00.100646 754374 usertrap_amd64.go:122] [ 1060: 1061] Allocate a new trap: 0xc000787410 9 D0712 23:59:00.100658 754374 usertrap_amd64.go:225] [ 1060: 1061] Apply the binary patch addr 46b6e0 trap addr 632d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:59:00.100851 754374 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.100884 754374 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc000787410 10 D0712 23:59:00.100895 754374 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:59:00.101029 754374 usertrap_amd64.go:212] [ 1060: 1061] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.101041 754374 usertrap_amd64.go:122] [ 1060: 1061] Allocate a new trap: 0xc000787410 11 D0712 23:59:00.101051 754374 usertrap_amd64.go:225] [ 1060: 1061] Apply the binary patch addr 46af76 trap addr 63370 ([184 35 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:59:00.109043 754374 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.109098 754374 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc000787410 12 D0712 23:59:00.109115 754374 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:59:00.111663 754374 usertrap_amd64.go:212] [ 1060: 1061] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.111703 754374 usertrap_amd64.go:122] [ 1060: 1061] Allocate a new trap: 0xc000787410 13 D0712 23:59:00.111719 754374 usertrap_amd64.go:225] [ 1060: 1061] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:59:00.111775 754374 usertrap_amd64.go:212] [ 1060: 1061] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.111793 754374 usertrap_amd64.go:122] [ 1060: 1061] Allocate a new trap: 0xc000787410 14 D0712 23:59:00.111805 754374 usertrap_amd64.go:225] [ 1060: 1061] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:59:00.111868 754374 task_signals.go:470] [ 1060: 1060] Notified of signal 23 D0712 23:59:00.111961 754374 task_signals.go:220] [ 1060: 1060] Signal 23: delivering to handler D0712 23:59:00.120064 754374 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.120098 754374 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc000787410 15 D0712 23:59:00.120112 754374 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0712 23:59:00.120181 754374 task_exit.go:204] [ 1060: 1060] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.120217 754374 task_exit.go:204] [ 1060: 1060] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.120243 754374 task_signals.go:204] [ 1060: 1063] Signal 1060, PID: 1063, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.120256 754374 task_exit.go:204] [ 1060: 1063] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.120242 754374 task_signals.go:204] [ 1060: 1062] Signal 1060, PID: 1062, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.120286 754374 task_exit.go:204] [ 1060: 1063] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.120314 754374 task_exit.go:204] [ 1060: 1063] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.120364 754374 task_signals.go:204] [ 1060: 1064] Signal 1060, PID: 1064, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.120392 754374 task_exit.go:204] [ 1060: 1062] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.120405 754374 task_exit.go:204] [ 1060: 1062] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.120375 754374 task_signals.go:204] [ 1060: 1061] Signal 1060, PID: 1061, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.120410 754374 task_exit.go:204] [ 1060: 1062] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.120436 754374 task_exit.go:204] [ 1060: 1064] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.120457 754374 task_exit.go:204] [ 1060: 1064] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.120464 754374 task_exit.go:204] [ 1060: 1064] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.120481 754374 task_exit.go:204] [ 1060: 1061] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.121661 754374 task_exit.go:204] [ 1060: 1061] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.121698 754374 task_exit.go:204] [ 1060: 1061] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.121713 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.121745 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:59:00.121752 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.121927 754374 task_exit.go:204] [ 1060: 1060] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.122495 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.123987 754374 syscalls.go:262] [ 1065: 1065] Allocating stack with size of 8388608 bytes D0712 23:59:00.124084 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.125436 754374 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.125478 754374 usertrap_amd64.go:106] [ 1065: 1065] Map a usertrap vma at 69000 D0712 23:59:00.125606 754374 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc000c0c630 1 D0712 23:59:00.125639 754374 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 23:59:00.125991 754374 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.126009 754374 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc000c0c630 2 D0712 23:59:00.126016 754374 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 23:59:00.126708 754374 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.126741 754374 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc000c0c630 3 D0712 23:59:00.126757 754374 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 23:59:00.133206 754374 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.133236 754374 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc000c0c630 4 D0712 23:59:00.133249 754374 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 23:59:00.134402 754374 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.134418 754374 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc000c0c630 5 D0712 23:59:00.134427 754374 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 23:59:00.134458 754374 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.134479 754374 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc000c0c630 6 D0712 23:59:00.134487 754374 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 23:59:00.134956 754374 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.134974 754374 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc000c0c630 7 D0712 23:59:00.134980 754374 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 23:59:00.135129 754374 usertrap_amd64.go:212] [ 1065: 1066] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.135196 754374 usertrap_amd64.go:122] [ 1065: 1066] Allocate a new trap: 0xc000c0c630 8 D0712 23:59:00.135242 754374 usertrap_amd64.go:225] [ 1065: 1066] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 23:59:00.135467 754374 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.135490 754374 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc000c0c630 9 D0712 23:59:00.135499 754374 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 23:59:00.135536 754374 usertrap_amd64.go:212] [ 1065: 1066] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.135567 754374 usertrap_amd64.go:122] [ 1065: 1066] Allocate a new trap: 0xc000c0c630 10 D0712 23:59:00.135582 754374 usertrap_amd64.go:225] [ 1065: 1066] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 23:59:00.136024 754374 usertrap_amd64.go:212] [ 1065: 1066] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.136043 754374 usertrap_amd64.go:122] [ 1065: 1066] Allocate a new trap: 0xc000c0c630 11 D0712 23:59:00.136054 754374 usertrap_amd64.go:225] [ 1065: 1066] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 23:59:00.136105 754374 usertrap_amd64.go:212] [ 1065: 1066] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.136120 754374 usertrap_amd64.go:122] [ 1065: 1066] Allocate a new trap: 0xc000c0c630 12 D0712 23:59:00.136129 754374 usertrap_amd64.go:225] [ 1065: 1066] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 23:59:00.136154 754374 task_signals.go:470] [ 1065: 1065] Notified of signal 23 D0712 23:59:00.136226 754374 task_signals.go:220] [ 1065: 1065] Signal 23: delivering to handler D0712 23:59:00.142649 754374 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.142690 754374 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc000c0c630 13 D0712 23:59:00.142705 754374 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 23:59:00.146387 754374 task_signals.go:470] [ 1065: 1065] Notified of signal 23 D0712 23:59:00.146459 754374 task_signals.go:220] [ 1065: 1065] Signal 23: delivering to handler D0712 23:59:00.152757 754374 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.152801 754374 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc000c0c630 14 D0712 23:59:00.152818 754374 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 23:59:00.152859 754374 task_exit.go:204] [ 1065: 1065] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.152930 754374 task_signals.go:204] [ 1065: 1069] Signal 1065, PID: 1069, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.153006 754374 task_exit.go:204] [ 1065: 1065] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.153045 754374 task_signals.go:204] [ 1065: 1066] Signal 1065, PID: 1066, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.153045 754374 task_signals.go:204] [ 1065: 1068] Signal 1065, PID: 1068, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.153061 754374 task_exit.go:204] [ 1065: 1069] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.153055 754374 task_signals.go:204] [ 1065: 1067] Signal 1065, PID: 1067, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.153086 754374 task_exit.go:204] [ 1065: 1069] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.153115 754374 task_exit.go:204] [ 1065: 1069] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.153143 754374 task_exit.go:204] [ 1065: 1066] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.153165 754374 task_exit.go:204] [ 1065: 1066] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.153170 754374 task_exit.go:204] [ 1065: 1066] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.153178 754374 task_exit.go:204] [ 1065: 1068] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.153191 754374 task_exit.go:204] [ 1065: 1068] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.153196 754374 task_exit.go:204] [ 1065: 1068] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.153211 754374 task_exit.go:204] [ 1065: 1067] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.154372 754374 task_exit.go:204] [ 1065: 1067] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.154419 754374 task_exit.go:204] [ 1065: 1067] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.154433 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.154494 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:59:00.154522 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.154611 754374 task_exit.go:204] [ 1065: 1065] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.154827 754374 task_signals.go:470] [ 5: 5] Notified of signal 23 D0712 23:59:00.154999 754374 task_signals.go:220] [ 5: 5] Signal 23: delivering to handler D0712 23:59:00.155525 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.157153 754374 syscalls.go:262] [ 1070: 1070] Allocating stack with size of 8388608 bytes D0712 23:59:00.157314 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.158720 754374 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.158759 754374 usertrap_amd64.go:106] [ 1070: 1070] Map a usertrap vma at 67000 D0712 23:59:00.158857 754374 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc0019f4c90 1 D0712 23:59:00.158882 754374 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 23:59:00.159167 754374 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.159175 754374 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc0019f4c90 2 D0712 23:59:00.159182 754374 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 23:59:00.159756 754374 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.159787 754374 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc0019f4c90 3 D0712 23:59:00.159799 754374 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 23:59:00.167071 754374 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.167101 754374 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc0019f4c90 4 D0712 23:59:00.167116 754374 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 23:59:00.168439 754374 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.168543 754374 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc0019f4c90 5 D0712 23:59:00.168576 754374 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 23:59:00.168661 754374 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.168672 754374 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc0019f4c90 6 D0712 23:59:00.168684 754374 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 23:59:00.169298 754374 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.169333 754374 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc0019f4c90 7 D0712 23:59:00.169348 754374 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 23:59:00.169683 754374 usertrap_amd64.go:212] [ 1070: 1071] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.169721 754374 usertrap_amd64.go:122] [ 1070: 1071] Allocate a new trap: 0xc0019f4c90 8 D0712 23:59:00.169736 754374 usertrap_amd64.go:225] [ 1070: 1071] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 23:59:00.170122 754374 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.170158 754374 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc0019f4c90 9 D0712 23:59:00.170171 754374 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 23:59:00.170182 754374 usertrap_amd64.go:212] [ 1070: 1071] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.170187 754374 usertrap_amd64.go:122] [ 1070: 1071] Allocate a new trap: 0xc0019f4c90 10 D0712 23:59:00.170192 754374 usertrap_amd64.go:225] [ 1070: 1071] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 23:59:00.171144 754374 usertrap_amd64.go:212] [ 1070: 1071] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.171182 754374 usertrap_amd64.go:122] [ 1070: 1071] Allocate a new trap: 0xc0019f4c90 11 D0712 23:59:00.171194 754374 usertrap_amd64.go:225] [ 1070: 1071] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 23:59:00.171277 754374 usertrap_amd64.go:212] [ 1070: 1071] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.171295 754374 usertrap_amd64.go:122] [ 1070: 1071] Allocate a new trap: 0xc0019f4c90 12 D0712 23:59:00.171325 754374 usertrap_amd64.go:225] [ 1070: 1071] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 23:59:00.171415 754374 task_signals.go:470] [ 1070: 1070] Notified of signal 23 D0712 23:59:00.171535 754374 task_signals.go:220] [ 1070: 1070] Signal 23: delivering to handler D0712 23:59:00.178685 754374 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.178742 754374 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc0019f4c90 13 D0712 23:59:00.178759 754374 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 23:59:00.181791 754374 task_signals.go:470] [ 1070: 1070] Notified of signal 23 D0712 23:59:00.181870 754374 task_signals.go:220] [ 1070: 1070] Signal 23: delivering to handler D0712 23:59:00.191279 754374 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.191330 754374 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc0019f4c90 14 D0712 23:59:00.191344 754374 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 23:59:00.191408 754374 task_exit.go:204] [ 1070: 1070] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.191431 754374 task_exit.go:204] [ 1070: 1070] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.191463 754374 task_signals.go:204] [ 1070: 1071] Signal 1070, PID: 1071, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.191505 754374 task_signals.go:204] [ 1070: 1072] Signal 1070, PID: 1072, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.191502 754374 task_signals.go:204] [ 1070: 1074] Signal 1070, PID: 1074, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.191512 754374 task_exit.go:204] [ 1070: 1071] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.191544 754374 task_exit.go:204] [ 1070: 1071] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.191559 754374 task_exit.go:204] [ 1070: 1071] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.191469 754374 task_signals.go:204] [ 1070: 1073] Signal 1070, PID: 1073, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.191595 754374 task_exit.go:204] [ 1070: 1073] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.191603 754374 task_exit.go:204] [ 1070: 1073] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.191614 754374 task_exit.go:204] [ 1070: 1073] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.191624 754374 task_exit.go:204] [ 1070: 1072] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.191637 754374 task_exit.go:204] [ 1070: 1072] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.191641 754374 task_exit.go:204] [ 1070: 1072] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.191650 754374 task_exit.go:204] [ 1070: 1074] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.192706 754374 task_exit.go:204] [ 1070: 1074] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.192733 754374 task_exit.go:204] [ 1070: 1074] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.192747 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.192779 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:59:00.192788 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.192971 754374 task_exit.go:204] [ 1070: 1070] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.193632 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.195050 754374 syscalls.go:262] [ 1075: 1075] Allocating stack with size of 8388608 bytes D0712 23:59:00.195169 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.196866 754374 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.196918 754374 usertrap_amd64.go:106] [ 1075: 1075] Map a usertrap vma at 62000 D0712 23:59:00.197065 754374 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc000e61920 1 D0712 23:59:00.197123 754374 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:59:00.197635 754374 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.197669 754374 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc000e61920 2 D0712 23:59:00.197686 754374 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:59:00.198338 754374 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.198364 754374 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc000e61920 3 D0712 23:59:00.198376 754374 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:59:00.205265 754374 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.205326 754374 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc000e61920 4 D0712 23:59:00.205349 754374 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:59:00.206684 754374 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.206719 754374 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc000e61920 5 D0712 23:59:00.206732 754374 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:59:00.206799 754374 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.206816 754374 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc000e61920 6 D0712 23:59:00.206826 754374 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:59:00.207244 754374 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.207262 754374 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc000e61920 7 D0712 23:59:00.207273 754374 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:59:00.207490 754374 usertrap_amd64.go:212] [ 1075: 1076] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.207539 754374 usertrap_amd64.go:122] [ 1075: 1076] Allocate a new trap: 0xc000e61920 8 D0712 23:59:00.207560 754374 usertrap_amd64.go:225] [ 1075: 1076] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:59:00.207723 754374 usertrap_amd64.go:212] [ 1075: 1076] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.207751 754374 usertrap_amd64.go:122] [ 1075: 1076] Allocate a new trap: 0xc000e61920 9 D0712 23:59:00.207764 754374 usertrap_amd64.go:225] [ 1075: 1076] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:59:00.207782 754374 usertrap_amd64.go:212] [ 1075: 1077] Found the pattern at ip 46b6e0:sysno 24 D0712 23:59:00.207797 754374 usertrap_amd64.go:122] [ 1075: 1077] Allocate a new trap: 0xc000e61920 10 D0712 23:59:00.207807 754374 usertrap_amd64.go:225] [ 1075: 1077] Apply the binary patch addr 46b6e0 trap addr 62320 ([184 24 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:59:00.207945 754374 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.207986 754374 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc000e61920 11 D0712 23:59:00.208003 754374 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b57c trap addr 62370 ([184 202 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:59:00.216363 754374 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.216411 754374 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc000e61920 12 D0712 23:59:00.216426 754374 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46af29 trap addr 623c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:59:00.219001 754374 usertrap_amd64.go:212] [ 1075: 1076] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.219181 754374 usertrap_amd64.go:122] [ 1075: 1076] Allocate a new trap: 0xc000e61920 13 D0712 23:59:00.219206 754374 usertrap_amd64.go:225] [ 1075: 1076] Apply the binary patch addr 46b020 trap addr 62410 ([184 39 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:59:00.219382 754374 usertrap_amd64.go:212] [ 1075: 1076] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.219403 754374 usertrap_amd64.go:122] [ 1075: 1076] Allocate a new trap: 0xc000e61920 14 D0712 23:59:00.219412 754374 usertrap_amd64.go:225] [ 1075: 1076] Apply the binary patch addr 46b04f trap addr 62460 ([184 234 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:59:00.219488 754374 task_signals.go:470] [ 1075: 1075] Notified of signal 23 D0712 23:59:00.219594 754374 task_signals.go:220] [ 1075: 1075] Signal 23: delivering to handler D0712 23:59:00.228178 754374 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.228220 754374 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc000e61920 15 D0712 23:59:00.228235 754374 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0712 23:59:00.228298 754374 task_exit.go:204] [ 1075: 1075] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.228322 754374 task_exit.go:204] [ 1075: 1075] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.228325 754374 task_signals.go:204] [ 1075: 1077] Signal 1075, PID: 1077, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.228345 754374 task_signals.go:204] [ 1075: 1078] Signal 1075, PID: 1078, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.228356 754374 task_exit.go:204] [ 1075: 1077] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.228387 754374 task_signals.go:204] [ 1075: 1076] Signal 1075, PID: 1076, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.228405 754374 task_signals.go:204] [ 1075: 1079] Signal 1075, PID: 1079, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.228415 754374 task_exit.go:204] [ 1075: 1077] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.228429 754374 task_exit.go:204] [ 1075: 1077] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.228446 754374 task_exit.go:204] [ 1075: 1078] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.228454 754374 task_exit.go:204] [ 1075: 1078] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.228457 754374 task_exit.go:204] [ 1075: 1078] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.228474 754374 task_exit.go:204] [ 1075: 1076] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.228507 754374 task_exit.go:204] [ 1075: 1076] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.228514 754374 task_exit.go:204] [ 1075: 1076] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.228527 754374 task_exit.go:204] [ 1075: 1079] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.229984 754374 task_exit.go:204] [ 1075: 1079] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.230007 754374 task_exit.go:204] [ 1075: 1079] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.230020 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.233057 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:59:00.233092 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.233316 754374 task_exit.go:204] [ 1075: 1075] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.233460 754374 task_signals.go:470] [ 5: 5] Notified of signal 23 D0712 23:59:00.233565 754374 task_signals.go:220] [ 5: 5] Signal 23: delivering to handler D0712 23:59:00.233958 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.235313 754374 syscalls.go:262] [ 1080: 1080] Allocating stack with size of 8388608 bytes D0712 23:59:00.235425 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.236835 754374 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.236925 754374 usertrap_amd64.go:106] [ 1080: 1080] Map a usertrap vma at 64000 D0712 23:59:00.237099 754374 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc000e61aa0 1 D0712 23:59:00.237147 754374 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 23:59:00.237635 754374 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.237668 754374 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc000e61aa0 2 D0712 23:59:00.237681 754374 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 23:59:00.238950 754374 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.239007 754374 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc000e61aa0 3 D0712 23:59:00.239027 754374 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 23:59:00.246550 754374 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.246579 754374 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc000e61aa0 4 D0712 23:59:00.246590 754374 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 23:59:00.247882 754374 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.247909 754374 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc000e61aa0 5 D0712 23:59:00.247919 754374 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 23:59:00.247993 754374 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.247998 754374 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc000e61aa0 6 D0712 23:59:00.248004 754374 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 23:59:00.248321 754374 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.248386 754374 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc000e61aa0 7 D0712 23:59:00.248407 754374 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 23:59:00.248571 754374 usertrap_amd64.go:212] [ 1080: 1081] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.248598 754374 usertrap_amd64.go:122] [ 1080: 1081] Allocate a new trap: 0xc000e61aa0 8 D0712 23:59:00.248608 754374 usertrap_amd64.go:225] [ 1080: 1081] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 23:59:00.248786 754374 usertrap_amd64.go:212] [ 1080: 1081] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.248814 754374 usertrap_amd64.go:122] [ 1080: 1081] Allocate a new trap: 0xc000e61aa0 9 D0712 23:59:00.248824 754374 usertrap_amd64.go:225] [ 1080: 1081] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 23:59:00.248916 754374 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.249011 754374 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc000e61aa0 10 D0712 23:59:00.249030 754374 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 23:59:00.257815 754374 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.257846 754374 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc000e61aa0 11 D0712 23:59:00.257861 754374 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 23:59:00.260335 754374 usertrap_amd64.go:212] [ 1080: 1081] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.260407 754374 usertrap_amd64.go:122] [ 1080: 1081] Allocate a new trap: 0xc000e61aa0 12 D0712 23:59:00.260423 754374 usertrap_amd64.go:225] [ 1080: 1081] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 23:59:00.260510 754374 usertrap_amd64.go:212] [ 1080: 1081] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.260542 754374 usertrap_amd64.go:122] [ 1080: 1081] Allocate a new trap: 0xc000e61aa0 13 D0712 23:59:00.260555 754374 usertrap_amd64.go:225] [ 1080: 1081] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 23:59:00.260623 754374 task_signals.go:470] [ 1080: 1080] Notified of signal 23 D0712 23:59:00.260666 754374 task_signals.go:220] [ 1080: 1080] Signal 23: delivering to handler D0712 23:59:00.269391 754374 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.269435 754374 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc000e61aa0 14 D0712 23:59:00.269451 754374 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 23:59:00.269519 754374 task_exit.go:204] [ 1080: 1080] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.269566 754374 task_signals.go:204] [ 1080: 1082] Signal 1080, PID: 1082, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.269592 754374 task_signals.go:204] [ 1080: 1081] Signal 1080, PID: 1081, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.269598 754374 task_signals.go:204] [ 1080: 1083] Signal 1080, PID: 1083, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.269627 754374 task_signals.go:204] [ 1080: 1084] Signal 1080, PID: 1084, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.269643 754374 task_exit.go:204] [ 1080: 1080] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.269663 754374 task_exit.go:204] [ 1080: 1081] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.269686 754374 task_exit.go:204] [ 1080: 1081] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.269694 754374 task_exit.go:204] [ 1080: 1081] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.269708 754374 task_exit.go:204] [ 1080: 1083] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.269724 754374 task_exit.go:204] [ 1080: 1083] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.269728 754374 task_exit.go:204] [ 1080: 1083] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.269739 754374 task_exit.go:204] [ 1080: 1084] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.269770 754374 task_exit.go:204] [ 1080: 1084] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.269775 754374 task_exit.go:204] [ 1080: 1084] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.269783 754374 task_exit.go:204] [ 1080: 1082] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.271533 754374 task_exit.go:204] [ 1080: 1082] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.271560 754374 task_exit.go:204] [ 1080: 1082] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.271581 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.271621 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:59:00.271632 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.271824 754374 task_exit.go:204] [ 1080: 1080] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.272345 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.274058 754374 syscalls.go:262] [ 1085: 1085] Allocating stack with size of 8388608 bytes D0712 23:59:00.274212 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.275561 754374 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.275606 754374 usertrap_amd64.go:106] [ 1085: 1085] Map a usertrap vma at 65000 D0712 23:59:00.275783 754374 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc0019f4f90 1 D0712 23:59:00.275812 754374 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 23:59:00.276390 754374 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.276416 754374 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc0019f4f90 2 D0712 23:59:00.276427 754374 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 23:59:00.278085 754374 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.278145 754374 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc0019f4f90 3 D0712 23:59:00.278160 754374 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 23:59:00.285336 754374 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.285371 754374 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc0019f4f90 4 D0712 23:59:00.285386 754374 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 23:59:00.286649 754374 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.286683 754374 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc0019f4f90 5 D0712 23:59:00.286694 754374 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 23:59:00.286752 754374 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.286769 754374 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc0019f4f90 6 D0712 23:59:00.286776 754374 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 23:59:00.286991 754374 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.287068 754374 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc0019f4f90 7 D0712 23:59:00.287083 754374 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 23:59:00.287275 754374 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.287290 754374 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc0019f4f90 8 D0712 23:59:00.287300 754374 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 23:59:00.287640 754374 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.287718 754374 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc0019f4f90 9 D0712 23:59:00.287784 754374 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 23:59:00.287856 754374 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.287867 754374 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc0019f4f90 10 D0712 23:59:00.287876 754374 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 23:59:00.296414 754374 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.296448 754374 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc0019f4f90 11 D0712 23:59:00.296463 754374 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 23:59:00.299501 754374 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.299540 754374 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc0019f4f90 12 D0712 23:59:00.299553 754374 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 23:59:00.299659 754374 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.299676 754374 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc0019f4f90 13 D0712 23:59:00.299687 754374 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 23:59:00.299797 754374 task_signals.go:470] [ 1085: 1085] Notified of signal 23 D0712 23:59:00.299920 754374 task_signals.go:220] [ 1085: 1085] Signal 23: delivering to handler I0712 23:59:00.309378 754374 compat.go:120] Unsupported syscall quotactl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/quotactl for more information. D0712 23:59:00.309486 754374 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.309517 754374 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc0019f4f90 14 D0712 23:59:00.309540 754374 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 23:59:00.309672 754374 task_exit.go:204] [ 1085: 1085] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.309705 754374 task_exit.go:204] [ 1085: 1085] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.309734 754374 task_signals.go:204] [ 1085: 1090] Signal 1085, PID: 1090, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.309745 754374 task_exit.go:204] [ 1085: 1090] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.309737 754374 task_signals.go:204] [ 1085: 1088] Signal 1085, PID: 1088, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.309755 754374 task_exit.go:204] [ 1085: 1090] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.309776 754374 task_exit.go:204] [ 1085: 1090] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.309808 754374 task_signals.go:204] [ 1085: 1087] Signal 1085, PID: 1087, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.309809 754374 task_signals.go:204] [ 1085: 1089] Signal 1085, PID: 1089, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.309823 754374 task_exit.go:204] [ 1085: 1088] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.309839 754374 task_signals.go:204] [ 1085: 1086] Signal 1085, PID: 1086, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.309865 754374 task_exit.go:204] [ 1085: 1086] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.309881 754374 task_exit.go:204] [ 1085: 1086] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.309895 754374 task_exit.go:204] [ 1085: 1086] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.309910 754374 task_exit.go:204] [ 1085: 1088] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.309916 754374 task_exit.go:204] [ 1085: 1088] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.309944 754374 task_exit.go:204] [ 1085: 1089] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.309955 754374 task_exit.go:204] [ 1085: 1089] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.309963 754374 task_exit.go:204] [ 1085: 1089] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.309975 754374 task_exit.go:204] [ 1085: 1087] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.311437 754374 task_exit.go:204] [ 1085: 1087] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.311496 754374 task_exit.go:204] [ 1085: 1087] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.311511 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.311551 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:59:00.311562 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.311657 754374 task_exit.go:204] [ 1085: 1085] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.312231 754374 task_stop.go:118] [ 5: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.313627 754374 syscalls.go:262] [ 1091: 1091] Allocating stack with size of 8388608 bytes D0712 23:59:00.313754 754374 task_stop.go:138] [ 5: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.315098 754374 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.315153 754374 usertrap_amd64.go:106] [ 1091: 1091] Map a usertrap vma at 67000 D0712 23:59:00.315384 754374 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0019f5110 1 D0712 23:59:00.315420 754374 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 23:59:00.315999 754374 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.316030 754374 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0019f5110 2 D0712 23:59:00.316050 754374 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 23:59:00.317012 754374 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.317042 754374 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0019f5110 3 D0712 23:59:00.317059 754374 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 23:59:00.324237 754374 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.324277 754374 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0019f5110 4 D0712 23:59:00.324292 754374 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 23:59:00.325855 754374 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.325886 754374 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0019f5110 5 D0712 23:59:00.325898 754374 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 23:59:00.325972 754374 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.325978 754374 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0019f5110 6 D0712 23:59:00.325985 754374 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 23:59:00.326411 754374 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.326430 754374 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0019f5110 7 D0712 23:59:00.326436 754374 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 23:59:00.326607 754374 usertrap_amd64.go:212] [ 1091: 1092] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.326627 754374 usertrap_amd64.go:122] [ 1091: 1092] Allocate a new trap: 0xc0019f5110 8 D0712 23:59:00.326637 754374 usertrap_amd64.go:225] [ 1091: 1092] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 23:59:00.326856 754374 usertrap_amd64.go:212] [ 1091: 1092] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.326923 754374 usertrap_amd64.go:122] [ 1091: 1092] Allocate a new trap: 0xc0019f5110 9 D0712 23:59:00.326977 754374 usertrap_amd64.go:225] [ 1091: 1092] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 23:59:00.327009 754374 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.327025 754374 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0019f5110 10 D0712 23:59:00.327034 754374 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 23:59:00.335583 754374 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.335613 754374 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0019f5110 11 D0712 23:59:00.335622 754374 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 23:59:00.338555 754374 usertrap_amd64.go:212] [ 1091: 1092] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.338587 754374 usertrap_amd64.go:122] [ 1091: 1092] Allocate a new trap: 0xc0019f5110 12 D0712 23:59:00.338601 754374 usertrap_amd64.go:225] [ 1091: 1092] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 23:59:00.338686 754374 usertrap_amd64.go:212] [ 1091: 1092] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.338716 754374 usertrap_amd64.go:122] [ 1091: 1092] Allocate a new trap: 0xc0019f5110 13 D0712 23:59:00.338731 754374 usertrap_amd64.go:225] [ 1091: 1092] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 23:59:00.338867 754374 task_signals.go:470] [ 1091: 1091] Notified of signal 23 D0712 23:59:00.338975 754374 task_signals.go:220] [ 1091: 1091] Signal 23: delivering to handler I0712 23:59:00.348137 754374 compat.go:120] Unsupported syscall sys_443(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_443 for more information. D0712 23:59:00.348277 754374 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.348295 754374 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0019f5110 14 D0712 23:59:00.348306 754374 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 23:59:00.348447 754374 task_exit.go:204] [ 1091: 1091] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.348476 754374 task_exit.go:204] [ 1091: 1091] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.348502 754374 task_signals.go:204] [ 1091: 1093] Signal 1091, PID: 1093, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.348539 754374 task_signals.go:204] [ 1091: 1095] Signal 1091, PID: 1095, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.348537 754374 task_signals.go:204] [ 1091: 1094] Signal 1091, PID: 1094, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.348592 754374 task_exit.go:204] [ 1091: 1093] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.348635 754374 task_exit.go:204] [ 1091: 1093] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.348647 754374 task_exit.go:204] [ 1091: 1093] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.348508 754374 task_signals.go:204] [ 1091: 1092] Signal 1091, PID: 1092, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.348669 754374 task_exit.go:204] [ 1091: 1095] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.348686 754374 task_exit.go:204] [ 1091: 1094] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.348698 754374 task_exit.go:204] [ 1091: 1094] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.348705 754374 task_exit.go:204] [ 1091: 1094] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.348716 754374 task_exit.go:204] [ 1091: 1092] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.348797 754374 task_exit.go:204] [ 1091: 1095] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.348816 754374 task_exit.go:204] [ 1091: 1095] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.350339 754374 task_exit.go:204] [ 1091: 1092] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.350376 754374 task_exit.go:204] [ 1091: 1092] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.350394 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.350444 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.350585 754374 task_exit.go:204] [ 1091: 1091] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.351464 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.352827 754374 syscalls.go:262] [ 1096: 1096] Allocating stack with size of 8388608 bytes D0712 23:59:00.353021 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.355436 754374 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.355539 754374 usertrap_amd64.go:106] [ 1096: 1096] Map a usertrap vma at 65000 D0712 23:59:00.355643 754374 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000c0cd50 1 D0712 23:59:00.355681 754374 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 23:59:00.356390 754374 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.356449 754374 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000c0cd50 2 D0712 23:59:00.356482 754374 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 23:59:00.357629 754374 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.357694 754374 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000c0cd50 3 D0712 23:59:00.357717 754374 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 23:59:00.364110 754374 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.364149 754374 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000c0cd50 4 D0712 23:59:00.364168 754374 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 23:59:00.365330 754374 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.365386 754374 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000c0cd50 5 D0712 23:59:00.365417 754374 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 23:59:00.365491 754374 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.365499 754374 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000c0cd50 6 D0712 23:59:00.365508 754374 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 23:59:00.366147 754374 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.366190 754374 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000c0cd50 7 D0712 23:59:00.366203 754374 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 23:59:00.367005 754374 usertrap_amd64.go:212] [ 1096: 1097] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.367050 754374 usertrap_amd64.go:122] [ 1096: 1097] Allocate a new trap: 0xc000c0cd50 8 D0712 23:59:00.367070 754374 usertrap_amd64.go:225] [ 1096: 1097] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 23:59:00.367651 754374 usertrap_amd64.go:212] [ 1096: 1097] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.367687 754374 usertrap_amd64.go:122] [ 1096: 1097] Allocate a new trap: 0xc000c0cd50 9 D0712 23:59:00.367705 754374 usertrap_amd64.go:225] [ 1096: 1097] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 23:59:00.367797 754374 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.367948 754374 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000c0cd50 10 D0712 23:59:00.367968 754374 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 23:59:00.380652 754374 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.380712 754374 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000c0cd50 11 D0712 23:59:00.380741 754374 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 23:59:00.391446 754374 usertrap_amd64.go:212] [ 1096: 1097] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.391486 754374 usertrap_amd64.go:122] [ 1096: 1097] Allocate a new trap: 0xc000c0cd50 12 D0712 23:59:00.391505 754374 usertrap_amd64.go:225] [ 1096: 1097] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 23:59:00.391547 754374 usertrap_amd64.go:212] [ 1096: 1097] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.391559 754374 usertrap_amd64.go:122] [ 1096: 1097] Allocate a new trap: 0xc000c0cd50 13 D0712 23:59:00.391568 754374 usertrap_amd64.go:225] [ 1096: 1097] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 23:59:00.391668 754374 task_signals.go:470] [ 1096: 1096] Notified of signal 23 D0712 23:59:00.391773 754374 task_signals.go:220] [ 1096: 1096] Signal 23: delivering to handler D0712 23:59:00.392236 754374 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.392269 754374 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000c0cd50 14 D0712 23:59:00.392285 754374 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 23:59:00.392326 754374 task_exit.go:204] [ 1096: 1096] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.392372 754374 task_signals.go:204] [ 1096: 1099] Signal 1096, PID: 1099, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.392390 754374 task_exit.go:204] [ 1096: 1096] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.392465 754374 task_signals.go:204] [ 1096: 1097] Signal 1096, PID: 1097, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.392487 754374 task_signals.go:204] [ 1096: 1100] Signal 1096, PID: 1100, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.392495 754374 task_signals.go:204] [ 1096: 1098] Signal 1096, PID: 1098, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.392505 754374 task_exit.go:204] [ 1096: 1097] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.392546 754374 task_exit.go:204] [ 1096: 1098] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.392559 754374 task_exit.go:204] [ 1096: 1098] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.392567 754374 task_exit.go:204] [ 1096: 1098] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.392582 754374 task_exit.go:204] [ 1096: 1099] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.392603 754374 task_exit.go:204] [ 1096: 1099] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.392611 754374 task_exit.go:204] [ 1096: 1099] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.392633 754374 task_exit.go:204] [ 1096: 1097] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.392644 754374 task_exit.go:204] [ 1096: 1097] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.392654 754374 task_exit.go:204] [ 1096: 1100] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.394129 754374 task_exit.go:204] [ 1096: 1100] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.394168 754374 task_exit.go:204] [ 1096: 1100] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.394187 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.394221 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:59:00.394231 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.394341 754374 task_exit.go:204] [ 1096: 1096] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.394924 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.396143 754374 syscalls.go:262] [ 1101: 1101] Allocating stack with size of 8388608 bytes D0712 23:59:00.396269 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.397585 754374 usertrap_amd64.go:212] [ 1101: 1101] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.397670 754374 usertrap_amd64.go:106] [ 1101: 1101] Map a usertrap vma at 60000 D0712 23:59:00.397831 754374 usertrap_amd64.go:122] [ 1101: 1101] Allocate a new trap: 0xc000786150 1 D0712 23:59:00.397911 754374 usertrap_amd64.go:225] [ 1101: 1101] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:59:00.398480 754374 usertrap_amd64.go:212] [ 1101: 1101] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.398548 754374 usertrap_amd64.go:122] [ 1101: 1101] Allocate a new trap: 0xc000786150 2 D0712 23:59:00.398596 754374 usertrap_amd64.go:225] [ 1101: 1101] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:59:00.399319 754374 usertrap_amd64.go:212] [ 1101: 1101] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.399346 754374 usertrap_amd64.go:122] [ 1101: 1101] Allocate a new trap: 0xc000786150 3 D0712 23:59:00.399356 754374 usertrap_amd64.go:225] [ 1101: 1101] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:59:00.405936 754374 usertrap_amd64.go:212] [ 1101: 1101] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.405966 754374 usertrap_amd64.go:122] [ 1101: 1101] Allocate a new trap: 0xc000786150 4 D0712 23:59:00.405979 754374 usertrap_amd64.go:225] [ 1101: 1101] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:59:00.407031 754374 usertrap_amd64.go:212] [ 1101: 1101] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.407055 754374 usertrap_amd64.go:122] [ 1101: 1101] Allocate a new trap: 0xc000786150 5 D0712 23:59:00.407065 754374 usertrap_amd64.go:225] [ 1101: 1101] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:59:00.407121 754374 usertrap_amd64.go:212] [ 1101: 1101] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.407129 754374 usertrap_amd64.go:122] [ 1101: 1101] Allocate a new trap: 0xc000786150 6 D0712 23:59:00.407137 754374 usertrap_amd64.go:225] [ 1101: 1101] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:59:00.407626 754374 usertrap_amd64.go:212] [ 1101: 1101] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.407651 754374 usertrap_amd64.go:122] [ 1101: 1101] Allocate a new trap: 0xc000786150 7 D0712 23:59:00.407661 754374 usertrap_amd64.go:225] [ 1101: 1101] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:59:00.407863 754374 usertrap_amd64.go:212] [ 1101: 1102] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.407890 754374 usertrap_amd64.go:122] [ 1101: 1102] Allocate a new trap: 0xc000786150 8 D0712 23:59:00.407900 754374 usertrap_amd64.go:225] [ 1101: 1102] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:59:00.408149 754374 usertrap_amd64.go:212] [ 1101: 1101] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.408210 754374 usertrap_amd64.go:122] [ 1101: 1101] Allocate a new trap: 0xc000786150 9 D0712 23:59:00.408226 754374 usertrap_amd64.go:225] [ 1101: 1101] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:59:00.408270 754374 usertrap_amd64.go:212] [ 1101: 1102] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.408286 754374 usertrap_amd64.go:122] [ 1101: 1102] Allocate a new trap: 0xc000786150 10 D0712 23:59:00.408345 754374 usertrap_amd64.go:225] [ 1101: 1102] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:59:00.415105 754374 usertrap_amd64.go:212] [ 1101: 1101] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.415135 754374 usertrap_amd64.go:122] [ 1101: 1101] Allocate a new trap: 0xc000786150 11 D0712 23:59:00.415147 754374 usertrap_amd64.go:225] [ 1101: 1101] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:59:00.418753 754374 usertrap_amd64.go:212] [ 1101: 1102] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.418787 754374 usertrap_amd64.go:122] [ 1101: 1102] Allocate a new trap: 0xc000786150 12 D0712 23:59:00.418801 754374 usertrap_amd64.go:225] [ 1101: 1102] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:59:00.419909 754374 usertrap_amd64.go:212] [ 1101: 1102] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.419957 754374 usertrap_amd64.go:122] [ 1101: 1102] Allocate a new trap: 0xc000786150 13 D0712 23:59:00.419975 754374 usertrap_amd64.go:225] [ 1101: 1102] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:59:00.420057 754374 task_signals.go:470] [ 1101: 1101] Notified of signal 23 D0712 23:59:00.420149 754374 task_signals.go:220] [ 1101: 1101] Signal 23: delivering to handler D0712 23:59:00.427939 754374 usertrap_amd64.go:212] [ 1101: 1101] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.428111 754374 usertrap_amd64.go:122] [ 1101: 1101] Allocate a new trap: 0xc000786150 14 D0712 23:59:00.428151 754374 usertrap_amd64.go:225] [ 1101: 1101] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 23:59:00.428293 754374 task_exit.go:204] [ 1101: 1101] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.428382 754374 task_exit.go:204] [ 1101: 1101] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.428390 754374 task_signals.go:204] [ 1101: 1104] Signal 1101, PID: 1104, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.428466 754374 task_signals.go:204] [ 1101: 1103] Signal 1101, PID: 1103, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.428465 754374 task_exit.go:204] [ 1101: 1104] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.428511 754374 task_exit.go:204] [ 1101: 1104] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.428525 754374 task_exit.go:204] [ 1101: 1104] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.428547 754374 task_signals.go:204] [ 1101: 1102] Signal 1101, PID: 1102, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.428559 754374 task_exit.go:204] [ 1101: 1103] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.428615 754374 task_exit.go:204] [ 1101: 1103] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.428640 754374 task_exit.go:204] [ 1101: 1103] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.428679 754374 task_exit.go:204] [ 1101: 1102] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.428693 754374 task_exit.go:204] [ 1101: 1102] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.428701 754374 task_exit.go:204] [ 1101: 1102] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.428723 754374 task_signals.go:204] [ 1101: 1105] Signal 1101, PID: 1105, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.428756 754374 task_exit.go:204] [ 1101: 1105] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.430402 754374 task_exit.go:204] [ 1101: 1105] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.430446 754374 task_exit.go:204] [ 1101: 1105] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.430467 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.430533 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:59:00.430566 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.430733 754374 task_exit.go:204] [ 1101: 1101] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.432009 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.433944 754374 syscalls.go:262] [ 1106: 1106] Allocating stack with size of 8388608 bytes D0712 23:59:00.434136 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.439511 754374 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.439570 754374 usertrap_amd64.go:106] [ 1106: 1106] Map a usertrap vma at 65000 D0712 23:59:00.439861 754374 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc000ee0150 1 D0712 23:59:00.439933 754374 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 23:59:00.441411 754374 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.441474 754374 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc000ee0150 2 D0712 23:59:00.441495 754374 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 23:59:00.443122 754374 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.443165 754374 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc000ee0150 3 D0712 23:59:00.443184 754374 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 23:59:00.451383 754374 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.451420 754374 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc000ee0150 4 D0712 23:59:00.451436 754374 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 23:59:00.452630 754374 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.452664 754374 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc000ee0150 5 D0712 23:59:00.452678 754374 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 23:59:00.452719 754374 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.452725 754374 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc000ee0150 6 D0712 23:59:00.452733 754374 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 23:59:00.453024 754374 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.453046 754374 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc000ee0150 7 D0712 23:59:00.453056 754374 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 23:59:00.453416 754374 usertrap_amd64.go:212] [ 1106: 1107] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.453474 754374 usertrap_amd64.go:122] [ 1106: 1107] Allocate a new trap: 0xc000ee0150 8 D0712 23:59:00.453491 754374 usertrap_amd64.go:225] [ 1106: 1107] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 23:59:00.453812 754374 usertrap_amd64.go:212] [ 1106: 1107] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.453880 754374 usertrap_amd64.go:122] [ 1106: 1107] Allocate a new trap: 0xc000ee0150 9 D0712 23:59:00.453902 754374 usertrap_amd64.go:225] [ 1106: 1107] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 23:59:00.453964 754374 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.453996 754374 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc000ee0150 10 D0712 23:59:00.454009 754374 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 23:59:00.462494 754374 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.462629 754374 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc000ee0150 11 D0712 23:59:00.462661 754374 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 23:59:00.464391 754374 usertrap_amd64.go:212] [ 1106: 1107] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.464419 754374 usertrap_amd64.go:122] [ 1106: 1107] Allocate a new trap: 0xc000ee0150 12 D0712 23:59:00.464446 754374 usertrap_amd64.go:225] [ 1106: 1107] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 23:59:00.464519 754374 usertrap_amd64.go:212] [ 1106: 1107] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.464536 754374 usertrap_amd64.go:122] [ 1106: 1107] Allocate a new trap: 0xc000ee0150 13 D0712 23:59:00.464548 754374 usertrap_amd64.go:225] [ 1106: 1107] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 23:59:00.464581 754374 task_signals.go:470] [ 1106: 1106] Notified of signal 23 D0712 23:59:00.465641 754374 task_signals.go:220] [ 1106: 1106] Signal 23: delivering to handler D0712 23:59:00.477948 754374 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.478003 754374 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc000ee0150 14 D0712 23:59:00.478021 754374 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 23:59:00.478027 754374 task_signals.go:470] [ 1106: 1106] Notified of signal 23 D0712 23:59:00.478187 754374 task_signals.go:220] [ 1106: 1106] Signal 23: delivering to handler D0712 23:59:00.478287 754374 task_exit.go:204] [ 1106: 1106] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.478316 754374 task_exit.go:204] [ 1106: 1106] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.478344 754374 task_signals.go:204] [ 1106: 1107] Signal 1106, PID: 1107, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.478373 754374 task_exit.go:204] [ 1106: 1107] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.478384 754374 task_exit.go:204] [ 1106: 1107] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.478412 754374 task_exit.go:204] [ 1106: 1107] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.478437 754374 task_signals.go:204] [ 1106: 1108] Signal 1106, PID: 1108, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.478551 754374 task_signals.go:204] [ 1106: 1110] Signal 1106, PID: 1110, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.478596 754374 task_exit.go:204] [ 1106: 1108] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.478498 754374 task_signals.go:204] [ 1106: 1109] Signal 1106, PID: 1109, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.478619 754374 task_exit.go:204] [ 1106: 1108] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.478665 754374 task_exit.go:204] [ 1106: 1108] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.478732 754374 task_exit.go:204] [ 1106: 1110] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.478795 754374 task_exit.go:204] [ 1106: 1110] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.478804 754374 task_exit.go:204] [ 1106: 1110] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.478824 754374 task_exit.go:204] [ 1106: 1109] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.480042 754374 task_exit.go:204] [ 1106: 1109] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.480071 754374 task_exit.go:204] [ 1106: 1109] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.480085 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.480148 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.480259 754374 task_exit.go:204] [ 1106: 1106] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.481512 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.483523 754374 syscalls.go:262] [ 1111: 1111] Allocating stack with size of 8388608 bytes D0712 23:59:00.483733 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.484839 754374 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.484895 754374 usertrap_amd64.go:106] [ 1111: 1111] Map a usertrap vma at 6a000 D0712 23:59:00.485073 754374 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc000ee03c0 1 D0712 23:59:00.485118 754374 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 23:59:00.485468 754374 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.485564 754374 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc000ee03c0 2 D0712 23:59:00.485620 754374 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 23:59:00.486328 754374 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.486382 754374 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc000ee03c0 3 D0712 23:59:00.486395 754374 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 23:59:00.493342 754374 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.493383 754374 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc000ee03c0 4 D0712 23:59:00.493397 754374 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 23:59:00.494521 754374 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.494561 754374 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc000ee03c0 5 D0712 23:59:00.494577 754374 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 23:59:00.494690 754374 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.494700 754374 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc000ee03c0 6 D0712 23:59:00.494711 754374 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 23:59:00.495414 754374 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.495483 754374 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc000ee03c0 7 D0712 23:59:00.495505 754374 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 23:59:00.495797 754374 usertrap_amd64.go:212] [ 1111: 1112] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.495838 754374 usertrap_amd64.go:122] [ 1111: 1112] Allocate a new trap: 0xc000ee03c0 8 D0712 23:59:00.495856 754374 usertrap_amd64.go:225] [ 1111: 1112] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 23:59:00.496031 754374 usertrap_amd64.go:212] [ 1111: 1112] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.496073 754374 usertrap_amd64.go:122] [ 1111: 1112] Allocate a new trap: 0xc000ee03c0 9 D0712 23:59:00.496092 754374 usertrap_amd64.go:225] [ 1111: 1112] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 23:59:00.496315 754374 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.496348 754374 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc000ee03c0 10 D0712 23:59:00.496379 754374 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 23:59:00.496529 754374 usertrap_amd64.go:212] [ 1111: 1114] Found the pattern at ip 46b6e0:sysno 24 D0712 23:59:00.496565 754374 usertrap_amd64.go:122] [ 1111: 1114] Allocate a new trap: 0xc000ee03c0 11 D0712 23:59:00.496579 754374 usertrap_amd64.go:225] [ 1111: 1114] Apply the binary patch addr 46b6e0 trap addr 6a370 ([184 24 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 23:59:00.504994 754374 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.505037 754374 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc000ee03c0 12 D0712 23:59:00.505052 754374 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46af29 trap addr 6a3c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 23:59:00.508913 754374 usertrap_amd64.go:212] [ 1111: 1112] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.509033 754374 usertrap_amd64.go:122] [ 1111: 1112] Allocate a new trap: 0xc000ee03c0 13 D0712 23:59:00.509055 754374 usertrap_amd64.go:225] [ 1111: 1112] Apply the binary patch addr 46b020 trap addr 6a410 ([184 39 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 23:59:00.509120 754374 usertrap_amd64.go:212] [ 1111: 1112] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.509159 754374 usertrap_amd64.go:122] [ 1111: 1112] Allocate a new trap: 0xc000ee03c0 14 D0712 23:59:00.509177 754374 usertrap_amd64.go:225] [ 1111: 1112] Apply the binary patch addr 46b04f trap addr 6a460 ([184 234 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 23:59:00.509240 754374 task_signals.go:470] [ 1111: 1111] Notified of signal 23 D0712 23:59:00.509331 754374 task_signals.go:220] [ 1111: 1111] Signal 23: delivering to handler D0712 23:59:00.517304 754374 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.517349 754374 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc000ee03c0 15 D0712 23:59:00.517371 754374 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0712 23:59:00.517494 754374 task_exit.go:204] [ 1111: 1111] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.517534 754374 task_exit.go:204] [ 1111: 1111] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.517571 754374 task_signals.go:204] [ 1111: 1114] Signal 1111, PID: 1114, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.517601 754374 task_exit.go:204] [ 1111: 1114] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.517556 754374 task_signals.go:204] [ 1111: 1113] Signal 1111, PID: 1113, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.517613 754374 task_exit.go:204] [ 1111: 1114] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.517640 754374 task_exit.go:204] [ 1111: 1114] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.517597 754374 task_signals.go:204] [ 1111: 1112] Signal 1111, PID: 1112, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.517717 754374 task_exit.go:204] [ 1111: 1112] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.517732 754374 task_signals.go:204] [ 1111: 1115] Signal 1111, PID: 1115, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.517753 754374 task_exit.go:204] [ 1111: 1115] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.517768 754374 task_exit.go:204] [ 1111: 1115] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.517775 754374 task_exit.go:204] [ 1111: 1115] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.517789 754374 task_exit.go:204] [ 1111: 1113] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.517876 754374 task_exit.go:204] [ 1111: 1112] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.517943 754374 task_exit.go:204] [ 1111: 1112] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.518978 754374 task_exit.go:204] [ 1111: 1113] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.519016 754374 task_exit.go:204] [ 1111: 1113] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.519032 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.519527 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:59:00.519563 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.519732 754374 task_exit.go:204] [ 1111: 1111] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.520554 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.522032 754374 syscalls.go:262] [ 1116: 1116] Allocating stack with size of 8388608 bytes D0712 23:59:00.522219 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.523639 754374 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.523682 754374 usertrap_amd64.go:106] [ 1116: 1116] Map a usertrap vma at 6a000 D0712 23:59:00.523867 754374 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000e60420 1 D0712 23:59:00.523907 754374 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 23:59:00.524431 754374 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.524468 754374 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000e60420 2 D0712 23:59:00.524488 754374 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 23:59:00.525562 754374 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.525601 754374 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000e60420 3 D0712 23:59:00.525684 754374 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 23:59:00.534045 754374 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.534098 754374 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000e60420 4 D0712 23:59:00.534115 754374 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 23:59:00.535357 754374 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.535394 754374 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000e60420 5 D0712 23:59:00.535409 754374 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 23:59:00.535472 754374 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.535497 754374 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000e60420 6 D0712 23:59:00.535508 754374 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 23:59:00.535806 754374 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.535828 754374 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000e60420 7 D0712 23:59:00.535841 754374 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 23:59:00.536150 754374 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.536184 754374 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc000e60420 8 D0712 23:59:00.536202 754374 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 23:59:00.536627 754374 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.536660 754374 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc000e60420 9 D0712 23:59:00.536671 754374 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 23:59:00.536702 754374 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.536711 754374 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000e60420 10 D0712 23:59:00.536721 754374 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 23:59:00.537554 754374 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.537585 754374 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc000e60420 11 D0712 23:59:00.537595 754374 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 23:59:00.537790 754374 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.537826 754374 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc000e60420 12 D0712 23:59:00.537843 754374 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 23:59:00.537894 754374 task_signals.go:470] [ 1116: 1116] Notified of signal 23 D0712 23:59:00.537984 754374 task_signals.go:220] [ 1116: 1116] Signal 23: delivering to handler D0712 23:59:00.545469 754374 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.545494 754374 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000e60420 13 D0712 23:59:00.545505 754374 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 23:59:00.548609 754374 task_signals.go:470] [ 1116: 1116] Notified of signal 23 D0712 23:59:00.548708 754374 task_signals.go:220] [ 1116: 1116] Signal 23: delivering to handler D0712 23:59:00.556146 754374 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.556205 754374 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000e60420 14 D0712 23:59:00.556235 754374 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 23:59:00.556313 754374 task_exit.go:204] [ 1116: 1116] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.556356 754374 task_signals.go:204] [ 1116: 1118] Signal 1116, PID: 1118, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.556374 754374 task_exit.go:204] [ 1116: 1116] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.556393 754374 task_signals.go:204] [ 1116: 1117] Signal 1116, PID: 1117, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.556405 754374 task_signals.go:204] [ 1116: 1119] Signal 1116, PID: 1119, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.556415 754374 task_exit.go:204] [ 1116: 1117] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.556426 754374 task_signals.go:204] [ 1116: 1120] Signal 1116, PID: 1120, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.556436 754374 task_exit.go:204] [ 1116: 1117] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.556440 754374 task_exit.go:204] [ 1116: 1117] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.556455 754374 task_exit.go:204] [ 1116: 1119] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.556461 754374 task_exit.go:204] [ 1116: 1119] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.556466 754374 task_exit.go:204] [ 1116: 1119] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.556475 754374 task_exit.go:204] [ 1116: 1118] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.556487 754374 task_exit.go:204] [ 1116: 1118] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.556492 754374 task_exit.go:204] [ 1116: 1118] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.556502 754374 task_exit.go:204] [ 1116: 1120] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.557657 754374 task_exit.go:204] [ 1116: 1120] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.557706 754374 task_exit.go:204] [ 1116: 1120] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.557733 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.557767 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:59:00.557779 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.557927 754374 task_exit.go:204] [ 1116: 1116] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.558763 754374 task_stop.go:118] [ 5: 5] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.560305 754374 syscalls.go:262] [ 1121: 1121] Allocating stack with size of 8388608 bytes D0712 23:59:00.560659 754374 task_stop.go:138] [ 5: 5] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.562400 754374 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.562429 754374 usertrap_amd64.go:106] [ 1121: 1121] Map a usertrap vma at 67000 D0712 23:59:00.562690 754374 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc000ee0870 1 D0712 23:59:00.562799 754374 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 23:59:00.563311 754374 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.563351 754374 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc000ee0870 2 D0712 23:59:00.563364 754374 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 23:59:00.564066 754374 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.564100 754374 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc000ee0870 3 D0712 23:59:00.564113 754374 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 23:59:00.571239 754374 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.571287 754374 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc000ee0870 4 D0712 23:59:00.571307 754374 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 23:59:00.572312 754374 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.572329 754374 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc000ee0870 5 D0712 23:59:00.572337 754374 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 23:59:00.572364 754374 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.572369 754374 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc000ee0870 6 D0712 23:59:00.572401 754374 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 23:59:00.573019 754374 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.573050 754374 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc000ee0870 7 D0712 23:59:00.573061 754374 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 23:59:00.573261 754374 usertrap_amd64.go:212] [ 1121: 1122] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.573287 754374 usertrap_amd64.go:122] [ 1121: 1122] Allocate a new trap: 0xc000ee0870 8 D0712 23:59:00.573306 754374 usertrap_amd64.go:225] [ 1121: 1122] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 23:59:00.573585 754374 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.573685 754374 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc000ee0870 9 D0712 23:59:00.573736 754374 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 23:59:00.573773 754374 usertrap_amd64.go:212] [ 1121: 1122] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.573783 754374 usertrap_amd64.go:122] [ 1121: 1122] Allocate a new trap: 0xc000ee0870 10 D0712 23:59:00.573793 754374 usertrap_amd64.go:225] [ 1121: 1122] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 23:59:00.574446 754374 usertrap_amd64.go:212] [ 1121: 1122] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.574473 754374 usertrap_amd64.go:122] [ 1121: 1122] Allocate a new trap: 0xc000ee0870 11 D0712 23:59:00.574485 754374 usertrap_amd64.go:225] [ 1121: 1122] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 23:59:00.574554 754374 usertrap_amd64.go:212] [ 1121: 1122] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.574570 754374 usertrap_amd64.go:122] [ 1121: 1122] Allocate a new trap: 0xc000ee0870 12 D0712 23:59:00.574578 754374 usertrap_amd64.go:225] [ 1121: 1122] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 23:59:00.574697 754374 task_signals.go:470] [ 1121: 1121] Notified of signal 23 D0712 23:59:00.574783 754374 task_signals.go:220] [ 1121: 1121] Signal 23: delivering to handler D0712 23:59:00.581651 754374 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.581695 754374 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc000ee0870 13 D0712 23:59:00.581706 754374 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 23:59:00.584903 754374 task_signals.go:470] [ 1121: 1121] Notified of signal 23 D0712 23:59:00.585019 754374 task_signals.go:220] [ 1121: 1121] Signal 23: delivering to handler D0712 23:59:00.592361 754374 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.592412 754374 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc000ee0870 14 D0712 23:59:00.592431 754374 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 23:59:00.592493 754374 task_exit.go:204] [ 1121: 1121] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.592519 754374 task_exit.go:204] [ 1121: 1121] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.592557 754374 task_signals.go:204] [ 1121: 1124] Signal 1121, PID: 1124, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.592579 754374 task_signals.go:204] [ 1121: 1125] Signal 1121, PID: 1125, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.592589 754374 task_exit.go:204] [ 1121: 1124] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.592549 754374 task_signals.go:204] [ 1121: 1123] Signal 1121, PID: 1123, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.592598 754374 task_exit.go:204] [ 1121: 1125] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.592608 754374 task_exit.go:204] [ 1121: 1123] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.592598 754374 task_signals.go:204] [ 1121: 1122] Signal 1121, PID: 1122, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.592621 754374 task_exit.go:204] [ 1121: 1123] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.592630 754374 task_exit.go:204] [ 1121: 1123] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.592654 754374 task_exit.go:204] [ 1121: 1124] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.592687 754374 task_exit.go:204] [ 1121: 1124] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.592703 754374 task_exit.go:204] [ 1121: 1125] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.592711 754374 task_exit.go:204] [ 1121: 1125] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.592725 754374 task_exit.go:204] [ 1121: 1122] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.593954 754374 task_exit.go:204] [ 1121: 1122] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.593988 754374 task_exit.go:204] [ 1121: 1122] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.594013 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.594076 754374 task_signals.go:179] [ 5: 5] Restarting syscall 247: interrupted by signal 17 D0712 23:59:00.594105 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.594185 754374 task_exit.go:204] [ 1121: 1121] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.594932 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.596569 754374 syscalls.go:262] [ 1126: 1126] Allocating stack with size of 8388608 bytes D0712 23:59:00.596800 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.598417 754374 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.598468 754374 usertrap_amd64.go:106] [ 1126: 1126] Map a usertrap vma at 64000 D0712 23:59:00.598611 754374 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000c0c690 1 D0712 23:59:00.598682 754374 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 23:59:00.599138 754374 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.599162 754374 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000c0c690 2 D0712 23:59:00.599175 754374 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 23:59:00.599929 754374 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.599954 754374 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000c0c690 3 D0712 23:59:00.599964 754374 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 23:59:00.606476 754374 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.606545 754374 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000c0c690 4 D0712 23:59:00.606562 754374 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 23:59:00.607837 754374 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.607865 754374 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000c0c690 5 D0712 23:59:00.607875 754374 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 23:59:00.607943 754374 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.607952 754374 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000c0c690 6 D0712 23:59:00.607958 754374 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 23:59:00.608353 754374 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.608370 754374 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000c0c690 7 D0712 23:59:00.608375 754374 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 23:59:00.608524 754374 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.608549 754374 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc000c0c690 8 D0712 23:59:00.608559 754374 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 23:59:00.608704 754374 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.608751 754374 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc000c0c690 9 D0712 23:59:00.608771 754374 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 23:59:00.608849 754374 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.608865 754374 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000c0c690 10 D0712 23:59:00.608874 754374 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 23:59:00.616400 754374 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.616426 754374 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000c0c690 11 D0712 23:59:00.616439 754374 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 23:59:00.619145 754374 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.619177 754374 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc000c0c690 12 D0712 23:59:00.619190 754374 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 23:59:00.619257 754374 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.619273 754374 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc000c0c690 13 D0712 23:59:00.619287 754374 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 23:59:00.619338 754374 task_signals.go:470] [ 1126: 1126] Notified of signal 23 D0712 23:59:00.619422 754374 task_signals.go:220] [ 1126: 1126] Signal 23: delivering to handler D0712 23:59:00.627470 754374 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.627519 754374 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000c0c690 14 D0712 23:59:00.627537 754374 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 23:59:00.627622 754374 task_exit.go:204] [ 1126: 1126] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.627668 754374 task_exit.go:204] [ 1126: 1126] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.627704 754374 task_signals.go:204] [ 1126: 1129] Signal 1126, PID: 1129, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.627715 754374 task_signals.go:204] [ 1126: 1128] Signal 1126, PID: 1128, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.627733 754374 task_exit.go:204] [ 1126: 1129] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.627796 754374 task_exit.go:204] [ 1126: 1129] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.627804 754374 task_exit.go:204] [ 1126: 1129] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.627824 754374 task_exit.go:204] [ 1126: 1128] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.627835 754374 task_exit.go:204] [ 1126: 1128] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.627843 754374 task_exit.go:204] [ 1126: 1128] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.627861 754374 task_signals.go:204] [ 1126: 1127] Signal 1126, PID: 1127, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.627885 754374 task_exit.go:204] [ 1126: 1127] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.627897 754374 task_exit.go:204] [ 1126: 1127] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.627916 754374 task_exit.go:204] [ 1126: 1127] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.627929 754374 task_signals.go:204] [ 1126: 1130] Signal 1126, PID: 1130, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.627942 754374 task_exit.go:204] [ 1126: 1130] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.629078 754374 task_exit.go:204] [ 1126: 1130] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.629106 754374 task_exit.go:204] [ 1126: 1130] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.629127 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.629158 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.629182 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.629356 754374 task_exit.go:204] [ 1126: 1126] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.630303 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.631909 754374 syscalls.go:262] [ 1131: 1131] Allocating stack with size of 8388608 bytes D0712 23:59:00.632180 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.633476 754374 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.633544 754374 usertrap_amd64.go:106] [ 1131: 1131] Map a usertrap vma at 67000 D0712 23:59:00.633712 754374 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc000c0c8a0 1 D0712 23:59:00.633804 754374 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 23:59:00.634078 754374 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.634097 754374 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc000c0c8a0 2 D0712 23:59:00.634105 754374 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 23:59:00.634603 754374 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.634634 754374 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc000c0c8a0 3 D0712 23:59:00.634645 754374 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 23:59:00.641293 754374 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.641345 754374 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc000c0c8a0 4 D0712 23:59:00.641359 754374 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 23:59:00.642490 754374 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.642519 754374 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc000c0c8a0 5 D0712 23:59:00.642529 754374 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 23:59:00.642599 754374 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.642621 754374 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc000c0c8a0 6 D0712 23:59:00.642646 754374 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 23:59:00.643248 754374 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.643274 754374 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc000c0c8a0 7 D0712 23:59:00.643286 754374 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 23:59:00.643477 754374 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.643524 754374 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc000c0c8a0 8 D0712 23:59:00.643546 754374 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 23:59:00.643925 754374 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.643969 754374 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc000c0c8a0 9 D0712 23:59:00.644023 754374 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 23:59:00.644058 754374 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.644067 754374 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc000c0c8a0 10 D0712 23:59:00.644079 754374 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 23:59:00.644772 754374 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.644796 754374 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc000c0c8a0 11 D0712 23:59:00.644809 754374 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 23:59:00.644884 754374 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.644908 754374 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc000c0c8a0 12 D0712 23:59:00.644916 754374 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 23:59:00.645020 754374 task_signals.go:470] [ 1131: 1131] Notified of signal 23 D0712 23:59:00.645120 754374 task_signals.go:220] [ 1131: 1131] Signal 23: delivering to handler D0712 23:59:00.655418 754374 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.655521 754374 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc000c0c8a0 13 D0712 23:59:00.655546 754374 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 23:59:00.655719 754374 task_signals.go:470] [ 1131: 1131] Notified of signal 23 D0712 23:59:00.655877 754374 task_signals.go:220] [ 1131: 1131] Signal 23: delivering to handler D0712 23:59:00.667010 754374 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.667066 754374 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc000c0c8a0 14 D0712 23:59:00.667083 754374 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 23:59:00.667177 754374 task_exit.go:204] [ 1131: 1131] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.667220 754374 task_exit.go:204] [ 1131: 1131] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.667258 754374 task_signals.go:204] [ 1131: 1134] Signal 1131, PID: 1134, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.667279 754374 task_exit.go:204] [ 1131: 1134] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.667285 754374 task_exit.go:204] [ 1131: 1134] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.667290 754374 task_exit.go:204] [ 1131: 1134] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.667307 754374 task_signals.go:204] [ 1131: 1132] Signal 1131, PID: 1132, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.667283 754374 task_signals.go:204] [ 1131: 1133] Signal 1131, PID: 1133, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.667316 754374 task_exit.go:204] [ 1131: 1132] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.667361 754374 task_exit.go:204] [ 1131: 1132] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.667386 754374 task_exit.go:204] [ 1131: 1132] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.667354 754374 task_signals.go:204] [ 1131: 1135] Signal 1131, PID: 1135, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.667436 754374 task_exit.go:204] [ 1131: 1133] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.667461 754374 task_exit.go:204] [ 1131: 1133] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.667413 754374 task_signals.go:204] [ 1131: 1136] Signal 1131, PID: 1136, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.667468 754374 task_exit.go:204] [ 1131: 1133] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.667519 754374 task_exit.go:204] [ 1131: 1135] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.667537 754374 task_exit.go:204] [ 1131: 1135] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.667542 754374 task_exit.go:204] [ 1131: 1135] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.667554 754374 task_exit.go:204] [ 1131: 1136] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.669379 754374 task_exit.go:204] [ 1131: 1136] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.669410 754374 task_exit.go:204] [ 1131: 1136] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.669433 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.669465 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.669489 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.669651 754374 task_exit.go:204] [ 1131: 1131] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.669858 754374 task_signals.go:470] [ 5: 15] Notified of signal 23 D0712 23:59:00.669987 754374 task_signals.go:220] [ 5: 15] Signal 23: delivering to handler D0712 23:59:00.670543 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.671956 754374 syscalls.go:262] [ 1137: 1137] Allocating stack with size of 8388608 bytes D0712 23:59:00.672190 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.673930 754374 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.673969 754374 usertrap_amd64.go:106] [ 1137: 1137] Map a usertrap vma at 63000 D0712 23:59:00.674056 754374 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc000c0ca20 1 D0712 23:59:00.674082 754374 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:59:00.674601 754374 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.674648 754374 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc000c0ca20 2 D0712 23:59:00.674663 754374 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:59:00.675311 754374 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.675332 754374 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc000c0ca20 3 D0712 23:59:00.675340 754374 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:59:00.682097 754374 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.682138 754374 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc000c0ca20 4 D0712 23:59:00.682167 754374 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:59:00.683272 754374 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.683310 754374 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc000c0ca20 5 D0712 23:59:00.683324 754374 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:59:00.683385 754374 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.683394 754374 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc000c0ca20 6 D0712 23:59:00.683408 754374 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:59:00.683851 754374 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.683870 754374 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc000c0ca20 7 D0712 23:59:00.683886 754374 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:59:00.684141 754374 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.684170 754374 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc000c0ca20 8 D0712 23:59:00.684189 754374 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:59:00.684506 754374 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.684555 754374 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc000c0ca20 9 D0712 23:59:00.684595 754374 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:59:00.684624 754374 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.684630 754374 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc000c0ca20 10 D0712 23:59:00.684637 754374 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:59:00.684751 754374 usertrap_amd64.go:212] [ 1137: 1140] Found the pattern at ip 46b6e0:sysno 24 D0712 23:59:00.684804 754374 usertrap_amd64.go:122] [ 1137: 1140] Allocate a new trap: 0xc000c0ca20 11 D0712 23:59:00.684826 754374 usertrap_amd64.go:225] [ 1137: 1140] Apply the binary patch addr 46b6e0 trap addr 63370 ([184 24 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:59:00.692722 754374 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.692768 754374 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc000c0ca20 12 D0712 23:59:00.692782 754374 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:59:00.695305 754374 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.695366 754374 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc000c0ca20 13 D0712 23:59:00.695383 754374 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:59:00.695437 754374 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.695457 754374 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc000c0ca20 14 D0712 23:59:00.695467 754374 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:59:00.695540 754374 task_signals.go:470] [ 1137: 1137] Notified of signal 23 D0712 23:59:00.695671 754374 task_signals.go:220] [ 1137: 1137] Signal 23: delivering to handler I0712 23:59:00.704220 754374 compat.go:120] Unsupported syscall remap_file_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/remap_file_pages for more information. D0712 23:59:00.704325 754374 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.704353 754374 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc000c0ca20 15 D0712 23:59:00.704367 754374 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0712 23:59:00.704444 754374 task_exit.go:204] [ 1137: 1137] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.704479 754374 task_exit.go:204] [ 1137: 1137] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.704510 754374 task_signals.go:204] [ 1137: 1140] Signal 1137, PID: 1140, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.704498 754374 task_signals.go:204] [ 1137: 1139] Signal 1137, PID: 1139, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.704547 754374 task_exit.go:204] [ 1137: 1140] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.704508 754374 task_signals.go:204] [ 1137: 1138] Signal 1137, PID: 1138, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.704614 754374 task_signals.go:204] [ 1137: 1141] Signal 1137, PID: 1141, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.704636 754374 task_exit.go:204] [ 1137: 1140] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.704655 754374 task_exit.go:204] [ 1137: 1140] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.704675 754374 task_exit.go:204] [ 1137: 1139] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.704694 754374 task_exit.go:204] [ 1137: 1139] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.704703 754374 task_exit.go:204] [ 1137: 1139] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.704717 754374 task_exit.go:204] [ 1137: 1138] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.704748 754374 task_exit.go:204] [ 1137: 1138] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.704755 754374 task_exit.go:204] [ 1137: 1138] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.704767 754374 task_exit.go:204] [ 1137: 1141] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.706031 754374 task_exit.go:204] [ 1137: 1141] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.706080 754374 task_exit.go:204] [ 1137: 1141] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.706097 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.706165 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.706193 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.706303 754374 task_exit.go:204] [ 1137: 1137] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.706932 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.708555 754374 syscalls.go:262] [ 1142: 1142] Allocating stack with size of 8388608 bytes D0712 23:59:00.708681 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.709778 754374 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.709819 754374 usertrap_amd64.go:106] [ 1142: 1142] Map a usertrap vma at 68000 D0712 23:59:00.709935 754374 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0019f44e0 1 D0712 23:59:00.709973 754374 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 23:59:00.710566 754374 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.710597 754374 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0019f44e0 2 D0712 23:59:00.710609 754374 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 23:59:00.711543 754374 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.711589 754374 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0019f44e0 3 D0712 23:59:00.711602 754374 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 23:59:00.718679 754374 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.718730 754374 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0019f44e0 4 D0712 23:59:00.718752 754374 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 23:59:00.720225 754374 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.720264 754374 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0019f44e0 5 D0712 23:59:00.720282 754374 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 23:59:00.720362 754374 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.720385 754374 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0019f44e0 6 D0712 23:59:00.720396 754374 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 23:59:00.721039 754374 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.721171 754374 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0019f44e0 7 D0712 23:59:00.721215 754374 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 23:59:00.721437 754374 usertrap_amd64.go:212] [ 1142: 1143] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.721459 754374 usertrap_amd64.go:122] [ 1142: 1143] Allocate a new trap: 0xc0019f44e0 8 D0712 23:59:00.721470 754374 usertrap_amd64.go:225] [ 1142: 1143] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 23:59:00.721692 754374 usertrap_amd64.go:212] [ 1142: 1143] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.721713 754374 usertrap_amd64.go:122] [ 1142: 1143] Allocate a new trap: 0xc0019f44e0 9 D0712 23:59:00.721724 754374 usertrap_amd64.go:225] [ 1142: 1143] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 23:59:00.721785 754374 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.721800 754374 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0019f44e0 10 D0712 23:59:00.721813 754374 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 23:59:00.729729 754374 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.729763 754374 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0019f44e0 11 D0712 23:59:00.729778 754374 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 23:59:00.732651 754374 usertrap_amd64.go:212] [ 1142: 1143] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.732722 754374 usertrap_amd64.go:122] [ 1142: 1143] Allocate a new trap: 0xc0019f44e0 12 D0712 23:59:00.732744 754374 usertrap_amd64.go:225] [ 1142: 1143] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 23:59:00.732808 754374 usertrap_amd64.go:212] [ 1142: 1143] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.732817 754374 usertrap_amd64.go:122] [ 1142: 1143] Allocate a new trap: 0xc0019f44e0 13 D0712 23:59:00.732828 754374 usertrap_amd64.go:225] [ 1142: 1143] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 23:59:00.732853 754374 task_signals.go:470] [ 1142: 1142] Notified of signal 23 D0712 23:59:00.732980 754374 task_signals.go:220] [ 1142: 1142] Signal 23: delivering to handler D0712 23:59:00.742479 754374 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.742542 754374 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0019f44e0 14 D0712 23:59:00.742583 754374 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 23:59:00.742674 754374 task_exit.go:204] [ 1142: 1142] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.742715 754374 task_exit.go:204] [ 1142: 1142] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.742718 754374 task_signals.go:204] [ 1142: 1144] Signal 1142, PID: 1144, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.742753 754374 task_signals.go:204] [ 1142: 1145] Signal 1142, PID: 1145, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.742739 754374 task_signals.go:204] [ 1142: 1143] Signal 1142, PID: 1143, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.742757 754374 task_exit.go:204] [ 1142: 1144] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.742796 754374 task_exit.go:204] [ 1142: 1144] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.742815 754374 task_exit.go:204] [ 1142: 1144] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.742855 754374 task_exit.go:204] [ 1142: 1145] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.742912 754374 task_signals.go:204] [ 1142: 1146] Signal 1142, PID: 1146, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.742934 754374 task_exit.go:204] [ 1142: 1146] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.742947 754374 task_exit.go:204] [ 1142: 1143] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.743112 754374 task_exit.go:204] [ 1142: 1145] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.743155 754374 task_exit.go:204] [ 1142: 1145] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.743197 754374 task_exit.go:204] [ 1142: 1146] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.743215 754374 task_exit.go:204] [ 1142: 1146] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.744017 754374 task_exit.go:204] [ 1142: 1143] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.744054 754374 task_exit.go:204] [ 1142: 1143] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.744072 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.744116 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.744141 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.744217 754374 task_exit.go:204] [ 1142: 1142] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.745181 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.746645 754374 syscalls.go:262] [ 1147: 1147] Allocating stack with size of 8388608 bytes D0712 23:59:00.746767 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.748318 754374 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.748362 754374 usertrap_amd64.go:106] [ 1147: 1147] Map a usertrap vma at 65000 D0712 23:59:00.748505 754374 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000786750 1 D0712 23:59:00.748566 754374 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 23:59:00.749109 754374 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.749141 754374 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000786750 2 D0712 23:59:00.749153 754374 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 23:59:00.750013 754374 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.750051 754374 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000786750 3 D0712 23:59:00.750070 754374 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 23:59:00.756344 754374 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.756381 754374 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000786750 4 D0712 23:59:00.756401 754374 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 23:59:00.757647 754374 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.757752 754374 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000786750 5 D0712 23:59:00.757818 754374 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 23:59:00.757936 754374 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.757991 754374 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000786750 6 D0712 23:59:00.758006 754374 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 23:59:00.758291 754374 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.758315 754374 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000786750 7 D0712 23:59:00.758326 754374 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 23:59:00.758555 754374 usertrap_amd64.go:212] [ 1147: 1148] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.758582 754374 usertrap_amd64.go:122] [ 1147: 1148] Allocate a new trap: 0xc000786750 8 D0712 23:59:00.758592 754374 usertrap_amd64.go:225] [ 1147: 1148] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 23:59:00.758883 754374 usertrap_amd64.go:212] [ 1147: 1148] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.758908 754374 usertrap_amd64.go:122] [ 1147: 1148] Allocate a new trap: 0xc000786750 9 D0712 23:59:00.758917 754374 usertrap_amd64.go:225] [ 1147: 1148] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 23:59:00.758953 754374 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.758961 754374 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000786750 10 D0712 23:59:00.758969 754374 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 23:59:00.764618 754374 sampler.go:191] Time: Adjusting syscall overhead down to 766 D0712 23:59:00.766925 754374 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.766963 754374 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000786750 11 D0712 23:59:00.766979 754374 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 23:59:00.769886 754374 usertrap_amd64.go:212] [ 1147: 1148] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.769924 754374 usertrap_amd64.go:122] [ 1147: 1148] Allocate a new trap: 0xc000786750 12 D0712 23:59:00.769940 754374 usertrap_amd64.go:225] [ 1147: 1148] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 23:59:00.770017 754374 usertrap_amd64.go:212] [ 1147: 1148] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.770035 754374 usertrap_amd64.go:122] [ 1147: 1148] Allocate a new trap: 0xc000786750 13 D0712 23:59:00.770045 754374 usertrap_amd64.go:225] [ 1147: 1148] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 23:59:00.770102 754374 task_signals.go:470] [ 1147: 1147] Notified of signal 23 D0712 23:59:00.770173 754374 task_signals.go:220] [ 1147: 1147] Signal 23: delivering to handler D0712 23:59:00.779034 754374 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.779074 754374 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000786750 14 D0712 23:59:00.779089 754374 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 23:59:00.779163 754374 task_exit.go:204] [ 1147: 1147] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.779208 754374 task_exit.go:204] [ 1147: 1147] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.779224 754374 task_signals.go:204] [ 1147: 1151] Signal 1147, PID: 1151, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.779243 754374 task_signals.go:204] [ 1147: 1149] Signal 1147, PID: 1149, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.779274 754374 task_signals.go:204] [ 1147: 1150] Signal 1147, PID: 1150, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.779278 754374 task_exit.go:204] [ 1147: 1151] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.779234 754374 task_signals.go:204] [ 1147: 1148] Signal 1147, PID: 1148, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.779354 754374 task_exit.go:204] [ 1147: 1151] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.779371 754374 task_exit.go:204] [ 1147: 1151] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.779392 754374 task_exit.go:204] [ 1147: 1149] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.779417 754374 task_exit.go:204] [ 1147: 1149] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.779422 754374 task_exit.go:204] [ 1147: 1149] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.779435 754374 task_exit.go:204] [ 1147: 1148] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.779445 754374 task_exit.go:204] [ 1147: 1148] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.779482 754374 task_exit.go:204] [ 1147: 1148] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.779499 754374 task_exit.go:204] [ 1147: 1150] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.780670 754374 task_exit.go:204] [ 1147: 1150] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.780706 754374 task_exit.go:204] [ 1147: 1150] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.780725 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.780765 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.780775 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.781173 754374 task_exit.go:204] [ 1147: 1147] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.782092 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.783948 754374 syscalls.go:262] [ 1152: 1152] Allocating stack with size of 8388608 bytes D0712 23:59:00.784280 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.786244 754374 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.786320 754374 usertrap_amd64.go:106] [ 1152: 1152] Map a usertrap vma at 66000 D0712 23:59:00.786434 754374 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc000ee0e10 1 D0712 23:59:00.786472 754374 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:59:00.786889 754374 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.786917 754374 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc000ee0e10 2 D0712 23:59:00.786931 754374 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:59:00.787605 754374 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.787666 754374 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc000ee0e10 3 D0712 23:59:00.787684 754374 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:59:00.794160 754374 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.794199 754374 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc000ee0e10 4 D0712 23:59:00.794216 754374 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:59:00.795501 754374 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.795525 754374 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc000ee0e10 5 D0712 23:59:00.795532 754374 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:59:00.795598 754374 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.795608 754374 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc000ee0e10 6 D0712 23:59:00.795614 754374 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:59:00.796020 754374 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.796044 754374 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc000ee0e10 7 D0712 23:59:00.796052 754374 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:59:00.796245 754374 usertrap_amd64.go:212] [ 1152: 1153] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.796270 754374 usertrap_amd64.go:122] [ 1152: 1153] Allocate a new trap: 0xc000ee0e10 8 D0712 23:59:00.796281 754374 usertrap_amd64.go:225] [ 1152: 1153] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:59:00.796583 754374 usertrap_amd64.go:212] [ 1152: 1153] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.796654 754374 usertrap_amd64.go:122] [ 1152: 1153] Allocate a new trap: 0xc000ee0e10 9 D0712 23:59:00.796680 754374 usertrap_amd64.go:225] [ 1152: 1153] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:59:00.796719 754374 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.796761 754374 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc000ee0e10 10 D0712 23:59:00.796778 754374 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:59:00.797482 754374 usertrap_amd64.go:212] [ 1152: 1153] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.797513 754374 usertrap_amd64.go:122] [ 1152: 1153] Allocate a new trap: 0xc000ee0e10 11 D0712 23:59:00.797528 754374 usertrap_amd64.go:225] [ 1152: 1153] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:59:00.797570 754374 usertrap_amd64.go:212] [ 1152: 1153] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.797578 754374 usertrap_amd64.go:122] [ 1152: 1153] Allocate a new trap: 0xc000ee0e10 12 D0712 23:59:00.797586 754374 usertrap_amd64.go:225] [ 1152: 1153] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:59:00.797657 754374 task_signals.go:470] [ 1152: 1152] Notified of signal 23 D0712 23:59:00.797717 754374 task_signals.go:220] [ 1152: 1152] Signal 23: delivering to handler D0712 23:59:00.805947 754374 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.805992 754374 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc000ee0e10 13 D0712 23:59:00.806007 754374 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:59:00.808809 754374 task_signals.go:470] [ 1152: 1152] Notified of signal 23 D0712 23:59:00.808934 754374 task_signals.go:220] [ 1152: 1152] Signal 23: delivering to handler D0712 23:59:00.817823 754374 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.817876 754374 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc000ee0e10 14 D0712 23:59:00.817903 754374 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:59:00.817980 754374 task_exit.go:204] [ 1152: 1152] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.818005 754374 task_exit.go:204] [ 1152: 1152] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.818033 754374 task_signals.go:204] [ 1152: 1155] Signal 1152, PID: 1155, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.818058 754374 task_exit.go:204] [ 1152: 1155] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.818069 754374 task_exit.go:204] [ 1152: 1155] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.818046 754374 task_signals.go:204] [ 1152: 1154] Signal 1152, PID: 1154, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.818076 754374 task_exit.go:204] [ 1152: 1155] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.818124 754374 task_signals.go:204] [ 1152: 1156] Signal 1152, PID: 1156, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.818139 754374 task_exit.go:204] [ 1152: 1154] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.818178 754374 task_signals.go:204] [ 1152: 1153] Signal 1152, PID: 1153, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.818204 754374 task_exit.go:204] [ 1152: 1154] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.818208 754374 task_exit.go:204] [ 1152: 1154] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.818223 754374 task_exit.go:204] [ 1152: 1156] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.818233 754374 task_exit.go:204] [ 1152: 1153] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.818300 754374 task_exit.go:204] [ 1152: 1153] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.818319 754374 task_exit.go:204] [ 1152: 1153] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.819567 754374 task_exit.go:204] [ 1152: 1156] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.819630 754374 task_exit.go:204] [ 1152: 1156] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.819647 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.819715 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.819743 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.819909 754374 task_exit.go:204] [ 1152: 1152] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.820654 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.822534 754374 syscalls.go:262] [ 1157: 1157] Allocating stack with size of 8388608 bytes D0712 23:59:00.822697 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.824524 754374 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.824567 754374 usertrap_amd64.go:106] [ 1157: 1157] Map a usertrap vma at 62000 D0712 23:59:00.824759 754374 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc002370b40 1 D0712 23:59:00.824808 754374 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:59:00.825420 754374 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.825450 754374 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc002370b40 2 D0712 23:59:00.825467 754374 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:59:00.826152 754374 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.826179 754374 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc002370b40 3 D0712 23:59:00.826190 754374 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:59:00.832728 754374 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.832769 754374 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc002370b40 4 D0712 23:59:00.832784 754374 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:59:00.834146 754374 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.834195 754374 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc002370b40 5 D0712 23:59:00.834214 754374 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:59:00.834286 754374 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.834333 754374 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc002370b40 6 D0712 23:59:00.834354 754374 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:59:00.834928 754374 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.834963 754374 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc002370b40 7 D0712 23:59:00.834977 754374 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:59:00.835282 754374 usertrap_amd64.go:212] [ 1157: 1158] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.835314 754374 usertrap_amd64.go:122] [ 1157: 1158] Allocate a new trap: 0xc002370b40 8 D0712 23:59:00.835325 754374 usertrap_amd64.go:225] [ 1157: 1158] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:59:00.835561 754374 usertrap_amd64.go:212] [ 1157: 1158] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.835585 754374 usertrap_amd64.go:122] [ 1157: 1158] Allocate a new trap: 0xc002370b40 9 D0712 23:59:00.835596 754374 usertrap_amd64.go:225] [ 1157: 1158] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:59:00.835791 754374 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.835819 754374 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc002370b40 10 D0712 23:59:00.835833 754374 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:59:00.844241 754374 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.844283 754374 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc002370b40 11 D0712 23:59:00.844300 754374 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:59:00.847838 754374 usertrap_amd64.go:212] [ 1157: 1158] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.847910 754374 usertrap_amd64.go:122] [ 1157: 1158] Allocate a new trap: 0xc002370b40 12 D0712 23:59:00.847933 754374 usertrap_amd64.go:225] [ 1157: 1158] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:59:00.847983 754374 usertrap_amd64.go:212] [ 1157: 1158] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.848007 754374 usertrap_amd64.go:122] [ 1157: 1158] Allocate a new trap: 0xc002370b40 13 D0712 23:59:00.848015 754374 usertrap_amd64.go:225] [ 1157: 1158] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:59:00.848074 754374 task_signals.go:470] [ 1157: 1157] Notified of signal 23 D0712 23:59:00.848100 754374 task_signals.go:220] [ 1157: 1157] Signal 23: delivering to handler D0712 23:59:00.854628 754374 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.854671 754374 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc002370b40 14 D0712 23:59:00.854685 754374 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:59:00.854784 754374 task_exit.go:204] [ 1157: 1157] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.854831 754374 task_signals.go:204] [ 1157: 1158] Signal 1157, PID: 1158, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.854890 754374 task_signals.go:204] [ 1157: 1159] Signal 1157, PID: 1159, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.854904 754374 task_exit.go:204] [ 1157: 1157] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.854890 754374 task_signals.go:204] [ 1157: 1161] Signal 1157, PID: 1161, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.854925 754374 task_signals.go:204] [ 1157: 1160] Signal 1157, PID: 1160, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.854940 754374 task_exit.go:204] [ 1157: 1158] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.854967 754374 task_signals.go:204] [ 1157: 1162] Signal 1157, PID: 1162, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.855013 754374 task_exit.go:204] [ 1157: 1158] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.855020 754374 task_exit.go:204] [ 1157: 1158] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.855059 754374 task_exit.go:204] [ 1157: 1159] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.855082 754374 task_exit.go:204] [ 1157: 1159] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.855089 754374 task_exit.go:204] [ 1157: 1159] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.855104 754374 task_exit.go:204] [ 1157: 1161] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.855116 754374 task_exit.go:204] [ 1157: 1161] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.855122 754374 task_exit.go:204] [ 1157: 1161] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.855133 754374 task_exit.go:204] [ 1157: 1160] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.855150 754374 task_exit.go:204] [ 1157: 1160] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.855157 754374 task_exit.go:204] [ 1157: 1160] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.855169 754374 task_exit.go:204] [ 1157: 1162] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.856372 754374 task_exit.go:204] [ 1157: 1162] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.856411 754374 task_exit.go:204] [ 1157: 1162] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.856431 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.856465 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.856484 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.856652 754374 task_exit.go:204] [ 1157: 1157] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.857470 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.859199 754374 syscalls.go:262] [ 1163: 1163] Allocating stack with size of 8388608 bytes D0712 23:59:00.859359 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.860790 754374 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.860836 754374 usertrap_amd64.go:106] [ 1163: 1163] Map a usertrap vma at 62000 D0712 23:59:00.860907 754374 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc000c0d560 1 D0712 23:59:00.860931 754374 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:59:00.861389 754374 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.861439 754374 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc000c0d560 2 D0712 23:59:00.861456 754374 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:59:00.862001 754374 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.862030 754374 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc000c0d560 3 D0712 23:59:00.862040 754374 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:59:00.868037 754374 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.868079 754374 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc000c0d560 4 D0712 23:59:00.868093 754374 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:59:00.869363 754374 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.869397 754374 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc000c0d560 5 D0712 23:59:00.869409 754374 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:59:00.869475 754374 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.869505 754374 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc000c0d560 6 D0712 23:59:00.869517 754374 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:59:00.869733 754374 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.869751 754374 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc000c0d560 7 D0712 23:59:00.869757 754374 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:59:00.869878 754374 usertrap_amd64.go:212] [ 1163: 1164] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.869902 754374 usertrap_amd64.go:122] [ 1163: 1164] Allocate a new trap: 0xc000c0d560 8 D0712 23:59:00.869914 754374 usertrap_amd64.go:225] [ 1163: 1164] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:59:00.870076 754374 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.870090 754374 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc000c0d560 9 D0712 23:59:00.870099 754374 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:59:00.870164 754374 usertrap_amd64.go:212] [ 1163: 1164] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.870200 754374 usertrap_amd64.go:122] [ 1163: 1164] Allocate a new trap: 0xc000c0d560 10 D0712 23:59:00.870213 754374 usertrap_amd64.go:225] [ 1163: 1164] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:59:00.870869 754374 usertrap_amd64.go:212] [ 1163: 1164] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.870894 754374 usertrap_amd64.go:122] [ 1163: 1164] Allocate a new trap: 0xc000c0d560 11 D0712 23:59:00.870907 754374 usertrap_amd64.go:225] [ 1163: 1164] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:59:00.870958 754374 usertrap_amd64.go:212] [ 1163: 1164] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.870984 754374 usertrap_amd64.go:122] [ 1163: 1164] Allocate a new trap: 0xc000c0d560 12 D0712 23:59:00.870995 754374 usertrap_amd64.go:225] [ 1163: 1164] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:59:00.871036 754374 task_signals.go:470] [ 1163: 1163] Notified of signal 23 D0712 23:59:00.871145 754374 task_signals.go:220] [ 1163: 1163] Signal 23: delivering to handler D0712 23:59:00.877610 754374 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.877652 754374 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc000c0d560 13 D0712 23:59:00.877674 754374 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:59:00.882090 754374 task_signals.go:470] [ 1163: 1163] Notified of signal 23 D0712 23:59:00.882175 754374 task_signals.go:220] [ 1163: 1163] Signal 23: delivering to handler D0712 23:59:00.888708 754374 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.888767 754374 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc000c0d560 14 D0712 23:59:00.888783 754374 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:59:00.888864 754374 task_exit.go:204] [ 1163: 1163] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.888900 754374 task_exit.go:204] [ 1163: 1163] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.888978 754374 task_signals.go:204] [ 1163: 1167] Signal 1163, PID: 1167, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.889020 754374 task_exit.go:204] [ 1163: 1167] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.889032 754374 task_exit.go:204] [ 1163: 1167] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.889039 754374 task_exit.go:204] [ 1163: 1167] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.888936 754374 task_signals.go:204] [ 1163: 1166] Signal 1163, PID: 1166, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.888985 754374 task_signals.go:204] [ 1163: 1164] Signal 1163, PID: 1164, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.888927 754374 task_signals.go:204] [ 1163: 1165] Signal 1163, PID: 1165, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.889053 754374 task_exit.go:204] [ 1163: 1166] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.889063 754374 task_exit.go:204] [ 1163: 1165] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.889084 754374 task_exit.go:204] [ 1163: 1165] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.889099 754374 task_exit.go:204] [ 1163: 1165] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.889112 754374 task_exit.go:204] [ 1163: 1164] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.889156 754374 task_exit.go:204] [ 1163: 1166] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.889175 754374 task_exit.go:204] [ 1163: 1166] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.890487 754374 task_exit.go:204] [ 1163: 1164] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.890524 754374 task_exit.go:204] [ 1163: 1164] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.890560 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.890605 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.890623 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.890682 754374 task_exit.go:204] [ 1163: 1163] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.891302 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.892689 754374 syscalls.go:262] [ 1168: 1168] Allocating stack with size of 8388608 bytes D0712 23:59:00.892810 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.893931 754374 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.893975 754374 usertrap_amd64.go:106] [ 1168: 1168] Map a usertrap vma at 6a000 D0712 23:59:00.894061 754374 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc000786c00 1 D0712 23:59:00.894098 754374 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 23:59:00.894511 754374 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.894541 754374 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc000786c00 2 D0712 23:59:00.894553 754374 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 23:59:00.895200 754374 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.895231 754374 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc000786c00 3 D0712 23:59:00.895254 754374 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 23:59:00.901889 754374 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.901959 754374 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc000786c00 4 D0712 23:59:00.901979 754374 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 23:59:00.903258 754374 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.903323 754374 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc000786c00 5 D0712 23:59:00.903345 754374 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 23:59:00.903425 754374 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.903442 754374 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc000786c00 6 D0712 23:59:00.903451 754374 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 23:59:00.904021 754374 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.904046 754374 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc000786c00 7 D0712 23:59:00.904060 754374 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 23:59:00.904276 754374 usertrap_amd64.go:212] [ 1168: 1169] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.904296 754374 usertrap_amd64.go:122] [ 1168: 1169] Allocate a new trap: 0xc000786c00 8 D0712 23:59:00.904310 754374 usertrap_amd64.go:225] [ 1168: 1169] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 23:59:00.904611 754374 usertrap_amd64.go:212] [ 1168: 1169] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.904636 754374 usertrap_amd64.go:122] [ 1168: 1169] Allocate a new trap: 0xc000786c00 9 D0712 23:59:00.904646 754374 usertrap_amd64.go:225] [ 1168: 1169] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 23:59:00.904715 754374 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.904733 754374 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc000786c00 10 D0712 23:59:00.904748 754374 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 23:59:00.912185 754374 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.912236 754374 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc000786c00 11 D0712 23:59:00.912254 754374 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 23:59:00.916560 754374 usertrap_amd64.go:212] [ 1168: 1169] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.916601 754374 usertrap_amd64.go:122] [ 1168: 1169] Allocate a new trap: 0xc000786c00 12 D0712 23:59:00.916619 754374 usertrap_amd64.go:225] [ 1168: 1169] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 23:59:00.916678 754374 usertrap_amd64.go:212] [ 1168: 1169] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.916734 754374 usertrap_amd64.go:122] [ 1168: 1169] Allocate a new trap: 0xc000786c00 13 D0712 23:59:00.916743 754374 usertrap_amd64.go:225] [ 1168: 1169] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 23:59:00.916802 754374 task_signals.go:470] [ 1168: 1168] Notified of signal 23 D0712 23:59:00.916900 754374 task_signals.go:220] [ 1168: 1168] Signal 23: delivering to handler D0712 23:59:00.924465 754374 sys_signal.go:495] [ 1168: 1168] Restart block missing in restart_syscall(2). Did ptrace inject a return value of ERESTART_RESTARTBLOCK? D0712 23:59:00.924607 754374 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.924663 754374 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc000786c00 14 D0712 23:59:00.924677 754374 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 23:59:00.924733 754374 task_exit.go:204] [ 1168: 1168] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.924776 754374 task_exit.go:204] [ 1168: 1168] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.924803 754374 task_signals.go:204] [ 1168: 1170] Signal 1168, PID: 1170, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.924823 754374 task_exit.go:204] [ 1168: 1170] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.924831 754374 task_signals.go:204] [ 1168: 1169] Signal 1168, PID: 1169, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.924847 754374 task_signals.go:204] [ 1168: 1172] Signal 1168, PID: 1172, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.924859 754374 task_signals.go:204] [ 1168: 1171] Signal 1168, PID: 1171, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.924872 754374 task_exit.go:204] [ 1168: 1170] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.924879 754374 task_exit.go:204] [ 1168: 1170] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.924894 754374 task_exit.go:204] [ 1168: 1169] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.924903 754374 task_exit.go:204] [ 1168: 1169] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.924909 754374 task_exit.go:204] [ 1168: 1169] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.924932 754374 task_exit.go:204] [ 1168: 1172] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.925021 754374 task_exit.go:204] [ 1168: 1172] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.925043 754374 task_exit.go:204] [ 1168: 1172] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.925057 754374 task_exit.go:204] [ 1168: 1171] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.926366 754374 task_exit.go:204] [ 1168: 1171] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.926423 754374 task_exit.go:204] [ 1168: 1171] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.926449 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.926482 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.926493 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.926572 754374 task_exit.go:204] [ 1168: 1168] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.927442 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.929071 754374 syscalls.go:262] [ 1173: 1173] Allocating stack with size of 8388608 bytes D0712 23:59:00.929311 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.930693 754374 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.930737 754374 usertrap_amd64.go:106] [ 1173: 1173] Map a usertrap vma at 67000 D0712 23:59:00.930897 754374 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc000ee0ff0 1 D0712 23:59:00.930927 754374 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 23:59:00.931417 754374 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.931433 754374 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc000ee0ff0 2 D0712 23:59:00.931443 754374 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 23:59:00.933343 754374 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.933378 754374 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc000ee0ff0 3 D0712 23:59:00.933392 754374 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 23:59:00.939929 754374 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.939960 754374 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc000ee0ff0 4 D0712 23:59:00.939972 754374 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 23:59:00.941190 754374 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.941221 754374 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc000ee0ff0 5 D0712 23:59:00.941241 754374 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 23:59:00.941314 754374 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.941329 754374 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc000ee0ff0 6 D0712 23:59:00.941335 754374 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 23:59:00.941699 754374 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.941719 754374 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc000ee0ff0 7 D0712 23:59:00.941725 754374 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 23:59:00.941884 754374 usertrap_amd64.go:212] [ 1173: 1174] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.941910 754374 usertrap_amd64.go:122] [ 1173: 1174] Allocate a new trap: 0xc000ee0ff0 8 D0712 23:59:00.941927 754374 usertrap_amd64.go:225] [ 1173: 1174] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 23:59:00.942099 754374 usertrap_amd64.go:212] [ 1173: 1174] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.942131 754374 usertrap_amd64.go:122] [ 1173: 1174] Allocate a new trap: 0xc000ee0ff0 9 D0712 23:59:00.942147 754374 usertrap_amd64.go:225] [ 1173: 1174] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 23:59:00.942161 754374 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.942169 754374 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc000ee0ff0 10 D0712 23:59:00.942179 754374 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 23:59:00.950495 754374 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.950526 754374 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc000ee0ff0 11 D0712 23:59:00.950539 754374 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 23:59:00.953090 754374 usertrap_amd64.go:212] [ 1173: 1174] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.953185 754374 usertrap_amd64.go:122] [ 1173: 1174] Allocate a new trap: 0xc000ee0ff0 12 D0712 23:59:00.953216 754374 usertrap_amd64.go:225] [ 1173: 1174] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 23:59:00.953368 754374 usertrap_amd64.go:212] [ 1173: 1174] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.953402 754374 usertrap_amd64.go:122] [ 1173: 1174] Allocate a new trap: 0xc000ee0ff0 13 D0712 23:59:00.953416 754374 usertrap_amd64.go:225] [ 1173: 1174] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 23:59:00.953596 754374 task_signals.go:470] [ 1173: 1173] Notified of signal 23 D0712 23:59:00.953748 754374 task_signals.go:220] [ 1173: 1173] Signal 23: delivering to handler D0712 23:59:00.961716 754374 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:00.961781 754374 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc000ee0ff0 14 D0712 23:59:00.961803 754374 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 23:59:00.961873 754374 task_exit.go:204] [ 1173: 1173] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.961899 754374 task_exit.go:204] [ 1173: 1173] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.961923 754374 task_signals.go:204] [ 1173: 1175] Signal 1173, PID: 1175, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.961976 754374 task_exit.go:204] [ 1173: 1175] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.962049 754374 task_exit.go:204] [ 1173: 1175] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.962059 754374 task_exit.go:204] [ 1173: 1175] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.961944 754374 task_signals.go:204] [ 1173: 1176] Signal 1173, PID: 1176, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.962089 754374 task_exit.go:204] [ 1173: 1176] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.962097 754374 task_exit.go:204] [ 1173: 1176] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.962103 754374 task_exit.go:204] [ 1173: 1176] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.962123 754374 task_signals.go:204] [ 1173: 1174] Signal 1173, PID: 1174, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.962136 754374 task_exit.go:204] [ 1173: 1174] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.961938 754374 task_signals.go:204] [ 1173: 1177] Signal 1173, PID: 1177, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:00.962144 754374 task_exit.go:204] [ 1173: 1174] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.962181 754374 task_exit.go:204] [ 1173: 1174] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.962218 754374 task_exit.go:204] [ 1173: 1177] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:00.963447 754374 task_exit.go:204] [ 1173: 1177] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:00.963541 754374 task_exit.go:204] [ 1173: 1177] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.963569 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:00.963842 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:59:00.963921 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:00.964043 754374 task_exit.go:204] [ 1173: 1173] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:00.964911 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.966363 754374 syscalls.go:262] [ 1178: 1178] Allocating stack with size of 8388608 bytes D0712 23:59:00.966479 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:00.968234 754374 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:00.968305 754374 usertrap_amd64.go:106] [ 1178: 1178] Map a usertrap vma at 63000 D0712 23:59:00.968828 754374 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc000786c60 1 D0712 23:59:00.968993 754374 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 23:59:00.969533 754374 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:00.969563 754374 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc000786c60 2 D0712 23:59:00.969576 754374 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 23:59:00.970621 754374 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:00.970679 754374 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc000786c60 3 D0712 23:59:00.970705 754374 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 23:59:00.978589 754374 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:00.978635 754374 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc000786c60 4 D0712 23:59:00.978650 754374 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 23:59:00.979834 754374 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:00.979862 754374 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc000786c60 5 D0712 23:59:00.979876 754374 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 23:59:00.980131 754374 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46b214:sysno 13 D0712 23:59:00.980166 754374 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc000786c60 6 D0712 23:59:00.980178 754374 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 23:59:00.980647 754374 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:00.980658 754374 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc000786c60 7 D0712 23:59:00.980675 754374 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 23:59:00.980858 754374 usertrap_amd64.go:212] [ 1178: 1179] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:00.980888 754374 usertrap_amd64.go:122] [ 1178: 1179] Allocate a new trap: 0xc000786c60 8 D0712 23:59:00.980902 754374 usertrap_amd64.go:225] [ 1178: 1179] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 23:59:00.981138 754374 usertrap_amd64.go:212] [ 1178: 1179] Found the pattern at ip 46af76:sysno 35 D0712 23:59:00.981170 754374 usertrap_amd64.go:122] [ 1178: 1179] Allocate a new trap: 0xc000786c60 9 D0712 23:59:00.981192 754374 usertrap_amd64.go:225] [ 1178: 1179] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 23:59:00.981443 754374 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:00.981475 754374 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc000786c60 10 D0712 23:59:00.981487 754374 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 23:59:00.981950 754374 usertrap_amd64.go:212] [ 1178: 1179] Found the pattern at ip 46b020:sysno 39 D0712 23:59:00.981976 754374 usertrap_amd64.go:122] [ 1178: 1179] Allocate a new trap: 0xc000786c60 11 D0712 23:59:00.981987 754374 usertrap_amd64.go:225] [ 1178: 1179] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 23:59:00.982113 754374 usertrap_amd64.go:212] [ 1178: 1179] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:00.982131 754374 usertrap_amd64.go:122] [ 1178: 1179] Allocate a new trap: 0xc000786c60 12 D0712 23:59:00.982138 754374 usertrap_amd64.go:225] [ 1178: 1179] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 23:59:00.982270 754374 task_signals.go:470] [ 1178: 1178] Notified of signal 23 D0712 23:59:00.982338 754374 task_signals.go:220] [ 1178: 1178] Signal 23: delivering to handler D0712 23:59:00.989749 754374 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46af29:sysno 293 D0712 23:59:00.989818 754374 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc000786c60 13 D0712 23:59:00.989835 754374 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 23:59:00.992705 754374 task_signals.go:470] [ 1178: 1178] Notified of signal 23 D0712 23:59:00.992828 754374 task_signals.go:220] [ 1178: 1178] Signal 23: delivering to handler D0712 23:59:01.001451 754374 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:01.001506 754374 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc000786c60 14 D0712 23:59:01.001526 754374 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 23:59:01.001642 754374 task_exit.go:204] [ 1178: 1178] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.001676 754374 task_exit.go:204] [ 1178: 1178] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.001703 754374 task_signals.go:204] [ 1178: 1181] Signal 1178, PID: 1181, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.001727 754374 task_exit.go:204] [ 1178: 1181] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.001722 754374 task_signals.go:204] [ 1178: 1179] Signal 1178, PID: 1179, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.001724 754374 task_signals.go:204] [ 1178: 1182] Signal 1178, PID: 1182, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.001736 754374 task_exit.go:204] [ 1178: 1181] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.001763 754374 task_exit.go:204] [ 1178: 1181] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.001697 754374 task_signals.go:204] [ 1178: 1180] Signal 1178, PID: 1180, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.001796 754374 task_exit.go:204] [ 1178: 1180] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.001808 754374 task_exit.go:204] [ 1178: 1180] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.001813 754374 task_exit.go:204] [ 1178: 1180] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.001832 754374 task_exit.go:204] [ 1178: 1179] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.001872 754374 task_exit.go:204] [ 1178: 1179] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.001882 754374 task_exit.go:204] [ 1178: 1179] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.001911 754374 task_exit.go:204] [ 1178: 1182] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.003004 754374 task_exit.go:204] [ 1178: 1182] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.003042 754374 task_exit.go:204] [ 1178: 1182] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.003061 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:01.003105 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:59:01.003116 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:01.003197 754374 task_exit.go:204] [ 1178: 1178] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.003988 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:01.005463 754374 syscalls.go:262] [ 1183: 1183] Allocating stack with size of 8388608 bytes D0712 23:59:01.005635 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:01.006878 754374 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:01.006926 754374 usertrap_amd64.go:106] [ 1183: 1183] Map a usertrap vma at 62000 D0712 23:59:01.007044 754374 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc000e61560 1 D0712 23:59:01.007108 754374 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 23:59:01.007625 754374 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:01.007652 754374 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc000e61560 2 D0712 23:59:01.007664 754374 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 23:59:01.008320 754374 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:01.008349 754374 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc000e61560 3 D0712 23:59:01.008366 754374 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 23:59:01.016028 754374 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:01.016068 754374 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc000e61560 4 D0712 23:59:01.016080 754374 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 23:59:01.017340 754374 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:01.017374 754374 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc000e61560 5 D0712 23:59:01.017388 754374 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 23:59:01.017436 754374 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46b214:sysno 13 D0712 23:59:01.017460 754374 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc000e61560 6 D0712 23:59:01.017470 754374 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 23:59:01.017725 754374 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:01.017759 754374 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc000e61560 7 D0712 23:59:01.017772 754374 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 23:59:01.018029 754374 usertrap_amd64.go:212] [ 1183: 1184] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:01.018104 754374 usertrap_amd64.go:122] [ 1183: 1184] Allocate a new trap: 0xc000e61560 8 D0712 23:59:01.018127 754374 usertrap_amd64.go:225] [ 1183: 1184] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 23:59:01.018314 754374 usertrap_amd64.go:212] [ 1183: 1184] Found the pattern at ip 46af76:sysno 35 D0712 23:59:01.018340 754374 usertrap_amd64.go:122] [ 1183: 1184] Allocate a new trap: 0xc000e61560 9 D0712 23:59:01.018353 754374 usertrap_amd64.go:225] [ 1183: 1184] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 23:59:01.018369 754374 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:01.018383 754374 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc000e61560 10 D0712 23:59:01.018391 754374 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 23:59:01.026760 754374 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46af29:sysno 293 D0712 23:59:01.026812 754374 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc000e61560 11 D0712 23:59:01.026834 754374 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 23:59:01.029879 754374 usertrap_amd64.go:212] [ 1183: 1184] Found the pattern at ip 46b020:sysno 39 D0712 23:59:01.029958 754374 usertrap_amd64.go:122] [ 1183: 1184] Allocate a new trap: 0xc000e61560 12 D0712 23:59:01.029984 754374 usertrap_amd64.go:225] [ 1183: 1184] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 23:59:01.030034 754374 usertrap_amd64.go:212] [ 1183: 1184] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:01.030043 754374 usertrap_amd64.go:122] [ 1183: 1184] Allocate a new trap: 0xc000e61560 13 D0712 23:59:01.030053 754374 usertrap_amd64.go:225] [ 1183: 1184] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 23:59:01.030092 754374 task_signals.go:470] [ 1183: 1183] Notified of signal 23 D0712 23:59:01.030185 754374 task_signals.go:220] [ 1183: 1183] Signal 23: delivering to handler D0712 23:59:01.038961 754374 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:01.039015 754374 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc000e61560 14 D0712 23:59:01.039032 754374 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 23:59:01.039101 754374 task_exit.go:204] [ 1183: 1183] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.039141 754374 task_exit.go:204] [ 1183: 1183] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.039168 754374 task_signals.go:204] [ 1183: 1184] Signal 1183, PID: 1184, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.039197 754374 task_exit.go:204] [ 1183: 1184] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.039203 754374 task_exit.go:204] [ 1183: 1184] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.039213 754374 task_exit.go:204] [ 1183: 1184] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.039235 754374 task_signals.go:204] [ 1183: 1185] Signal 1183, PID: 1185, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.039244 754374 task_exit.go:204] [ 1183: 1185] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.039248 754374 task_exit.go:204] [ 1183: 1185] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.039251 754374 task_exit.go:204] [ 1183: 1185] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.039264 754374 task_signals.go:204] [ 1183: 1186] Signal 1183, PID: 1186, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.039271 754374 task_exit.go:204] [ 1183: 1186] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.039275 754374 task_exit.go:204] [ 1183: 1186] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.039278 754374 task_exit.go:204] [ 1183: 1186] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.039296 754374 task_signals.go:204] [ 1183: 1187] Signal 1183, PID: 1187, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.039302 754374 task_exit.go:204] [ 1183: 1187] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.040610 754374 task_exit.go:204] [ 1183: 1187] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.040662 754374 task_exit.go:204] [ 1183: 1187] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.040683 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:01.040728 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:59:01.040739 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:01.041027 754374 task_exit.go:204] [ 1183: 1183] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.041208 754374 task_signals.go:470] [ 5: 25] Notified of signal 23 D0712 23:59:01.041392 754374 task_signals.go:220] [ 5: 25] Signal 23: delivering to handler D0712 23:59:01.042155 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:01.044056 754374 syscalls.go:262] [ 1188: 1188] Allocating stack with size of 8388608 bytes D0712 23:59:01.044276 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:01.046657 754374 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:01.046734 754374 usertrap_amd64.go:106] [ 1188: 1188] Map a usertrap vma at 65000 D0712 23:59:01.046872 754374 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc000786f60 1 D0712 23:59:01.046919 754374 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 23:59:01.047404 754374 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:01.047458 754374 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc000786f60 2 D0712 23:59:01.047475 754374 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 23:59:01.048357 754374 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:01.048397 754374 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc000786f60 3 D0712 23:59:01.048417 754374 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 23:59:01.055213 754374 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:01.055270 754374 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc000786f60 4 D0712 23:59:01.055295 754374 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 23:59:01.056351 754374 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:01.056371 754374 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc000786f60 5 D0712 23:59:01.056382 754374 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 23:59:01.056499 754374 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46b214:sysno 13 D0712 23:59:01.056516 754374 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc000786f60 6 D0712 23:59:01.056525 754374 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 23:59:01.057024 754374 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:01.057049 754374 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc000786f60 7 D0712 23:59:01.057073 754374 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 23:59:01.057383 754374 usertrap_amd64.go:212] [ 1188: 1189] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:01.057403 754374 usertrap_amd64.go:122] [ 1188: 1189] Allocate a new trap: 0xc000786f60 8 D0712 23:59:01.057415 754374 usertrap_amd64.go:225] [ 1188: 1189] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 23:59:01.057629 754374 usertrap_amd64.go:212] [ 1188: 1189] Found the pattern at ip 46af76:sysno 35 D0712 23:59:01.057657 754374 usertrap_amd64.go:122] [ 1188: 1189] Allocate a new trap: 0xc000786f60 9 D0712 23:59:01.057726 754374 usertrap_amd64.go:225] [ 1188: 1189] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 23:59:01.057814 754374 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:01.057825 754374 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc000786f60 10 D0712 23:59:01.057858 754374 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 23:59:01.065474 754374 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46af29:sysno 293 D0712 23:59:01.065511 754374 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc000786f60 11 D0712 23:59:01.065529 754374 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 23:59:01.068147 754374 usertrap_amd64.go:212] [ 1188: 1189] Found the pattern at ip 46b020:sysno 39 D0712 23:59:01.068199 754374 usertrap_amd64.go:122] [ 1188: 1189] Allocate a new trap: 0xc000786f60 12 D0712 23:59:01.068221 754374 usertrap_amd64.go:225] [ 1188: 1189] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 23:59:01.068279 754374 usertrap_amd64.go:212] [ 1188: 1189] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:01.068291 754374 usertrap_amd64.go:122] [ 1188: 1189] Allocate a new trap: 0xc000786f60 13 D0712 23:59:01.068299 754374 usertrap_amd64.go:225] [ 1188: 1189] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 23:59:01.068322 754374 task_signals.go:470] [ 1188: 1188] Notified of signal 23 D0712 23:59:01.068405 754374 task_signals.go:220] [ 1188: 1188] Signal 23: delivering to handler D0712 23:59:01.075313 754374 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:01.075350 754374 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc000786f60 14 D0712 23:59:01.075366 754374 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 23:59:01.075428 754374 task_exit.go:204] [ 1188: 1188] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.075462 754374 task_exit.go:204] [ 1188: 1188] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.075484 754374 task_signals.go:204] [ 1188: 1189] Signal 1188, PID: 1189, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.075510 754374 task_exit.go:204] [ 1188: 1189] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.075547 754374 task_signals.go:204] [ 1188: 1192] Signal 1188, PID: 1192, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.075506 754374 task_signals.go:204] [ 1188: 1190] Signal 1188, PID: 1190, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.075484 754374 task_signals.go:204] [ 1188: 1191] Signal 1188, PID: 1191, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.075581 754374 task_exit.go:204] [ 1188: 1189] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.075588 754374 task_exit.go:204] [ 1188: 1189] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.075602 754374 task_exit.go:204] [ 1188: 1192] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.075626 754374 task_exit.go:204] [ 1188: 1192] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.075629 754374 task_exit.go:204] [ 1188: 1192] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.075638 754374 task_exit.go:204] [ 1188: 1190] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.075644 754374 task_exit.go:204] [ 1188: 1190] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.075647 754374 task_exit.go:204] [ 1188: 1190] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.075655 754374 task_exit.go:204] [ 1188: 1191] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.076686 754374 task_exit.go:204] [ 1188: 1191] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.076709 754374 task_exit.go:204] [ 1188: 1191] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.076727 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:01.076755 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:59:01.076762 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:01.076925 754374 task_exit.go:204] [ 1188: 1188] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.077533 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:01.078649 754374 syscalls.go:262] [ 1193: 1193] Allocating stack with size of 8388608 bytes D0712 23:59:01.078751 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:01.079982 754374 usertrap_amd64.go:212] [ 1193: 1193] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:01.080025 754374 usertrap_amd64.go:106] [ 1193: 1193] Map a usertrap vma at 66000 D0712 23:59:01.080114 754374 usertrap_amd64.go:122] [ 1193: 1193] Allocate a new trap: 0xc000786ff0 1 D0712 23:59:01.080141 754374 usertrap_amd64.go:225] [ 1193: 1193] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 23:59:01.080538 754374 usertrap_amd64.go:212] [ 1193: 1193] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:01.080559 754374 usertrap_amd64.go:122] [ 1193: 1193] Allocate a new trap: 0xc000786ff0 2 D0712 23:59:01.080573 754374 usertrap_amd64.go:225] [ 1193: 1193] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 23:59:01.081355 754374 usertrap_amd64.go:212] [ 1193: 1193] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:01.081382 754374 usertrap_amd64.go:122] [ 1193: 1193] Allocate a new trap: 0xc000786ff0 3 D0712 23:59:01.081392 754374 usertrap_amd64.go:225] [ 1193: 1193] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 23:59:01.087496 754374 usertrap_amd64.go:212] [ 1193: 1193] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:01.087567 754374 usertrap_amd64.go:122] [ 1193: 1193] Allocate a new trap: 0xc000786ff0 4 D0712 23:59:01.087582 754374 usertrap_amd64.go:225] [ 1193: 1193] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 23:59:01.088772 754374 usertrap_amd64.go:212] [ 1193: 1193] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:01.088784 754374 usertrap_amd64.go:122] [ 1193: 1193] Allocate a new trap: 0xc000786ff0 5 D0712 23:59:01.088790 754374 usertrap_amd64.go:225] [ 1193: 1193] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 23:59:01.088805 754374 usertrap_amd64.go:212] [ 1193: 1193] Found the pattern at ip 46b214:sysno 13 D0712 23:59:01.088810 754374 usertrap_amd64.go:122] [ 1193: 1193] Allocate a new trap: 0xc000786ff0 6 D0712 23:59:01.088815 754374 usertrap_amd64.go:225] [ 1193: 1193] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 23:59:01.089180 754374 usertrap_amd64.go:212] [ 1193: 1193] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:01.089187 754374 usertrap_amd64.go:122] [ 1193: 1193] Allocate a new trap: 0xc000786ff0 7 D0712 23:59:01.089193 754374 usertrap_amd64.go:225] [ 1193: 1193] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 23:59:01.089403 754374 usertrap_amd64.go:212] [ 1193: 1194] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:01.089411 754374 usertrap_amd64.go:122] [ 1193: 1194] Allocate a new trap: 0xc000786ff0 8 D0712 23:59:01.089417 754374 usertrap_amd64.go:225] [ 1193: 1194] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 23:59:01.089861 754374 usertrap_amd64.go:212] [ 1193: 1193] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:01.089870 754374 usertrap_amd64.go:122] [ 1193: 1193] Allocate a new trap: 0xc000786ff0 9 D0712 23:59:01.089876 754374 usertrap_amd64.go:225] [ 1193: 1193] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 23:59:01.090120 754374 usertrap_amd64.go:212] [ 1193: 1194] Found the pattern at ip 46af76:sysno 35 D0712 23:59:01.090137 754374 usertrap_amd64.go:122] [ 1193: 1194] Allocate a new trap: 0xc000786ff0 10 D0712 23:59:01.090147 754374 usertrap_amd64.go:225] [ 1193: 1194] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 23:59:01.096708 754374 usertrap_amd64.go:212] [ 1193: 1193] Found the pattern at ip 46af29:sysno 293 D0712 23:59:01.096735 754374 usertrap_amd64.go:122] [ 1193: 1193] Allocate a new trap: 0xc000786ff0 11 D0712 23:59:01.096749 754374 usertrap_amd64.go:225] [ 1193: 1193] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 23:59:01.100588 754374 usertrap_amd64.go:212] [ 1193: 1194] Found the pattern at ip 46b020:sysno 39 D0712 23:59:01.100659 754374 usertrap_amd64.go:122] [ 1193: 1194] Allocate a new trap: 0xc000786ff0 12 D0712 23:59:01.100687 754374 usertrap_amd64.go:225] [ 1193: 1194] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 23:59:01.101123 754374 usertrap_amd64.go:212] [ 1193: 1194] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:01.101143 754374 usertrap_amd64.go:122] [ 1193: 1194] Allocate a new trap: 0xc000786ff0 13 D0712 23:59:01.101152 754374 usertrap_amd64.go:225] [ 1193: 1194] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 23:59:01.101175 754374 task_signals.go:470] [ 1193: 1193] Notified of signal 23 D0712 23:59:01.101242 754374 task_signals.go:220] [ 1193: 1193] Signal 23: delivering to handler D0712 23:59:01.107589 754374 usertrap_amd64.go:212] [ 1193: 1193] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:01.107623 754374 usertrap_amd64.go:122] [ 1193: 1193] Allocate a new trap: 0xc000786ff0 14 D0712 23:59:01.107639 754374 usertrap_amd64.go:225] [ 1193: 1193] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 23:59:01.107722 754374 task_exit.go:204] [ 1193: 1193] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.107758 754374 task_exit.go:204] [ 1193: 1193] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.107792 754374 task_signals.go:204] [ 1193: 1196] Signal 1193, PID: 1196, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.107809 754374 task_exit.go:204] [ 1193: 1196] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.107818 754374 task_exit.go:204] [ 1193: 1196] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.107823 754374 task_exit.go:204] [ 1193: 1196] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.107794 754374 task_signals.go:204] [ 1193: 1195] Signal 1193, PID: 1195, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.107837 754374 task_signals.go:204] [ 1193: 1197] Signal 1193, PID: 1197, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.107846 754374 task_exit.go:204] [ 1193: 1197] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.107852 754374 task_exit.go:204] [ 1193: 1197] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.107855 754374 task_exit.go:204] [ 1193: 1197] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.107865 754374 task_exit.go:204] [ 1193: 1195] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.107871 754374 task_exit.go:204] [ 1193: 1195] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.107874 754374 task_exit.go:204] [ 1193: 1195] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.107885 754374 task_signals.go:204] [ 1193: 1194] Signal 1193, PID: 1194, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.107925 754374 task_exit.go:204] [ 1193: 1194] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.109137 754374 task_exit.go:204] [ 1193: 1194] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.109184 754374 task_exit.go:204] [ 1193: 1194] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.109205 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:01.109243 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:59:01.109273 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:01.109402 754374 task_exit.go:204] [ 1193: 1193] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.111853 754374 task_stop.go:118] [ 5: 25] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:01.113968 754374 syscalls.go:262] [ 1198: 1198] Allocating stack with size of 8388608 bytes D0712 23:59:01.114248 754374 task_stop.go:138] [ 5: 25] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:01.115972 754374 usertrap_amd64.go:212] [ 1198: 1198] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:01.116023 754374 usertrap_amd64.go:106] [ 1198: 1198] Map a usertrap vma at 65000 D0712 23:59:01.116144 754374 usertrap_amd64.go:122] [ 1198: 1198] Allocate a new trap: 0xc000ee1290 1 D0712 23:59:01.116180 754374 usertrap_amd64.go:225] [ 1198: 1198] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 23:59:01.116726 754374 usertrap_amd64.go:212] [ 1198: 1198] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:01.116792 754374 usertrap_amd64.go:122] [ 1198: 1198] Allocate a new trap: 0xc000ee1290 2 D0712 23:59:01.116812 754374 usertrap_amd64.go:225] [ 1198: 1198] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 23:59:01.119713 754374 usertrap_amd64.go:212] [ 1198: 1198] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:01.119778 754374 usertrap_amd64.go:122] [ 1198: 1198] Allocate a new trap: 0xc000ee1290 3 D0712 23:59:01.119798 754374 usertrap_amd64.go:225] [ 1198: 1198] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 23:59:01.126495 754374 usertrap_amd64.go:212] [ 1198: 1198] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:01.126551 754374 usertrap_amd64.go:122] [ 1198: 1198] Allocate a new trap: 0xc000ee1290 4 D0712 23:59:01.126579 754374 usertrap_amd64.go:225] [ 1198: 1198] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 23:59:01.127785 754374 usertrap_amd64.go:212] [ 1198: 1198] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:01.127822 754374 usertrap_amd64.go:122] [ 1198: 1198] Allocate a new trap: 0xc000ee1290 5 D0712 23:59:01.127839 754374 usertrap_amd64.go:225] [ 1198: 1198] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 23:59:01.127912 754374 usertrap_amd64.go:212] [ 1198: 1198] Found the pattern at ip 46b214:sysno 13 D0712 23:59:01.127930 754374 usertrap_amd64.go:122] [ 1198: 1198] Allocate a new trap: 0xc000ee1290 6 D0712 23:59:01.127940 754374 usertrap_amd64.go:225] [ 1198: 1198] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 23:59:01.128238 754374 usertrap_amd64.go:212] [ 1198: 1198] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:01.128268 754374 usertrap_amd64.go:122] [ 1198: 1198] Allocate a new trap: 0xc000ee1290 7 D0712 23:59:01.128284 754374 usertrap_amd64.go:225] [ 1198: 1198] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 23:59:01.128520 754374 usertrap_amd64.go:212] [ 1198: 1199] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:01.128638 754374 usertrap_amd64.go:122] [ 1198: 1199] Allocate a new trap: 0xc000ee1290 8 D0712 23:59:01.128708 754374 usertrap_amd64.go:225] [ 1198: 1199] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 23:59:01.129029 754374 usertrap_amd64.go:212] [ 1198: 1199] Found the pattern at ip 46af76:sysno 35 D0712 23:59:01.129056 754374 usertrap_amd64.go:122] [ 1198: 1199] Allocate a new trap: 0xc000ee1290 9 D0712 23:59:01.129064 754374 usertrap_amd64.go:225] [ 1198: 1199] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 23:59:01.129128 754374 usertrap_amd64.go:212] [ 1198: 1198] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:01.129145 754374 usertrap_amd64.go:122] [ 1198: 1198] Allocate a new trap: 0xc000ee1290 10 D0712 23:59:01.129152 754374 usertrap_amd64.go:225] [ 1198: 1198] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 23:59:01.136476 754374 usertrap_amd64.go:212] [ 1198: 1198] Found the pattern at ip 46af29:sysno 293 D0712 23:59:01.136499 754374 usertrap_amd64.go:122] [ 1198: 1198] Allocate a new trap: 0xc000ee1290 11 D0712 23:59:01.136510 754374 usertrap_amd64.go:225] [ 1198: 1198] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 23:59:01.139652 754374 usertrap_amd64.go:212] [ 1198: 1199] Found the pattern at ip 46b020:sysno 39 D0712 23:59:01.139712 754374 usertrap_amd64.go:122] [ 1198: 1199] Allocate a new trap: 0xc000ee1290 12 D0712 23:59:01.139732 754374 usertrap_amd64.go:225] [ 1198: 1199] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 23:59:01.141557 754374 usertrap_amd64.go:212] [ 1198: 1199] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:01.141608 754374 usertrap_amd64.go:122] [ 1198: 1199] Allocate a new trap: 0xc000ee1290 13 D0712 23:59:01.141630 754374 usertrap_amd64.go:225] [ 1198: 1199] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 23:59:01.141655 754374 task_signals.go:470] [ 1198: 1198] Notified of signal 23 D0712 23:59:01.141724 754374 task_signals.go:220] [ 1198: 1198] Signal 23: delivering to handler D0712 23:59:01.149585 754374 usertrap_amd64.go:212] [ 1198: 1198] Found the pattern at ip 46ae44:sysno 231 D0712 23:59:01.149638 754374 usertrap_amd64.go:122] [ 1198: 1198] Allocate a new trap: 0xc000ee1290 14 D0712 23:59:01.149656 754374 usertrap_amd64.go:225] [ 1198: 1198] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 23:59:01.149779 754374 task_exit.go:204] [ 1198: 1198] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.149828 754374 task_exit.go:204] [ 1198: 1198] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.149853 754374 task_signals.go:204] [ 1198: 1200] Signal 1198, PID: 1200, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.149852 754374 task_signals.go:204] [ 1198: 1202] Signal 1198, PID: 1202, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.149888 754374 task_signals.go:204] [ 1198: 1199] Signal 1198, PID: 1199, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.149899 754374 task_exit.go:204] [ 1198: 1200] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.149939 754374 task_signals.go:204] [ 1198: 1201] Signal 1198, PID: 1201, TID: 0, fault addr: 0x9: terminating thread group D0712 23:59:01.149977 754374 task_exit.go:204] [ 1198: 1200] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.149989 754374 task_exit.go:204] [ 1198: 1200] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.150006 754374 task_exit.go:204] [ 1198: 1202] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.150022 754374 task_exit.go:204] [ 1198: 1202] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.150032 754374 task_exit.go:204] [ 1198: 1202] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.150059 754374 task_exit.go:204] [ 1198: 1199] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.150072 754374 task_exit.go:204] [ 1198: 1199] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.150079 754374 task_exit.go:204] [ 1198: 1199] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.150090 754374 task_exit.go:204] [ 1198: 1201] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 23:59:01.151271 754374 task_exit.go:204] [ 1198: 1201] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 23:59:01.151440 754374 task_exit.go:204] [ 1198: 1201] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.151507 754374 task_signals.go:470] [ 5: 5] Notified of signal 17 D0712 23:59:01.151601 754374 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0712 23:59:01.151615 754374 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0712 23:59:01.151780 754374 task_exit.go:204] [ 1198: 1198] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 23:59:01.152653 754374 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 23:59:01.154484 754374 syscalls.go:262] [ 1203: 1203] Allocating stack with size of 8388608 bytes D0712 23:59:01.154613 754374 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 23:59:01.156147 754374 usertrap_amd64.go:212] [ 1203: 1203] Found the pattern at ip 46b70f:sysno 204 D0712 23:59:01.156194 754374 usertrap_amd64.go:106] [ 1203: 1203] Map a usertrap vma at 60000 D0712 23:59:01.156319 754374 usertrap_amd64.go:122] [ 1203: 1203] Allocate a new trap: 0xc0023710e0 1 D0712 23:59:01.156358 754374 usertrap_amd64.go:225] [ 1203: 1203] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 23:59:01.157528 754374 usertrap_amd64.go:212] [ 1203: 1203] Found the pattern at ip 46ae93:sysno 257 D0712 23:59:01.157557 754374 usertrap_amd64.go:122] [ 1203: 1203] Allocate a new trap: 0xc0023710e0 2 D0712 23:59:01.157571 754374 usertrap_amd64.go:225] [ 1203: 1203] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 23:59:01.158342 754374 usertrap_amd64.go:212] [ 1203: 1203] Found the pattern at ip 46b41d:sysno 9 D0712 23:59:01.158369 754374 usertrap_amd64.go:122] [ 1203: 1203] Allocate a new trap: 0xc0023710e0 3 D0712 23:59:01.158385 754374 usertrap_amd64.go:225] [ 1203: 1203] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 23:59:01.165129 754374 usertrap_amd64.go:212] [ 1203: 1203] Found the pattern at ip 46b1d3:sysno 14 D0712 23:59:01.165186 754374 usertrap_amd64.go:122] [ 1203: 1203] Allocate a new trap: 0xc0023710e0 4 D0712 23:59:01.165213 754374 usertrap_amd64.go:225] [ 1203: 1203] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 23:59:01.166691 754374 usertrap_amd64.go:212] [ 1203: 1203] Found the pattern at ip 46afa0:sysno 186 D0712 23:59:01.166737 754374 usertrap_amd64.go:122] [ 1203: 1203] Allocate a new trap: 0xc0023710e0 5 D0712 23:59:01.166756 754374 usertrap_amd64.go:225] [ 1203: 1203] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 23:59:01.166829 754374 usertrap_amd64.go:212] [ 1203: 1203] Found the pattern at ip 46b214:sysno 13 D0712 23:59:01.166846 754374 usertrap_amd64.go:122] [ 1203: 1203] Allocate a new trap: 0xc0023710e0 6 D0712 23:59:01.166855 754374 usertrap_amd64.go:225] [ 1203: 1203] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 23:59:01.167369 754374 usertrap_amd64.go:212] [ 1203: 1203] Found the pattern at ip 46b5eb:sysno 56 D0712 23:59:01.167400 754374 usertrap_amd64.go:122] [ 1203: 1203] Allocate a new trap: 0xc0023710e0 7 D0712 23:59:01.167414 754374 usertrap_amd64.go:225] [ 1203: 1203] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 23:59:01.167598 754374 usertrap_amd64.go:212] [ 1203: 1204] Found the pattern at ip 46b60c:sysno 186 D0712 23:59:01.167618 754374 usertrap_amd64.go:122] [ 1203: 1204] Allocate a new trap: 0xc0023710e0 8 D0712 23:59:01.167629 754374 usertrap_amd64.go:225] [ 1203: 1204] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 23:59:01.167817 754374 usertrap_amd64.go:212] [ 1203: 1204] Found the pattern at ip 46af76:sysno 35 D0712 23:59:01.167837 754374 usertrap_amd64.go:122] [ 1203: 1204] Allocate a new trap: 0xc0023710e0 9 D0712 23:59:01.167846 754374 usertrap_amd64.go:225] [ 1203: 1204] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 23:59:01.167944 754374 usertrap_amd64.go:212] [ 1203: 1203] Found the pattern at ip 46b57c:sysno 202 D0712 23:59:01.167991 754374 usertrap_amd64.go:122] [ 1203: 1203] Allocate a new trap: 0xc0023710e0 10 D0712 23:59:01.168040 754374 usertrap_amd64.go:225] [ 1203: 1203] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 23:59:01.176213 754374 usertrap_amd64.go:212] [ 1203: 1203] Found the pattern at ip 46af29:sysno 293 D0712 23:59:01.176242 754374 usertrap_amd64.go:122] [ 1203: 1203] Allocate a new trap: 0xc0023710e0 11 D0712 23:59:01.176253 754374 usertrap_amd64.go:225] [ 1203: 1203] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 23:59:01.178356 754374 usertrap_amd64.go:212] [ 1203: 1204] Found the pattern at ip 46b020:sysno 39 D0712 23:59:01.178393 754374 usertrap_amd64.go:122] [ 1203: 1204] Allocate a new trap: 0xc0023710e0 12 D0712 23:59:01.178406 754374 usertrap_amd64.go:225] [ 1203: 1204] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 23:59:01.178481 754374 usertrap_amd64.go:212] [ 1203: 1204] Found the pattern at ip 46b04f:sysno 234 D0712 23:59:01.178520 754374 usertrap_amd64.go:122] [ 1203: 1204] Allocate a new trap: 0xc0023710e0 13 D0712 23:59:01.178544 754374 usertrap_amd64.go:225] [ 1203: 1204] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 23:59:01.178598 754374 task_signals.go:470] [ 1203: 1203] Notified of signal 23 D0712 23:59:01.178668 754374 task_signals.go:220] [ 1203: 1203] Signal 23: delivering to handler D0712 23:59:01.187354 754374 task_signals.go:309] [ 1203: 1203] failed to restore from a signal frame: bad address D0712 23:59:01.187413 754374 task_signals.go:470] [ 1203: 1203] Notified of signal 11 D0712 23:59:01.187433 754374 task_signals.go:220] [ 1203: 1203] Signal 11: delivering to handler W0712 23:59:01.222193 754490 util.go:64] FATAL ERROR: waiting on pid 5: waiting on PID 5 in sandbox "ci-gvisor-systrap-1-test-1": urpc method "containerManager.WaitPID" failed: EOF waiting on pid 5: waiting on PID 5 in sandbox "ci-gvisor-systrap-1-test-1": urpc method "containerManager.WaitPID" failed: EOF W0712 23:59:01.222353 754490 main.go:274] Failure to execute command, err: 1 W0712 23:59:01.232876 754364 sandbox.go:1111] Wait RPC to container "ci-gvisor-systrap-1-test-1" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. D0712 23:59:01.232847 1 connection.go:127] sock read failed, closing connection: EOF I0712 23:59:01.233028 1 gofer.go:319] All lisafs servers exited. I0712 23:59:01.233109 1 main.go:265] Exiting with status: 0 D0712 23:59:01.240293 754364 container.go:771] Destroy container, cid: ci-gvisor-systrap-1-test-1 D0712 23:59:01.240383 754364 container.go:1007] Destroying container, cid: ci-gvisor-systrap-1-test-1 D0712 23:59:01.240392 754364 sandbox.go:1403] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-test-1 D0712 23:59:01.240408 754364 sandbox.go:1153] Destroying sandbox "ci-gvisor-systrap-1-test-1" D0712 23:59:01.240488 754364 container.go:1021] Killing gofer for container, cid: ci-gvisor-systrap-1-test-1, PID: 754370 D0712 23:59:01.253120 754364 cgroup.go:549] Deleting cgroup "ci-gvisor-systrap-1-test-1" D0712 23:59:01.253185 754364 cgroup.go:557] Removing cgroup controller for key="net_cls" path="/sys/fs/cgroup/net_cls/ci-gvisor-systrap-1-test-1" D0712 23:59:01.253291 754364 cgroup.go:557] Removing cgroup controller for key="devices" path="/sys/fs/cgroup/devices/ci-gvisor-systrap-1-test-1" D0712 23:59:01.253307 754364 cgroup.go:557] Removing cgroup controller for key="cpu" path="/sys/fs/cgroup/cpu/ci-gvisor-systrap-1-test-1" D0712 23:59:01.253317 754364 cgroup.go:557] Removing cgroup controller for key="net_prio" path="/sys/fs/cgroup/net_prio/ci-gvisor-systrap-1-test-1" D0712 23:59:01.253326 754364 cgroup.go:557] Removing cgroup controller for key="pids" path="/sys/fs/cgroup/pids/ci-gvisor-systrap-1-test-1" D0712 23:59:01.253335 754364 cgroup.go:557] Removing cgroup controller for key="rdma" path="/sys/fs/cgroup/rdma/ci-gvisor-systrap-1-test-1" D0712 23:59:01.253344 754364 cgroup.go:557] Removing cgroup controller for key="cpuacct" path="/sys/fs/cgroup/cpuacct/ci-gvisor-systrap-1-test-1" D0712 23:59:01.253353 754364 cgroup.go:557] Removing cgroup controller for key="freezer" path="/sys/fs/cgroup/freezer/ci-gvisor-systrap-1-test-1" D0712 23:59:01.253363 754364 cgroup.go:557] Removing cgroup controller for key="perf_event" path="/sys/fs/cgroup/perf_event/ci-gvisor-systrap-1-test-1" D0712 23:59:01.253386 754364 cgroup.go:557] Removing cgroup controller for key="blkio" path="/sys/fs/cgroup/blkio/ci-gvisor-systrap-1-test-1" D0712 23:59:01.253402 754364 cgroup.go:557] Removing cgroup controller for key="cpuset" path="/sys/fs/cgroup/cpuset/ci-gvisor-systrap-1-test-1" D0712 23:59:01.253411 754364 cgroup.go:557] Removing cgroup controller for key="memory" path="/sys/fs/cgroup/memory/ci-gvisor-systrap-1-test-1" D0712 23:59:01.253420 754364 cgroup.go:557] Removing cgroup controller for key="systemd" path="/sys/fs/cgroup/systemd/ci-gvisor-systrap-1-test-1" I0712 23:59:01.253858 754364 main.go:265] Exiting with status: 9 VM DIAGNOSIS: I0712 23:59:01.273934 754808 main.go:230] *************************** I0712 23:59:01.274012 754808 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-test-1] I0712 23:59:01.274051 754808 main.go:232] Version 0.0.0 I0712 23:59:01.274069 754808 main.go:233] GOOS: linux I0712 23:59:01.274087 754808 main.go:234] GOARCH: amd64 I0712 23:59:01.274104 754808 main.go:235] PID: 754808 I0712 23:59:01.274122 754808 main.go:236] UID: 0, GID: 0 I0712 23:59:01.274151 754808 main.go:237] Configuration: I0712 23:59:01.274170 754808 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root I0712 23:59:01.274200 754808 main.go:239] Platform: systrap I0712 23:59:01.274218 754808 main.go:240] FileAccess: shared I0712 23:59:01.274238 754808 main.go:241] Directfs: true I0712 23:59:01.274265 754808 main.go:242] Overlay: none I0712 23:59:01.274293 754808 main.go:243] Network: sandbox, logging: false I0712 23:59:01.274329 754808 main.go:244] Strace: false, max size: 1024, syscalls: I0712 23:59:01.274364 754808 main.go:245] IOURING: false I0712 23:59:01.274386 754808 main.go:246] Debug: true I0712 23:59:01.274403 754808 main.go:247] Systemd: false I0712 23:59:01.274428 754808 main.go:248] *************************** D0712 23:59:01.274488 754808 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-test-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0712 23:59:01.274615 754808 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-test-1": file does not exist loading container "ci-gvisor-systrap-1-test-1": file does not exist W0712 23:59:01.274722 754808 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-gso=false" "-net-raw" "-watchdog-action=panic" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-test-1"]: exit status 128 I0712 23:59:01.273934 754808 main.go:230] *************************** I0712 23:59:01.274012 754808 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-test-1] I0712 23:59:01.274051 754808 main.go:232] Version 0.0.0 I0712 23:59:01.274069 754808 main.go:233] GOOS: linux I0712 23:59:01.274087 754808 main.go:234] GOARCH: amd64 I0712 23:59:01.274104 754808 main.go:235] PID: 754808 I0712 23:59:01.274122 754808 main.go:236] UID: 0, GID: 0 I0712 23:59:01.274151 754808 main.go:237] Configuration: I0712 23:59:01.274170 754808 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root I0712 23:59:01.274200 754808 main.go:239] Platform: systrap I0712 23:59:01.274218 754808 main.go:240] FileAccess: shared I0712 23:59:01.274238 754808 main.go:241] Directfs: true I0712 23:59:01.274265 754808 main.go:242] Overlay: none I0712 23:59:01.274293 754808 main.go:243] Network: sandbox, logging: false I0712 23:59:01.274329 754808 main.go:244] Strace: false, max size: 1024, syscalls: I0712 23:59:01.274364 754808 main.go:245] IOURING: false I0712 23:59:01.274386 754808 main.go:246] Debug: true I0712 23:59:01.274403 754808 main.go:247] Systemd: false I0712 23:59:01.274428 754808 main.go:248] *************************** D0712 23:59:01.274488 754808 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-test-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0712 23:59:01.274615 754808 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-test-1": file does not exist loading container "ci-gvisor-systrap-1-test-1": file does not exist W0712 23:59:01.274722 754808 main.go:274] Failure to execute command, err: 1 [11530654.559543] exe[342712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530659.371355] warn_bad_vsyscall: 277 callbacks suppressed [11530659.371358] exe[343333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530659.693220] exe[343104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.085260] exe[347627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.158793] exe[342775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.193093] exe[343104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f7e858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.299243] exe[360483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.334869] exe[346201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.427124] exe[342702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.530670] exe[342714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.552515] exe[342714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530664.410846] warn_bad_vsyscall: 191 callbacks suppressed [11530664.410850] exe[347076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.517388] exe[342763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.614182] exe[343158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.693391] exe[346626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.880133] exe[342939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530665.104198] exe[343334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.164041] exe[343334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.189874] exe[342775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.263975] exe[342775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.325499] exe[343333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11531647.091724] warn_bad_vsyscall: 119 callbacks suppressed [11531647.091728] exe[342711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb069858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.193212] exe[342712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb069858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.268456] exe[342979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.288424] exe[342975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.308161] exe[342944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.334261] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.355824] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.376295] exe[342993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.396210] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.417266] exe[342763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11532345.155341] warn_bad_vsyscall: 25 callbacks suppressed [11532345.155345] exe[382188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532345.269530] exe[382766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532345.386757] exe[382474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532767.935456] exe[384598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11532768.011945] exe[342758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11532768.091418] exe[363806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11534667.144948] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.236329] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.267961] exe[403010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.372458] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.408027] exe[400419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534894.914638] exe[383063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beadbee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.957554] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.977138] exe[386963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.997745] exe[383054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.019118] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.038723] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.059007] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.079097] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.098979] exe[386963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.118890] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11535893.406581] warn_bad_vsyscall: 25 callbacks suppressed [11535893.406585] exe[518174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.458729] exe[498396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.521164] exe[517163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.575499] exe[517648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11536070.313225] exe[517933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.380260] exe[515339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.442300] exe[515436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.505325] exe[517933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536370.456183] exe[527170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.586537] exe[514004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53fbc858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.694198] exe[527281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.737448] exe[527170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11537650.136338] exe[430654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11537650.412774] exe[548543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11537651.379743] exe[544871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11539350.089743] exe[592292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fee1a62839 cs:33 sp:7f3bb8f66858 ax:0 si:55fee1abb062 di:ffffffffff600000 [11539649.231607] exe[597310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539649.290920] exe[596254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539649.347494] exe[596254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539977.040247] exe[600851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622cbba1839 cs:33 sp:7ef62f826858 ax:0 si:5622cbbfa070 di:ffffffffff600000 [11540511.026519] exe[600753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605abe9b839 cs:33 sp:7ea0b2c49858 ax:0 si:5605abef4062 di:ffffffffff600000 [11540577.627218] exe[580995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb471858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11540577.675057] exe[580995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb471858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11540577.720870] exe[580996] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb450858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11541137.236749] exe[631001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8df4a8839 cs:33 sp:7ec367e7b858 ax:0 si:55d8df501070 di:ffffffffff600000 [11541804.084586] exe[636938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11541807.009172] exe[573192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11541807.193016] exe[624964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11542822.267208] exe[615762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.447533] exe[615762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.599315] exe[608247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.654857] exe[608085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff2b858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542974.046947] exe[681952] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4cbdf3839 cs:33 sp:7ec21f245858 ax:0 si:55f4cbe4c070 di:ffffffffff600000 [11542975.617308] exe[681959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bdb6b73839 cs:33 sp:7ea1e721f858 ax:0 si:55bdb6bcc070 di:ffffffffff600000 [11543003.003275] exe[680745] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f039ea839 cs:33 sp:7f52e9f8c858 ax:0 si:560f03a43070 di:ffffffffff600000 [11543004.857028] exe[674098] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5cc9b839 cs:33 sp:7fc8cf3fe858 ax:0 si:564a5ccf4070 di:ffffffffff600000 [11543241.124326] exe[653510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543241.246077] exe[670164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543242.057149] exe[665681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543265.859323] exe[669905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.014563] exe[673318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.109923] exe[655556] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.226266] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.340307] exe[666615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.438645] exe[653578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.550820] exe[653447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.639930] exe[668546] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543527.564952] exe[682036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d85dfee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.843021] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.872086] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.901814] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.928287] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.960260] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.001419] exe[686062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.037270] exe[686072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.072724] exe[684288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.101714] exe[684288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11544123.311129] warn_bad_vsyscall: 43 callbacks suppressed [11544123.311132] exe[696458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.485832] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.545188] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.727586] exe[694132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544124.057735] exe[696402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.305506] exe[651414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.507382] exe[669629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.623230] exe[695057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544124.735692] exe[694132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544124.863236] exe[665545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544128.352152] warn_bad_vsyscall: 20 callbacks suppressed [11544128.352155] exe[671775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544128.511425] exe[696712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.375128] exe[653165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.536371] exe[653165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.698008] exe[653586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.893888] exe[668891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544130.031510] exe[696458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544130.130359] exe[673044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544130.235880] exe[668891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544130.352844] exe[672186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.353612] warn_bad_vsyscall: 24 callbacks suppressed [11544133.353615] exe[668506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.473154] exe[668506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.609419] exe[668533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.901016] exe[696718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.174452] exe[666489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.475583] exe[668888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.623602] exe[651414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.772637] exe[696477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.888566] exe[670834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.988750] exe[697893] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544138.414937] warn_bad_vsyscall: 63 callbacks suppressed [11544138.414941] exe[691644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.523964] exe[680995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.625852] exe[696345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.629193] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.773793] exe[694608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.889988] exe[671086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.995711] exe[656008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.279460] exe[653157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.285732] exe[651351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.852350] exe[702011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.530343] warn_bad_vsyscall: 21 callbacks suppressed [11544143.530346] exe[669928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.650402] exe[651695] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.841742] exe[691644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.870995] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.902268] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.948343] exe[691663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.989607] exe[691663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.024048] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.054902] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.087224] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544148.632017] warn_bad_vsyscall: 172 callbacks suppressed [11544148.632020] exe[669150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.794259] exe[668957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.989109] exe[668900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.994476] exe[668888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.214390] exe[700441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.375421] exe[677325] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.743745] exe[651266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.292722] exe[694622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.474228] exe[681023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.637207] exe[681023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544153.658144] warn_bad_vsyscall: 27 callbacks suppressed [11544153.658148] exe[653423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.777426] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.903906] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.947438] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.109460] exe[660365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.158525] exe[653490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.258820] exe[651422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.391447] exe[669928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.603018] exe[653409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.651409] exe[653440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544158.817051] warn_bad_vsyscall: 88 callbacks suppressed [11544158.817054] exe[694623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.075950] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.301459] exe[696410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.392503] exe[694615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.536699] exe[694622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.643218] exe[693490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.745653] exe[687494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.834437] exe[669163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544159.940422] exe[693510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544160.043187] exe[673283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.101141] warn_bad_vsyscall: 21 callbacks suppressed [11544164.101144] exe[668876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.241344] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.416813] exe[696415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.572347] exe[653157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.661162] exe[700444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.764040] exe[665928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.860384] exe[665956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.967054] exe[651351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544165.069729] exe[696446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544165.167820] exe[667801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.171621] warn_bad_vsyscall: 29 callbacks suppressed [11544169.171624] exe[666533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.209223] exe[694404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.345652] exe[694608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.449276] exe[666863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.579999] exe[652022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.628929] exe[681862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.748025] exe[694768] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.754710] exe[651361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544170.115853] exe[695045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544170.211267] exe[694614] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544487.006009] warn_bad_vsyscall: 7 callbacks suppressed [11544487.006013] exe[698657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56475d423839 cs:33 sp:7f017362b858 ax:0 si:56475d47c070 di:ffffffffff600000 [11544487.270484] exe[700399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563181efe839 cs:33 sp:7ebe85da1858 ax:0 si:563181f57070 di:ffffffffff600000 [11544511.054844] exe[643613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55671700d839 cs:33 sp:7fda3ebc7858 ax:0 si:556717066070 di:ffffffffff600000 [11544534.538680] exe[711402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650b2e68839 cs:33 sp:7ed2418f9858 ax:0 si:5650b2ec1070 di:ffffffffff600000 [11544541.236335] exe[714082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec31b7839 cs:33 sp:7f29fcf9d858 ax:0 si:563ec3210070 di:ffffffffff600000 [11544549.596877] exe[709232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d85df858 ax:0 si:55f2a8264070 di:ffffffffff600000 [11544550.342713] exe[712067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cd4032839 cs:33 sp:7fe3bd6b3858 ax:0 si:564cd408b070 di:ffffffffff600000 [11544636.437853] exe[540397] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df21791839 cs:33 sp:7f199a286858 ax:0 si:55df217ea070 di:ffffffffff600000 [11544650.761105] exe[680687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353ec858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.648325] exe[680729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353ec858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.692536] exe[680687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353cb858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.806399] exe[654057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353cb858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544684.382904] exe[599414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f284d4839 cs:33 sp:7f961e482858 ax:0 si:556f2852d070 di:ffffffffff600000 [11544687.601444] exe[605347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557bb1bb839 cs:33 sp:7eccd13f5858 ax:0 si:5557bb214070 di:ffffffffff600000 [11545051.986254] exe[681960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4cbdf3839 cs:33 sp:7ec21f245858 ax:0 si:55f4cbe4c070 di:ffffffffff600000 [11545064.270053] exe[698660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b51fb0839 cs:33 sp:7f9c7caaf858 ax:0 si:560b52009070 di:ffffffffff600000 [11545068.988305] exe[688573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564928b3b839 cs:33 sp:7ff955622858 ax:0 si:564928b94070 di:ffffffffff600000 [11545109.002939] exe[700093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5cc9b839 cs:33 sp:7fc8cf3fe858 ax:0 si:564a5ccf4070 di:ffffffffff600000 [11545257.023788] exe[699969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858858 ax:0 si:56468e7be070 di:ffffffffff600000 [11545310.043985] exe[730419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079858 ax:0 si:559d6ffcd070 di:ffffffffff600000 [11545747.024880] exe[668885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.207869] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.208393] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.369587] exe[698981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.086072] exe[694611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.276578] exe[655585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.440844] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.661991] exe[651380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.864051] exe[691659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.032545] exe[669495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.180256] exe[668971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.327971] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.464233] exe[653467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.608138] exe[694611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.724053] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.821867] exe[673278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545752.940728] exe[695059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545753.257832] exe[690707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545753.288251] exe[694599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.081142] warn_bad_vsyscall: 180 callbacks suppressed [11545757.081146] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.214468] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.680818] exe[660360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545757.976248] exe[669152] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.152711] exe[673009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db06858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.411760] exe[666512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.527446] exe[666632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.650734] exe[670178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.653643] exe[696363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.792891] exe[666858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.314186] warn_bad_vsyscall: 20 callbacks suppressed [11545762.314189] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.467684] exe[670066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.649946] exe[673641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.943504] exe[660379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.043408] exe[669128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.327908] exe[669526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.366578] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.522288] exe[669522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545764.352902] exe[696365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545764.927217] exe[668856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.329883] warn_bad_vsyscall: 19 callbacks suppressed [11545767.329886] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.356567] exe[696345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.513570] exe[697884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.562772] exe[670199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.711961] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545767.846666] exe[673281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545767.887751] exe[673284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.020071] exe[666647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.057366] exe[666647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.194079] exe[677299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545895.545245] warn_bad_vsyscall: 20 callbacks suppressed [11545895.545249] exe[720805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858ee8 ax:0 si:200001c0 di:ffffffffff600000 [11545895.697993] exe[720805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858ee8 ax:0 si:200001c0 di:ffffffffff600000 [11545895.785536] exe[721585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c837ee8 ax:0 si:200001c0 di:ffffffffff600000 [11546263.751083] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cde2ee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546264.760352] exe[750487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cd5eee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546264.909919] exe[733995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cde2ee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546785.957834] exe[722877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11546786.864503] exe[719747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11546787.823769] exe[718998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11547088.502200] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547088.547606] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547088.594335] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.508654] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.559999] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.608707] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.659695] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.718362] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.781423] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.831867] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.888097] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.977889] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547100.030632] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547104.513495] warn_bad_vsyscall: 291 callbacks suppressed [11547104.513499] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.539086] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.559309] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.578791] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.599547] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.620080] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.640504] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.659820] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.679561] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.700181] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547109.524219] warn_bad_vsyscall: 177 callbacks suppressed [11547109.524223] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.571444] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.623374] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.666991] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.687953] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.739406] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.781901] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.828639] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.849421] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.897272] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.703281] warn_bad_vsyscall: 176 callbacks suppressed [11547226.703285] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.750753] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.799595] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.236010] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.275452] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.317150] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.312120] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.354274] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.397972] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.426494] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.481647] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.534048] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547286.183628] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.224975] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.249969] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.292623] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547292.084095] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547292.127160] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547292.168264] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.584508] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.638463] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.658311] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.678417] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.699893] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.719994] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.740570] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.761543] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.782276] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.803395] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.755488] warn_bad_vsyscall: 32 callbacks suppressed [11547304.755491] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.820801] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.870285] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547305.231833] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547306.080890] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547306.932040] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.868022] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.927403] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.983135] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547309.035076] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.512279] warn_bad_vsyscall: 3 callbacks suppressed [11547312.512283] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.573549] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.593042] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.613765] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.634451] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.654831] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.674844] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.695789] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.716034] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.735650] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.072811] warn_bad_vsyscall: 25 callbacks suppressed [11547323.072814] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.126130] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.168909] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.169422] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.577119] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.618137] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.659742] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.430811] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.470418] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.471364] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.540794] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.575387] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.234296] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.287869] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.341084] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547333.150024] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547333.197367] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.613691] warn_bad_vsyscall: 1 callbacks suppressed [11547359.613695] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.673012] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.722811] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.747468] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.889779] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.945222] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.980565] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547371.026574] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547381.799394] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.864307] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.906009] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.933118] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547384.896734] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547384.942724] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547385.004823] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547394.986983] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547395.029433] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547395.072479] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.899409] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.945764] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.998894] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547402.412281] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.457209] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.458646] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.539688] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.539824] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547414.727517] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.524355] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.575392] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.624984] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.681183] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.722741] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.761925] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.879392] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.921135] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.960705] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.692664] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.746736] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.780646] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.157398] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.227524] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.267610] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.241019] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.314637] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.354549] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.400116] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.441352] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.461983] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.499263] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.711900] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.766945] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.815670] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.678890] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.727877] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.747719] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.767929] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.788113] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.807588] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.826881] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.107205] warn_bad_vsyscall: 63 callbacks suppressed [11547478.107208] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.164816] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.204636] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.384520] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.441631] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.483337] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.658315] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547498.516799] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.368994] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.390429] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.411047] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.430939] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.452865] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547504.945209] warn_bad_vsyscall: 28 callbacks suppressed [11547504.945212] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547504.998022] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547505.038001] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.867524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.912298] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.955068] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.977045] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547536.142402] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547536.183582] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547536.217323] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.569508] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.614546] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.663836] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547538.951959] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.000244] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.081981] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.997217] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547564.887928] warn_bad_vsyscall: 69 callbacks suppressed [11547564.887932] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547564.979509] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.178943] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.229576] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.296841] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.055098] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.108833] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.156638] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.185291] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.306678] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.358066] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.406256] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.036059] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.086889] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.108968] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.156744] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.880353] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.931926] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.953668] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.989459] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.559099] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.600969] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.648685] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.670795] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.298350] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.336522] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.375194] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547619.302393] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547619.356222] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547619.395199] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547628.124097] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.175121] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.195646] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.242715] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.055190] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.102818] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.146651] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.408345] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.450251] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.489444] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.515277] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.494419] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.543322] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.564399] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.602948] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.605910] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.679150] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.726624] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547662.729392] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547662.772014] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547662.817232] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547666.997387] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547667.036554] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547667.076179] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547671.948193] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547671.996557] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547672.038514] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547672.039086] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547673.715197] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.774874] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.796267] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.836633] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547696.173266] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.232828] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.255864] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.294590] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.314254] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.335246] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.355631] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.376818] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.396933] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.417149] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.297493] warn_bad_vsyscall: 65 callbacks suppressed [11547715.297496] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.351733] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.396006] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.417741] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.369570] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.412168] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.433703] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.476531] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.185928] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.229580] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.267114] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.034535] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.079956] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.081096] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.142656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.827814] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.871810] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.895490] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.935407] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.937018] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.115105] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.155340] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.179243] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.226345] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.556996] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.594141] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.641491] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.738092] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.785040] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.827300] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.849354] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.631390] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.672124] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.713813] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.715026] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.110481] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.167223] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.188945] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.209538] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.229116] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.248124] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547785.250849] warn_bad_vsyscall: 39 callbacks suppressed [11547785.250853] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.017175] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.058414] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.098809] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.452423] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.491354] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.530741] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.157406] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.405882] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.569025] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.689830] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.730995] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.770001] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.771515] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547812.197802] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547812.267933] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547812.268869] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547813.941768] warn_bad_vsyscall: 5 callbacks suppressed [11547813.941772] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547813.985351] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.023826] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.283366] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.373377] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.430322] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.428583] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.479106] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.517226] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547821.217341] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.304135] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.358901] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.381326] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.403008] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.917629] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547822.010021] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.374491] warn_bad_vsyscall: 6 callbacks suppressed [11547838.374495] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.433268] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.487754] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.517159] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.542981] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.594031] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.633861] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547847.990984] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.047899] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.090172] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.278529] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.318322] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.357865] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.656438] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.696366] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.730899] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547851.240037] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.042222] warn_bad_vsyscall: 2 callbacks suppressed [11547866.042225] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.098981] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.161778] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.079020] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.130030] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.184976] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.225662] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.268419] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.320362] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.047221] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.096888] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.137370] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.386318] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.432437] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.486510] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547884.683356] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547884.762816] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547884.813991] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.189876] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.254562] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.293397] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547903.407887] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.447383] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.470252] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.506155] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.721533] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.782550] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.820577] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.096045] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.142337] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.161621] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547911.216020] warn_bad_vsyscall: 64 callbacks suppressed [11547911.216024] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547911.267332] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547911.307191] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547912.057581] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.095772] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.097086] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.157993] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547913.388972] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547913.423889] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547913.465344] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547924.521450] warn_bad_vsyscall: 5 callbacks suppressed [11547924.521454] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.577796] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.602125] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.641611] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.133391] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.194823] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.197273] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.263427] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.418619] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.475719] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.543133] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.125423] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.228337] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.688513] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.730652] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.766521] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.807188] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.851432] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.871960] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.914064] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.259541] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.337004] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.398917] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.978258] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.026688] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.029306] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.092103] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.100263] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.144346] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.174814] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.211169] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.832995] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.876208] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.898352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.934693] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.414771] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.456497] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.496767] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.291929] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.329604] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.369969] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.372328] warn_bad_vsyscall: 3 callbacks suppressed [11547989.372332] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.421337] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.465823] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.485942] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.841813] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.890432] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.943125] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.261522] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.301370] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.342764] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.299293] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.345532] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.381167] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.818109] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.874942] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.929681] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548017.498804] exe[756718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.546061] exe[755951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.589351] exe[755959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.635935] exe[756718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dfd5ee8 ax:0 si:20000680 di:ffffffffff600000 [11548019.396684] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548019.444824] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548019.480770] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.067924] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.105876] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.106597] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.730218] warn_bad_vsyscall: 5 callbacks suppressed [11548023.730221] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.775332] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.815656] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.219256] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.300235] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.347676] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548044.947538] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548044.999970] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548045.040895] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548045.069553] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.004537] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.049080] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.113890] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.137352] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548077.206282] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.251934] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.274716] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.295013] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.315325] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.336012] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.357843] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.377872] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.398283] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.418613] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548097.528517] warn_bad_vsyscall: 57 callbacks suppressed [11548097.528521] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.576429] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.633295] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.634854] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.133965] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.176503] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.214588] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.215240] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.412752] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.462777] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548104.996660] warn_bad_vsyscall: 1 callbacks suppressed [11548104.996663] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548105.850076] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548106.696238] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.157724] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.208597] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.261372] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.343202] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.382779] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.426112] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.403368] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.452789] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.499910] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548137.417742] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548137.522190] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548139.936100] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548139.988256] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548140.016505] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548140.070003] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.445818] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.511715] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.553978] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.286390] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.334009] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.375931] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548175.546300] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.589700] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.629037] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.651488] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548179.585264] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.631159] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.650585] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.670448] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.691290] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.711967] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.732380] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.752068] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.772801] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.793448] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548193.872059] warn_bad_vsyscall: 61 callbacks suppressed [11548193.872063] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548193.952821] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548201.928684] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548201.996448] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548202.037007] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.156027] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.196959] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.219143] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.258912] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.281350] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.546657] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.589787] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.627425] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.699725] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.745535] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.788742] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.471018] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.514946] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.515574] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.585099] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.038187] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.079907] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.127070] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.182158] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.221914] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.242963] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.281592] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.367833] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.410279] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.431732] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.485658] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.287473] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.328228] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.378594] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.674482] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.723577] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.769676] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.411340] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.454118] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.496501] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.637682] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.680537] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.717881] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.175744] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.244740] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.289491] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.347827] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.386962] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.432610] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.452510] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.472049] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.493392] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.514001] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.534326] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.555439] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.575831] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548299.591661] warn_bad_vsyscall: 28 callbacks suppressed [11548299.591664] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548299.716645] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.218082] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.333278] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.369844] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.445978] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.012030] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.078579] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.134946] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.388423] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.442059] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.509579] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.182613] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.228614] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.249852] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.270396] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.080494] warn_bad_vsyscall: 69 callbacks suppressed [11548311.080498] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.131994] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.183761] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.207733] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548326.195752] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.033861] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.883771] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.718811] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.764692] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.802193] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.003147] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.061042] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.083321] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.123123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.557059] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.614792] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.654451] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.900936] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.950630] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548350.007839] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.826680] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.880328] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.934074] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.272328] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.322197] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.361580] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.288522] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.327273] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.370594] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.489698] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.541048] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.609626] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.631505] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.250609] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.296008] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.297139] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.354078] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.375823] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.830961] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.909476] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.972469] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.174820] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.216089] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548391.283262] warn_bad_vsyscall: 1 callbacks suppressed [11548391.283264] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.329989] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.374640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548393.205978] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.255260] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.299080] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.344484] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.405320] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.464950] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.467363] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.255243] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.318628] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.319151] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.399578] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.401766] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.568699] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.919607] warn_bad_vsyscall: 3 callbacks suppressed [11548416.919610] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.966950] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.989006] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548417.034408] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.811451] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.860253] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.886942] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.928112] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.778887] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.820893] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.842334] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880084] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880903] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.508111] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.601445] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.602653] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.704447] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.705345] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.826999] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872284] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872375] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.986065] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.258456] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.300258] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.349378] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548474.517614] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.564789] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.587128] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.638151] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548480.604311] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.644087] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.687806] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.689290] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548484.123787] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.180672] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.239780] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548493.278360] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328236] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328600] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.390304] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.833382] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.961149] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548509.063948] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548520.613294] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.659518] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.708570] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548526.299866] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.339536] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.402244] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.425302] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.894709] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.938050] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.982622] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.450297] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.505520] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.528534] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.568597] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548544.956800] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.013667] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.033643] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.085490] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548549.234345] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.282824] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.329949] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.534109] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.597324] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.621011] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.681465] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.886217] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.950142] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.998720] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.869926] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.934033] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.955035] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.014796] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.296125] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.353392] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.399746] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548570.911499] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.669130] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.735195] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.776546] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.660338] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.699761] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.746611] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.932572] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.972071] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.994399] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548597.034578] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.022991] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.090767] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.091012] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177700] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177834] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.557153] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.606340] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.653245] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.686798] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.776155] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.819898] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.872777] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.809818] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.860562] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.902531] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.707415] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.760809] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.817281] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.837170] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.856971] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.880580] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.901934] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.921867] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.942728] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.963710] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.234572] warn_bad_vsyscall: 60 callbacks suppressed [11548659.234577] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.319640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.375122] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.395917] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.877517] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.920825] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.942925] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.984794] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548666.639541] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.680685] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.721252] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548685.149430] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.193561] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.234314] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.259938] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.046303] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.090192] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.111864] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.155942] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.597615] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.643566] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.512636] warn_bad_vsyscall: 2 callbacks suppressed [11548693.512640] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.587898] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.622954] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.672410] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.860094] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.898007] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.935962] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.083950] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.139793] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.183343] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.433839] warn_bad_vsyscall: 4 callbacks suppressed [11548701.433843] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.486929] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.525603] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.154317] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.196722] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.240576] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.261222] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.863192] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.911865] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.965656] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.905248] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.941691] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.983975] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.279943] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.327248] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.389725] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.413266] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.107500] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.162576] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.212182] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.593451] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.640310] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.696914] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.087707] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.134560] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.378944] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.423937] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.443330] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.463024] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.482763] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.505914] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.525847] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.546368] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.567195] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.587657] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.371230] warn_bad_vsyscall: 29 callbacks suppressed [11548765.371234] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.416207] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.456858] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.014315] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.053783] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.097156] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548783.841479] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.890700] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.932657] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.698534] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.744861] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.765479] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.802565] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.823701] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548816.611166] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.660003] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.708264] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.616862] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.656506] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.686639] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.730645] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.103497] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.175520] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.217584] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.239654] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.380393] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419346] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419914] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.482312] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.504801] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.673651] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548838.107208] warn_bad_vsyscall: 69 callbacks suppressed [11548838.107211] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.166865] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.212798] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.234075] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.515015] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573192] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573250] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.637396] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.856419] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.903599] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.043501] warn_bad_vsyscall: 3 callbacks suppressed [11548851.043505] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.091113] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.134490] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.651270] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.696335] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.749606] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.916650] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.958708] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548852.000342] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.093160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.147244] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.168810] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.275323] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.795133] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.856035] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.904442] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.933821] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.146784] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.215461] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.263431] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.250299] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.301702] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.322428] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.363670] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.387918] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.562614] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.605694] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.627575] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.667298] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.692069] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.739223] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.784533] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.785479] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.861757] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548914.066544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548920.546376] warn_bad_vsyscall: 3 callbacks suppressed [11548920.546380] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.598743] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.656217] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.789652] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.873526] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.930080] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.662584] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.704522] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.747412] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548941.905328] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.002937] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.026135] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.047304] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.070126] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.093651] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.118417] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.138954] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.161818] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.197908] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548947.008863] warn_bad_vsyscall: 29 callbacks suppressed [11548947.008867] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.117286] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.212764] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.279648] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.345439] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.439123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.226947] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.265920] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.306266] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.023857] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.083854] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.084666] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.162482] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.182136] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.202273] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.225957] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.248936] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.269819] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.291316] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.814852] warn_bad_vsyscall: 61 callbacks suppressed [11548984.814855] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.924203] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548999.981207] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.031437] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.075008] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.490779] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.548739] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.596976] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.622828] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549003.408072] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.450273] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.493544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549011.127750] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.168732] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.204428] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.584759] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.637945] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.661027] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.703124] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.880815] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.931172] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.980221] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.112241] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.159181] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.184471] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.234060] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.289213] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.338880] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.384608] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.697534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.734874] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.790174] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.722197] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.769295] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.813981] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.670371] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.708511] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.749962] exe[743908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.269200] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.317692] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.341079] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.380507] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.807867] warn_bad_vsyscall: 1 callbacks suppressed [11549067.807871] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.870608] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.908220] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.669345] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.711360] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.754534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.604356] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.659869] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.706198] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549089.981820] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.040241] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.062834] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.120102] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549094.367870] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.417816] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.462962] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549096.771134] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.818012] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.868139] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549098.287705] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.335253] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.362160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.411664] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549102.265611] exe[812626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.316062] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.367142] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549103.277443] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.327611] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.372667] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.373629] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549106.101121] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.158749] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.214409] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.203702] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.313805] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.832041] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.896096] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.936191] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.147625] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.194975] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.239317] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.666464] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.709186] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.769134] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.396423] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.447035] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.470585] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.507121] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.469316] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.516733] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.561202] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.841101] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.883653] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.906352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.946285] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.885765] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.938026] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.963555] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.014465] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.831133] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.882033] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.884100] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.956006] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.456966] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.503734] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.962386] warn_bad_vsyscall: 1 callbacks suppressed [11549182.962389] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.012121] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.059746] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.080637] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.284008] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.367576] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.445261] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549193.339186] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.395517] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.461816] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.489679] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.663958] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.712460] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.763669] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.788181] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549207.982095] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.032318] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.053090] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.095858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549213.428629] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.465578] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.503510] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549215.928549] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549216.000149] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549217.237542] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.283499] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.346633] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549219.657475] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.701623] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.741378] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.937988] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.993970] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.015601] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.066260] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.088244] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.744875] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.802594] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.852978] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.853165] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.897681] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.919524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.957057] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549272.386964] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.430873] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.472074] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549284.010961] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.056302] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.080381] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.131020] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.676878] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.732251] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.778232] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549305.996414] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.039916] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.087233] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.108856] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549312.155430] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.212534] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.318757] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549322.225490] exe[762988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562bd7b3c839 cs:33 sp:7fa30ef1dee8 ax:0 si:20000040 di:ffffffffff600000 [11549322.630226] exe[764150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfd46d0839 cs:33 sp:7faa79d58ee8 ax:0 si:20000040 di:ffffffffff600000 [11549324.167848] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.225685] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.290963] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.248247] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.295182] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.339907] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549332.992606] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.032076] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.055923] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.100145] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549335.966184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.011362] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.012156] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.070502] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.114461] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.160317] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549338.584854] warn_bad_vsyscall: 2 callbacks suppressed [11549338.584858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.635465] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.677495] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.698822] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549340.992026] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.047021] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.090860] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.757473] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.798199] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.800483] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549348.007006] warn_bad_vsyscall: 1 callbacks suppressed [11549348.007011] exe[810081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549348.123020] exe[791686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549350.842435] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901911] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901928] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.014907] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.053068] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.180049] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.331135] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.395122] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.416889] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549364.967687] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.283036] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.311226] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.607785] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.633332] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.913539] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.952794] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549371.002201] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.234160] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.271594] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.294407] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.333242] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.357403] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.827451] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.879499] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.902128] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.944274] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.945164] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.055187] exe[801669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed61f88839 cs:33 sp:7fe8832e6ee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.056978] exe[807650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565118c94839 cs:33 sp:7f5e3a4beee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.354001] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.404830] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.452731] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549390.994794] warn_bad_vsyscall: 3 callbacks suppressed [11549390.994799] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.055906] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.103464] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.731184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.798921] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.850231] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549421.224700] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.287217] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.330715] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.332297] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.364793] exe[733349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079ee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.644237] exe[777007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564419386839 cs:33 sp:7f341debdee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.652842] exe[812391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b98a4cd839 cs:33 sp:7fdb944daee8 ax:0 si:20000040 di:ffffffffff600000 [11549422.842044] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.891535] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.931486] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.356143] warn_bad_vsyscall: 6 callbacks suppressed [11549426.356147] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.409055] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.429411] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.469059] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.492130] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.953107] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.002112] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.051579] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.052798] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.523865] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.574374] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.617270] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.644076] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.542912] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.586509] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.635656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.656472] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.333222] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.385051] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.407654] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.463938] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.486314] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.506017] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549450.523743] warn_bad_vsyscall: 66 callbacks suppressed [11549450.523747] exe[813165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13bc63839 cs:33 sp:7fab0d06fee8 ax:0 si:20000040 di:ffffffffff600000 [11549450.715540] exe[807311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9a7633839 cs:33 sp:7f1120b17ee8 ax:0 si:20000040 di:ffffffffff600000 [11549455.474323] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.517320] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.539071] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.582910] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549462.474386] exe[756116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1de600839 cs:33 sp:7fba5c050ee8 ax:0 si:20000040 di:ffffffffff600000 [11549462.926878] exe[794394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559edb8a0839 cs:33 sp:7f1c503e2ee8 ax:0 si:20000040 di:ffffffffff600000 [11549466.434155] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.490814] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.533742] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.534602] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.211071] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.252741] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.291120] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.295633] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.635585] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.677652] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.719660] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.867443] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.908983] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.909927] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.964262] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.495137] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.790729] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.859182] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.290345] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.357829] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.426947] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549593.412229] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549593.562650] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.243778] exe[812951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c749ce839 cs:33 sp:7ea297e86ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.710759] exe[828296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c970632839 cs:33 sp:7ec3ceeb7ee8 ax:0 si:20000040 di:ffffffffff600000 [11549714.981109] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549715.749772] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.546233] exe[814844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5b0f9a839 cs:33 sp:7fc5bfbfeee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.735375] exe[814714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b554191839 cs:33 sp:7f6febbf8ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.362481] exe[783694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.735183] exe[800231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549816.546602] exe[821122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549817.188403] exe[822913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549840.206573] exe[828178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcd7d54839 cs:33 sp:7eba87823ee8 ax:0 si:20000040 di:ffffffffff600000 [11549842.390425] exe[822623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41ee8 ax:0 si:20000040 di:ffffffffff600000 [11549851.814988] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549851.979785] exe[834049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037235] exe[831079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9be858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037247] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549869.928825] exe[833586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d7fa8b839 cs:33 sp:7fd723b3eee8 ax:0 si:20000040 di:ffffffffff600000 [11549870.243345] exe[834928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56062534e839 cs:33 sp:7f0757548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549959.675292] exe[797744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558fc8494839 cs:33 sp:7f29d40d3ee8 ax:0 si:20000040 di:ffffffffff600000 [11549964.327083] exe[816565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d710109839 cs:33 sp:7f42012e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11550011.778578] exe[785408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.328909] exe[777936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.464501] exe[784143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550449.411992] exe[840751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d4deee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.543051] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.570209] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.601466] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.628501] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.655874] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.684944] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.711295] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.738186] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.768990] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11551293.287525] warn_bad_vsyscall: 57 callbacks suppressed [11551293.287528] exe[872567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.432824] exe[872441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64d6ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.635840] exe[878590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551350.987871] exe[802426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.133434] exe[801154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.264861] exe[800782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551739.212650] exe[891790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.358004] exe[874588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.423302] exe[876706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11552746.340520] exe[917620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552746.540849] exe[917777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552749.324099] exe[916114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11553787.312373] exe[918824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd909c3bee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.233139] exe[932505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097feee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.702294] exe[918368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097bcee8 ax:0 si:20000300 di:ffffffffff600000 [11556405.744028] exe[973340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.888821] exe[974236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.889344] exe[972981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.769888] exe[966210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.770120] exe[966208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556828.744398] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556828.924558] exe[26205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.059181] exe[13280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.100292] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556926.028445] exe[987233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8fe9a7839 cs:33 sp:7f1b02da7858 ax:0 si:55d8fea00070 di:ffffffffff600000 [11556931.514747] exe[2731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecfc56a839 cs:33 sp:7efc33043858 ax:0 si:55ecfc5c3070 di:ffffffffff600000 [11556932.678559] exe[32873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c147b8d839 cs:33 sp:7f3ef85dc858 ax:0 si:55c147be6070 di:ffffffffff600000 [11556950.820318] exe[29772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561443faf839 cs:33 sp:7f0e531fe858 ax:0 si:561444008070 di:ffffffffff600000 [11557024.979366] exe[990140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557025.945778] exe[989269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557026.183320] exe[36260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556217b32839 cs:33 sp:7fddcd279858 ax:0 si:556217b8b070 di:ffffffffff600000 [11557026.761986] exe[18772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1290fa839 cs:33 sp:7fc527cc9858 ax:0 si:55e129153070 di:ffffffffff600000 [11557029.543342] exe[10486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4073da839 cs:33 sp:7ee9c91fe858 ax:0 si:55a407433070 di:ffffffffff600000 [11557029.565342] exe[955869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f019e21839 cs:33 sp:7ec4f6665858 ax:0 si:55f019e7a070 di:ffffffffff600000 [11557070.452747] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557071.382941] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557079.659895] exe[37699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557079.763841] exe[37791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557081.617680] exe[31464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557081.699452] exe[32275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557085.755120] exe[978697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557086.768436] exe[984524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557092.839673] exe[19916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb78120839 cs:33 sp:7fb79022c858 ax:0 si:55bb78179070 di:ffffffffff600000 [11557105.272126] exe[16964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558fd61d839 cs:33 sp:7fb861029858 ax:0 si:5558fd676070 di:ffffffffff600000 [11557125.514096] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557127.078867] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557154.900378] exe[36166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557159.639958] exe[39906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557221.493537] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557226.224888] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557248.504217] exe[43502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557250.866532] exe[43487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557522.293434] exe[57221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.454602] exe[43299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f0d858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.576325] exe[56829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11558001.442748] exe[17430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.578829] exe[36871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.610672] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.923774] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558002.987979] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.102566] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.246645] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.372957] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.494809] exe[20846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.643478] exe[20903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11560610.686110] warn_bad_vsyscall: 8 callbacks suppressed [11560610.686113] exe[99111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560610.846189] exe[96849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560611.008067] exe[96916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcd2858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560620.483506] exe[100810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11561057.499685] exe[98831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.289038] exe[108411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3eff858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.393219] exe[101690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561923.921251] exe[152411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3feee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.060175] exe[152385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.128957] exe[154085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11562242.603414] exe[164541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.658947] exe[164509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.726852] exe[164557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562318.141986] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.185850] exe[165157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.230040] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562508.870615] exe[162696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562508.954821] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee79778e858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.041779] exe[152279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.053797] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.099380] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.158846] exe[154196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.222873] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.299400] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.361377] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.442875] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562513.886961] warn_bad_vsyscall: 78 callbacks suppressed [11562513.886964] exe[153246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562513.966428] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.077335] exe[150507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.160213] exe[166511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.255440] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.324063] exe[148511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.397110] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.417360] exe[153945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.500074] exe[148482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.657039] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562518.891334] warn_bad_vsyscall: 242 callbacks suppressed [11562518.891337] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.918008] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.940541] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.962612] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.984566] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.004824] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.026469] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.052169] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.077333] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.100492] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562523.895932] warn_bad_vsyscall: 195 callbacks suppressed [11562523.895936] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562523.979579] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.056179] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.153870] exe[157649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.235431] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.312684] exe[163330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.336197] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.425044] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.462329] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.531409] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.910818] warn_bad_vsyscall: 88 callbacks suppressed [11562528.910821] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.988209] exe[148466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.051915] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.121864] exe[148494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.148494] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.234883] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.511729] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.649601] exe[155191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.693598] exe[155337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.749781] exe[145592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11563296.983914] warn_bad_vsyscall: 51 callbacks suppressed [11563296.983917] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.050803] exe[209501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.121483] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.191808] exe[245375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11564162.444776] exe[282975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.703356] exe[282980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.920885] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.952924] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.989739] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.026962] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.062712] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.106058] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.144988] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.183482] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11565099.136493] warn_bad_vsyscall: 57 callbacks suppressed [11565099.136497] exe[293094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565099.258727] exe[294155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.043336] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.121398] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11566632.890447] exe[349719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f764152839 cs:33 sp:7fdb7b72b858 ax:0 si:55f7641ab062 di:ffffffffff600000 [11567358.170812] exe[372737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda5a9a839 cs:33 sp:7f549c97e858 ax:0 si:55fda5af3062 di:ffffffffff600000 [11568031.388619] exe[351576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d82c2e839 cs:33 sp:7ecffe498858 ax:0 si:558d82c87062 di:ffffffffff600000 [11569260.474399] exe[375466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569261.377312] exe[338184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569262.181339] exe[382316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d087f858 ax:0 si:559bde482062 di:ffffffffff600000 [11569309.954783] exe[405267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.065111] exe[352156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.120066] exe[398935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.176797] exe[393693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.243561] exe[405400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.277532] exe[399019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.333288] exe[393672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569717.914214] exe[406088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094052] exe[372314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bbcee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094670] exe[337720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.213977] exe[406250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bddee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11570627.586664] exe[417752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.638479] exe[417746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.766448] exe[441957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11572038.765476] exe[475895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889db1ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572038.977536] exe[479441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572039.176765] exe[479800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572342.507294] exe[481351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf282c5839 cs:33 sp:7f5c28337858 ax:0 si:55cf2831e070 di:ffffffffff600000 [11572577.393150] exe[486689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572577.473226] exe[486687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572578.211498] exe[486677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572754.198775] exe[481332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56477294c839 cs:33 sp:7f001edd1858 ax:0 si:5647729a5062 di:ffffffffff600000 [11574240.728150] exe[551421] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6f0ee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574241.487023] exe[545323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6aeee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574242.469682] exe[546003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6cfee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11575422.643597] exe[620510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.701376] exe[619500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.762542] exe[619046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575566.007915] exe[523991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.091195] exe[551819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.166155] exe[628916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11576445.764659] exe[712019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.878131] exe[712009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.982369] exe[711902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576887.854922] exe[723515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576887.911232] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.005831] exe[716298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.078248] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11578050.810150] exe[736914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.915350] exe[806208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.957314] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578050.969802] exe[799678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.032458] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.066640] exe[799655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.100539] exe[801517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.138612] exe[806683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.200188] exe[801281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.222257] exe[734041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11579845.499536] exe[851008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2109ed839 cs:33 sp:7f547858c858 ax:0 si:55e210a46062 di:ffffffffff600000 [11579884.100862] exe[859314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.173286] exe[861221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.225785] exe[861085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11580352.706875] exe[880278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc72733839 cs:33 sp:7ece8f07f858 ax:0 si:55dc7278c062 di:ffffffffff600000 [11581411.682652] exe[910863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555579041839 cs:33 sp:7eedc077f858 ax:0 si:55557909a062 di:ffffffffff600000 [11583407.177111] docker0: port 1(vethe259598) entered blocking state [11583407.183502] docker0: port 1(vethe259598) entered disabled state [11583407.190068] device vethe259598 entered promiscuous mode [11583408.741833] eth0: renamed from veth1e830bc [11583408.814556] IPv6: ADDRCONF(NETDEV_CHANGE): vethe259598: link becomes ready [11583408.822198] docker0: port 1(vethe259598) entered blocking state [11583408.828542] docker0: port 1(vethe259598) entered forwarding state [11583408.835194] IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready [11583412.300279] veth1e830bc: renamed from eth0 [11583412.448612] docker0: port 1(vethe259598) entered disabled state [11583412.462563] docker0: port 1(vethe259598) entered disabled state [11583412.479276] device vethe259598 left promiscuous mode [11583412.485146] docker0: port 1(vethe259598) entered disabled state [11583431.825145] docker0: port 1(vethc7abddf) entered blocking state [11583431.831533] docker0: port 1(vethc7abddf) entered disabled state [11583431.838215] device vethc7abddf entered promiscuous mode [11583432.494406] eth0: renamed from vethd633b4d [11583432.599425] IPv6: ADDRCONF(NETDEV_CHANGE): vethc7abddf: link becomes ready [11583432.607140] docker0: port 1(vethc7abddf) entered blocking state [11583432.613499] docker0: port 1(vethc7abddf) entered forwarding state [11583817.129561] vethd633b4d: renamed from eth0 [11583817.523399] docker0: port 1(vethc7abddf) entered disabled state [11583817.532193] docker0: port 1(vethc7abddf) entered disabled state [11583817.545763] device vethc7abddf left promiscuous mode [11583817.552461] docker0: port 1(vethc7abddf) entered disabled state [11584054.884518] audit: type=1326 audit(1689187802.116:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584055.879755] audit: type=1326 audit(1689187803.112:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103700 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584567.089744] audit: type=1326 audit(1689188314.320:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=182950 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584611.088374] audit: type=1326 audit(1689188358.312:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263707 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584672.762944] audit: type=1326 audit(1689188419.991:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584875.420389] audit: type=1326 audit(1689188622.651:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=188936 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584965.440931] audit: type=1326 audit(1689188712.671:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585225.740695] audit: type=1326 audit(1689188972.971:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585229.617269] audit: type=1326 audit(1689188976.847:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585232.156357] audit: type=1326 audit(1689188979.387:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=272781 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585314.538060] audit: type=1326 audit(1689189061.767:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343964 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585378.674528] audit: type=1326 audit(1689189125.902:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=441825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585433.090919] audit: type=1326 audit(1689189180.318:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585457.504489] audit: type=1326 audit(1689189204.734:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585481.843203] audit: type=1326 audit(1689189229.070:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488144 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585504.254722] audit: type=1326 audit(1689189251.482:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.053267] audit: type=1326 audit(1689189275.282:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493114 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.807884] audit: type=1326 audit(1689189276.034:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585528.832541] audit: type=1326 audit(1689189276.038:28): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442984 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585545.824476] audit: type=1326 audit(1689189293.054:29): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585551.212031] audit: type=1326 audit(1689189298.438:30): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585623.106438] audit: type=1326 audit(1689189370.334:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=368087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585650.678959] audit: type=1326 audit(1689189397.906:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=503494 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585666.774803] audit: type=1326 audit(1689189413.998:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585672.549526] audit: type=1326 audit(1689189419.774:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585675.835169] audit: type=1326 audit(1689189423.062:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=519541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585680.990321] audit: type=1326 audit(1689189428.218:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585682.225303] audit: type=1326 audit(1689189429.454:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=523487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585692.507931] audit: type=1326 audit(1689189439.734:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529974 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585700.810773] audit: type=1326 audit(1689189448.038:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585707.330135] audit: type=1326 audit(1689189454.558:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585707.355627] audit: type=1326 audit(1689189454.570:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585760.137664] audit: type=1326 audit(1689189507.366:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585842.181262] audit: type=1326 audit(1689189589.410:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=543905 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585953.240671] audit: type=1326 audit(1689189700.466:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=436527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585977.153008] audit: type=1326 audit(1689189724.382:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585983.993412] audit: type=1326 audit(1689189731.222:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586006.672711] audit: type=1326 audit(1689189753.898:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586140.152824] audit: type=1326 audit(1689189887.377:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586207.321863] audit: type=1326 audit(1689189954.549:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586222.617377] audit: type=1326 audit(1689189969.845:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586222.733853] audit: type=1326 audit(1689189969.961:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586283.299802] audit: type=1326 audit(1689190030.525:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586425.211851] audit: type=1326 audit(1689190172.437:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=660268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586448.276864] audit: type=1326 audit(1689190195.501:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=709276 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586599.517442] audit: type=1326 audit(1689190346.745:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586697.763797] audit: type=1326 audit(1689190444.989:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=749851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586721.351015] audit: type=1326 audit(1689190468.577:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=795666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586855.921790] audit: type=1326 audit(1689190603.152:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796699 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586945.894236] audit: type=1326 audit(1689190693.124:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=533305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.031898] audit: type=1326 audit(1689190744.260:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.140632] audit: type=1326 audit(1689190744.368:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862850 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586998.283858] audit: type=1326 audit(1689190745.512:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587012.567629] audit: type=1326 audit(1689190759.796:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879241 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587019.764188] audit: type=1326 audit(1689190766.992:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=885098 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587033.584838] audit: type=1326 audit(1689190780.812:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=895459 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587037.458391] audit: type=1326 audit(1689190784.688:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587047.438093] audit: type=1326 audit(1689190794.652:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587181.826148] audit: type=1326 audit(1689190929.056:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=905801 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587280.280946] audit: type=1326 audit(1689191027.508:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587323.352812] audit: type=1326 audit(1689191070.580:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587345.059700] audit: type=1326 audit(1689191092.288:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=549018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587346.322122] audit: type=1326 audit(1689191093.552:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=930804 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587481.789421] audit: type=1326 audit(1689191229.016:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931842 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587625.478553] audit: type=1326 audit(1689191372.707:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587708.307169] audit: type=1326 audit(1689191455.535:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=756034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587769.707671] audit: type=1326 audit(1689191516.935:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587868.987704] audit: type=1326 audit(1689191616.215:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587911.691294] audit: type=1326 audit(1689191658.919:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=953497 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587972.252639] audit: type=1326 audit(1689191719.479:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949672 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588027.579353] audit: type=1326 audit(1689191774.807:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=964425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11588054.186210] audit: type=1326 audit(1689191801.411:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=959048 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588196.763380] audit: type=1326 audit(1689191943.991:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=966784 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588241.418032] audit: type=1326 audit(1689191988.643:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961678 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588257.524755] exe[970083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563948302839 cs:33 sp:7f701577b858 ax:0 si:56394835b062 di:ffffffffff600000 [11588338.712384] audit: type=1326 audit(1689192085.938:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588361.040657] audit: type=1326 audit(1689192108.266:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588415.532026] audit: type=1326 audit(1689192162.758:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=601426 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588610.783264] audit: type=1326 audit(1689192358.006:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984049 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588726.496588] audit: type=1326 audit(1689192473.722:88): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588753.178927] audit: type=1326 audit(1689192500.402:89): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988316 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588776.098474] audit: type=1326 audit(1689192523.322:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992296 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588907.567479] audit: type=1326 audit(1689192654.790:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588943.441393] audit: type=1326 audit(1689192690.666:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=997051 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589004.500919] audit: type=1326 audit(1689192751.725:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589049.699452] audit: type=1326 audit(1689192796.921:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589192.852319] audit: type=1326 audit(1689192940.077:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589224.823353] audit: type=1326 audit(1689192972.045:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=957390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589279.679649] audit: type=1326 audit(1689193026.901:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999123 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589317.854470] audit: type=1326 audit(1689193065.077:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9166 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589336.359512] audit: type=1326 audit(1689193083.581:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589429.636946] audit: type=1326 audit(1689193176.861:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589439.329881] audit: type=1326 audit(1689193186.553:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589452.248556] audit: type=1326 audit(1689193199.473:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589478.982418] audit: type=1326 audit(1689193226.205:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10335 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589556.277003] audit: type=1326 audit(1689193303.501:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589580.979071] audit: type=1326 audit(1689193328.201:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589586.686728] audit: type=1326 audit(1689193333.909:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589621.171546] audit: type=1326 audit(1689193368.393:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19657 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589724.809423] audit: type=1326 audit(1689193472.032:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=975428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589728.293279] audit: type=1326 audit(1689193475.516:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589733.237752] audit: type=1326 audit(1689193480.460:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589743.161653] audit: type=1326 audit(1689193490.388:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589764.186602] audit: type=1326 audit(1689193511.412:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589776.120531] audit: type=1326 audit(1689193523.348:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589831.237562] audit: type=1326 audit(1689193578.464:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=991342 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589866.353844] audit: type=1326 audit(1689193613.580:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589870.843852] audit: type=1326 audit(1689193618.068:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589881.503035] exe[37537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589881.579767] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.310348] exe[38197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.415993] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589905.778137] audit: type=1326 audit(1689193653.004:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589907.278419] audit: type=1326 audit(1689193654.504:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36131 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589910.766143] audit: type=1326 audit(1689193657.992:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590010.704598] audit: type=1326 audit(1689193757.928:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590013.206490] audit: type=1326 audit(1689193760.432:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43383 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590049.200088] audit: type=1326 audit(1689193796.424:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=47282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590068.122169] audit: type=1326 audit(1689193815.348:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50694 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590073.502291] audit: type=1326 audit(1689193820.728:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590120.931053] audit: type=1326 audit(1689193868.156:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590155.535046] audit: type=1326 audit(1689193902.760:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=54378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590175.976226] audit: type=1326 audit(1689193923.200:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=981718 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590178.057670] audit: type=1326 audit(1689193925.284:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=60876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590190.713262] audit: type=1326 audit(1689193937.940:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56012 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590230.205782] audit: type=1326 audit(1689193977.432:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590235.472981] audit: type=1326 audit(1689193982.700:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58981 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590334.418166] audit: type=1326 audit(1689194081.644:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=62081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590356.564544] audit: type=1326 audit(1689194103.788:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=68645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590368.499637] audit: type=1326 audit(1689194115.724:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=69347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590393.106260] audit: type=1326 audit(1689194140.332:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590397.337896] audit: type=1326 audit(1689194144.564:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590421.065575] audit: type=1326 audit(1689194168.292:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=55042 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590427.197777] audit: type=1326 audit(1689194174.424:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=66561 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590480.784621] exe[70942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6628c839 cs:33 sp:7fa6d27d0858 ax:0 si:563a662e5062 di:ffffffffff600000 [11590563.298809] audit: type=1326 audit(1689194310.523:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=73853 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590570.174470] audit: type=1326 audit(1689194317.399:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74121 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590579.511563] audit: type=1326 audit(1689194326.735:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=41148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.165028] audit: type=1326 audit(1689194365.387:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.556131] audit: type=1326 audit(1689194365.779:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76917 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590659.789661] audit: type=1326 audit(1689194407.015:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=72204 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590667.566138] audit: type=1326 audit(1689194414.791:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=59720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590713.717972] audit: type=1326 audit(1689194460.943:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=81970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590760.577913] audit: type=1326 audit(1689194507.803:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=85519 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590773.925188] audit: type=1326 audit(1689194521.147:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=86433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590829.878288] audit: type=1326 audit(1689194577.103:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590843.309873] audit: type=1326 audit(1689194590.535:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=90249 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590856.337400] audit: type=1326 audit(1689194603.563:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=91077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590883.659438] exe[98704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.745839] exe[98692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.804815] exe[73130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590905.357910] audit: type=1326 audit(1689194652.583:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590994.002065] audit: type=1326 audit(1689194741.227:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=82851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590997.870766] audit: type=1326 audit(1689194745.095:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98690 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591045.573250] audit: type=1326 audit(1689194792.795:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=61248 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591047.449319] audit: type=1326 audit(1689194794.671:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=100862 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591140.220327] audit: type=1326 audit(1689194887.443:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103773 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591190.314804] audit: type=1326 audit(1689194937.538:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591282.744645] audit: type=1326 audit(1689195029.966:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=110698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591291.245979] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.293995] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.340272] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.365662] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591332.697604] audit: type=1326 audit(1689195079.918:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=112617 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591355.547113] audit: type=1326 audit(1689195102.770:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=116982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591358.161112] audit: type=1326 audit(1689195105.382:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98099 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591425.677450] audit: type=1326 audit(1689195172.898:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=115486 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591448.624599] audit: type=1326 audit(1689195195.846:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=119555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591607.174755] audit: type=1326 audit(1689195354.398:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=120483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591633.329281] audit: type=1326 audit(1689195380.550:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=118107 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591699.123909] audit: type=1326 audit(1689195446.346:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=123336 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591750.549397] audit: type=1326 audit(1689195497.770:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=124794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591808.120865] audit: type=1326 audit(1689195555.342:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591843.602538] audit: type=1326 audit(1689195590.826:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127514 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591873.374278] audit: type=1326 audit(1689195620.594:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591893.157685] audit: type=1326 audit(1689195640.377:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128877 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591982.621819] audit: type=1326 audit(1689195729.841:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127317 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591989.377409] audit: type=1326 audit(1689195736.597:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131086 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592022.574487] audit: type=1326 audit(1689195769.793:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87153 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592035.999430] audit: type=1326 audit(1689195783.221:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=132961 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592132.313885] audit: type=1326 audit(1689195879.533:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135592 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592143.607778] audit: type=1326 audit(1689195890.829:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128178 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592178.641536] audit: type=1326 audit(1689195925.861:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138468 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592254.513447] audit: type=1326 audit(1689196001.733:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592273.875922] audit: type=1326 audit(1689196021.097:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=140726 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592302.580569] audit: type=1326 audit(1689196049.801:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592321.531004] audit: type=1326 audit(1689196068.753:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=142352 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592339.728090] audit: type=1326 audit(1689196086.949:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=130223 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592369.761746] audit: type=1326 audit(1689196116.981:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103571 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592410.933916] audit: type=1326 audit(1689196158.153:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=150341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592416.511036] audit: type=1326 audit(1689196163.733:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=145063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592462.058974] audit: type=1326 audit(1689196209.281:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=141810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592463.310936] audit: type=1326 audit(1689196210.533:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592485.344448] audit: type=1326 audit(1689196232.565:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153095 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592558.476558] audit: type=1326 audit(1689196305.697:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=151044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592615.624930] audit: type=1326 audit(1689196362.844:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592699.997739] audit: type=1326 audit(1689196447.220:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592710.156296] audit: type=1326 audit(1689196457.380:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156955 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592721.951674] audit: type=1326 audit(1689196469.176:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592736.718023] audit: type=1326 audit(1689196483.940:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153479 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592741.098019] audit: type=1326 audit(1689196488.320:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592755.557937] audit: type=1326 audit(1689196502.780:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=149411 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592759.276627] audit: type=1326 audit(1689196506.500:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158134 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592769.332142] audit: type=1326 audit(1689196516.556:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592779.678505] audit: type=1326 audit(1689196526.900:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=144000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592781.810254] audit: type=1326 audit(1689196529.032:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592864.422847] audit: type=1326 audit(1689196611.644:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161799 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592924.228200] audit: type=1326 audit(1689196671.452:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164650 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592972.503710] audit: type=1326 audit(1689196719.728:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166288 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593019.764197] audit: type=1326 audit(1689196766.988:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=168704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593032.140808] audit: type=1326 audit(1689196779.364:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=169078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593079.379374] audit: type=1326 audit(1689196826.600:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593114.910849] audit: type=1326 audit(1689196862.132:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.622118] audit: type=1326 audit(1689196921.844:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.825662] audit: type=1326 audit(1689196922.048:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593178.076737] audit: type=1326 audit(1689196925.300:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162576 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593234.654096] audit: type=1326 audit(1689196981.876:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593257.424976] audit: type=1326 audit(1689197004.648:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=177244 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593293.232827] audit: type=1326 audit(1689197040.456:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=137729 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593317.825573] audit: type=1326 audit(1689197065.048:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=180616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593323.667486] audit: type=1326 audit(1689197070.888:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=189200 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593328.061505] audit: type=1326 audit(1689197075.284:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=148080 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593329.981467] audit: type=1326 audit(1689197077.204:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593338.759166] audit: type=1326 audit(1689197085.979:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=165105 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593389.569262] audit: type=1326 audit(1689197136.791:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=186680 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593396.219631] exe[152440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d776adb40a cs:33 sp:7ed61def9ee8 ax:12 si:ffffffffff600000 di:55d776b47ff2 [11593399.988581] audit: type=1326 audit(1689197147.211:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=187139 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593439.960246] exe[66056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be798b40a cs:33 sp:7f6af116aee8 ax:12 si:ffffffffff600000 di:555be79f7ff2 [11593461.573435] audit: type=1326 audit(1689197208.795:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=190626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593485.256569] audit: type=1326 audit(1689197232.479:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593497.873599] audit: type=1326 audit(1689197245.095:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593518.294739] audit: type=1326 audit(1689197265.515:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593521.883008] exe[199220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da1a09d40a cs:33 sp:7f85f4e68ee8 ax:12 si:ffffffffff600000 di:55da1a109ff2 [11593544.715149] audit: type=1326 audit(1689197291.935:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=197050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593545.100259] audit: type=1326 audit(1689197292.323:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=196843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593575.000948] exe[134062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639deab340a cs:33 sp:7f755d14fee8 ax:12 si:ffffffffff600000 di:5639deb1fff2 [11593604.159283] audit: type=1326 audit(1689197351.379:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=200356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593640.473262] audit: type=1326 audit(1689197387.695:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202521 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593657.667580] exe[179402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591c09e940a cs:33 sp:7f261affeee8 ax:12 si:ffffffffff600000 di:5591c0a55ff2 [11593674.309236] audit: type=1326 audit(1689197421.531:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593689.965207] audit: type=1326 audit(1689197437.187:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205540 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593691.547751] exe[160101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569db9d240a cs:33 sp:7fa8a79ccee8 ax:12 si:ffffffffff600000 di:5569dba3eff2 [11593699.961762] audit: type=1326 audit(1689197447.183:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=206003 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593728.160554] audit: type=1326 audit(1689197475.383:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593746.828768] audit: type=1326 audit(1689197494.051:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=207759 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593795.835659] audit: type=1326 audit(1689197543.055:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209535 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593832.663491] audit: type=1326 audit(1689197579.883:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210532 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593838.669590] exe[171215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56258f57d40a cs:33 sp:7eee19bc0ee8 ax:12 si:ffffffffff600000 di:56258f5e9ff2 [11593855.337569] audit: type=1326 audit(1689197602.559:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211977 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593873.582187] exe[168156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea3654340a cs:33 sp:7ee36dc7fee8 ax:12 si:ffffffffff600000 di:55ea365afff2 [11593890.297485] audit: type=1326 audit(1689197637.519:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=212765 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593894.219651] audit: type=1326 audit(1689197641.439:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=203030 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593950.988419] audit: type=1326 audit(1689197698.211:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215006 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593958.108331] exe[223988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55790709f40a cs:33 sp:7fc0e2306ee8 ax:12 si:ffffffffff600000 di:55790710bff2 [11593975.515820] audit: type=1326 audit(1689197722.735:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=216520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594010.397443] audit: type=1326 audit(1689197757.615:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594030.252814] audit: type=1326 audit(1689197777.475:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594033.719885] audit: type=1326 audit(1689197780.939:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=220218 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594106.182590] audit: type=1326 audit(1689197853.402:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594117.815412] audit: type=1326 audit(1689197865.034:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=239115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594117.935385] audit: type=1326 audit(1689197865.154:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225643 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594165.847268] audit: type=1326 audit(1689197913.066:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=230078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594174.793835] audit: type=1326 audit(1689197922.014:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=244854 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594175.873367] audit: type=1326 audit(1689197923.094:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594199.462125] audit: type=1326 audit(1689197946.682:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594224.432971] audit: type=1326 audit(1689197971.654:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=249792 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594261.404105] audit: type=1326 audit(1689198008.622:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=241022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594318.932606] audit: type=1326 audit(1689198066.150:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594320.925806] audit: type=1326 audit(1689198068.146:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594356.854437] audit: type=1326 audit(1689198104.074:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594380.768141] audit: type=1326 audit(1689198127.986:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=240966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594390.465281] audit: type=1326 audit(1689198137.686:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=228574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594461.153994] audit: type=1326 audit(1689198208.374:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=255268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594476.069454] audit: type=1326 audit(1689198223.290:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=256911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594518.406656] audit: type=1326 audit(1689198265.626:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594523.088185] audit: type=1326 audit(1689198270.306:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594597.381921] audit: type=1326 audit(1689198344.602:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=191172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594603.685087] audit: type=1326 audit(1689198350.906:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=266554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594631.412121] audit: type=1326 audit(1689198378.630:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=268442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594632.657909] audit: type=1326 audit(1689198379.878:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=258967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594662.779958] exe[279809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594662.854447] exe[276685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713532] exe[277223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713638] exe[279858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bddee8 ax:0 si:20000080 di:ffffffffff600000 [11594665.693757] audit: type=1326 audit(1689198412.914:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594673.507995] audit: type=1326 audit(1689198420.726:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594730.359948] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.445155] exe[278569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.446222] exe[278851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.540368] exe[278597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.552108] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.612605] exe[281701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.638579] exe[278601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594746.644836] audit: type=1326 audit(1689198493.862:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=277230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594768.991618] audit: type=1326 audit(1689198516.210:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291770 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594786.336470] audit: type=1326 audit(1689198533.553:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594808.089645] audit: type=1326 audit(1689198555.309:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=281516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594828.717418] audit: type=1326 audit(1689198575.937:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=284014 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594880.645359] audit: type=1326 audit(1689198627.865:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=276757 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594915.736039] audit: type=1326 audit(1689198662.953:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=296537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594941.113632] audit: type=1326 audit(1689198688.333:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=293790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594951.088221] audit: type=1326 audit(1689198698.305:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594973.980095] audit: type=1326 audit(1689198721.197:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=298957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595018.844858] audit: type=1326 audit(1689198766.061:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595030.820319] audit: type=1326 audit(1689198778.037:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263124 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595032.223366] audit: type=1326 audit(1689198779.441:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595145.554563] audit: type=1326 audit(1689198892.773:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=300890 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595161.269631] audit: type=1326 audit(1689198908.489:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=301412 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595170.431765] audit: type=1326 audit(1689198917.649:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595185.313809] audit: type=1326 audit(1689198932.533:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595201.280000] audit: type=1326 audit(1689198948.497:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=304270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595223.038909] audit: type=1326 audit(1689198970.257:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=305529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595268.993349] audit: type=1326 audit(1689199016.209:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280239 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595304.435314] audit: type=1326 audit(1689199051.653:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595356.370847] audit: type=1326 audit(1689199103.589:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=311169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595366.975635] audit: type=1326 audit(1689199114.193:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=312137 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595426.830311] audit: type=1326 audit(1689199174.049:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=315053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595427.662370] audit: type=1326 audit(1689199174.881:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=303097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595446.025545] audit: type=1326 audit(1689199193.241:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=316510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595464.682020] audit: type=1326 audit(1689199211.901:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=318190 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595509.649702] audit: type=1326 audit(1689199256.864:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323600 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595510.657426] audit: type=1326 audit(1689199257.872:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595542.116878] audit: type=1326 audit(1689199289.332:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=302591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595581.328126] audit: type=1326 audit(1689199328.548:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328777 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595587.640931] audit: type=1326 audit(1689199334.860:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=329367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595651.155320] audit: type=1326 audit(1689199398.376:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=333972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595702.302607] audit: type=1326 audit(1689199449.524:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595730.144192] audit: type=1326 audit(1689199477.364:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=337996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595740.233803] audit: type=1326 audit(1689199487.452:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=338460 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595792.585821] audit: type=1326 audit(1689199539.804:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=341419 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595825.580712] audit: type=1326 audit(1689199572.800:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595875.108425] audit: type=1326 audit(1689199622.328:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595901.852174] audit: type=1326 audit(1689199649.072:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344849 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595905.389538] audit: type=1326 audit(1689199652.608:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=314916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595925.496842] audit: type=1326 audit(1689199672.716:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=335810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595934.736760] audit: type=1326 audit(1689199681.956:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=345386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595971.418522] audit: type=1326 audit(1689199718.640:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308731 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595980.227077] audit: type=1326 audit(1689199727.448:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596018.056630] audit: type=1326 audit(1689199765.276:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=356309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596056.500390] audit: type=1326 audit(1689199803.720:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=361636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596075.947223] audit: type=1326 audit(1689199823.168:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=363826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596134.937184] audit: type=1326 audit(1689199882.156:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=373258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596159.034584] audit: type=1326 audit(1689199906.256:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=375929 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596177.422094] audit: type=1326 audit(1689199924.640:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383229 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596180.530915] audit: type=1326 audit(1689199927.752:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596187.965307] audit: type=1326 audit(1689199935.184:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596211.290275] audit: type=1326 audit(1689199958.508:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596218.125572] audit: type=1326 audit(1689199965.344:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596246.667371] audit: type=1326 audit(1689199993.887:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=389789 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596290.009508] audit: type=1326 audit(1689200037.227:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=382687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596301.649961] audit: type=1326 audit(1689200048.867:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383548 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596322.674538] audit: type=1326 audit(1689200069.891:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=385382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596359.395258] audit: type=1326 audit(1689200106.615:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=388832 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596368.814653] audit: type=1326 audit(1689200116.035:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=401516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596443.646206] audit: type=1326 audit(1689200190.863:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=396416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596466.257416] audit: type=1326 audit(1689200213.475:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=407911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596502.013601] audit: type=1326 audit(1689200249.231:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=403529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596564.211893] audit: type=1326 audit(1689200311.431:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=406533 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596594.833485] audit: type=1326 audit(1689200342.051:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596642.054964] audit: type=1326 audit(1689200389.275:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596644.775799] audit: type=1326 audit(1689200391.995:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412267 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596718.281279] audit: type=1326 audit(1689200465.499:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420908 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596748.828125] exe[433668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b25822839 cs:33 sp:7f1f6d4d3858 ax:0 si:558b2587b062 di:ffffffffff600000 [11596786.178383] audit: type=1326 audit(1689200533.395:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=425510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596794.175733] audit: type=1326 audit(1689200541.395:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426145 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596845.812515] audit: type=1326 audit(1689200593.031:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431991 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596871.244869] audit: type=1326 audit(1689200618.463:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596896.868375] audit: type=1326 audit(1689200644.087:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=405560 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596929.235998] audit: type=1326 audit(1689200676.455:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596963.597646] audit: type=1326 audit(1689200710.814:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431840 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596988.259748] audit: type=1326 audit(1689200735.478:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=440156 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597030.957935] audit: type=1326 audit(1689200778.174:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597070.847230] audit: type=1326 audit(1689200818.066:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443447 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597089.178816] audit: type=1326 audit(1689200836.394:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444711 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597129.189094] audit: type=1326 audit(1689200876.406:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=445864 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597150.586654] audit: type=1326 audit(1689200897.802:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447377 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597150.630455] audit: type=1326 audit(1689200897.846:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597213.244332] audit: type=1326 audit(1689200960.462:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=455277 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597271.316230] audit: type=1326 audit(1689201018.534:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=460261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597310.051733] audit: type=1326 audit(1689201057.270:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597313.276441] audit: type=1326 audit(1689201060.494:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597314.610726] audit: type=1326 audit(1689201061.826:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=464050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597357.135100] audit: type=1326 audit(1689201104.350:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=468066 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597413.137470] audit: type=1326 audit(1689201160.354:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443184 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597414.535659] audit: type=1326 audit(1689201161.754:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=471566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597474.924098] audit: type=1326 audit(1689201222.142:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597476.117154] audit: type=1326 audit(1689201223.334:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476538 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597498.269056] audit: type=1326 audit(1689201245.486:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597555.566526] audit: type=1326 audit(1689201302.782:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=482783 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597641.232540] audit: type=1326 audit(1689201388.450:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=489586 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597669.950313] exe[494500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e652697839 cs:33 sp:7f7b088e1858 ax:0 si:55e6526f0070 di:ffffffffff600000 [11597698.119005] audit: type=1326 audit(1689201445.333:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597723.766240] audit: type=1326 audit(1689201470.981:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494635 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597725.580971] audit: type=1326 audit(1689201472.797:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=487339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597778.424545] audit: type=1326 audit(1689201525.641:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497122 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597782.912946] audit: type=1326 audit(1689201530.129:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597839.779249] audit: type=1326 audit(1689201586.993:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=500302 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597924.949065] audit: type=1326 audit(1689201672.165:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597927.023142] audit: type=1326 audit(1689201674.237:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597928.907409] audit: type=1326 audit(1689201676.121:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=484211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597933.552953] audit: type=1326 audit(1689201680.769:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=510701 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597976.279809] audit: type=1326 audit(1689201723.493:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597982.541467] audit: type=1326 audit(1689201729.757:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=513162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598067.159794] audit: type=1326 audit(1689201814.373:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=518642 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598088.313475] audit: type=1326 audit(1689201835.529:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520919 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598125.471872] audit: type=1326 audit(1689201872.685:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522253 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598131.148243] audit: type=1326 audit(1689201878.365:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598204.492781] audit: type=1326 audit(1689201951.709:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598208.863021] audit: type=1326 audit(1689201956.077:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=526331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598243.575830] audit: type=1326 audit(1689201990.789:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528273 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598268.259679] audit: type=1326 audit(1689202015.473:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528775 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598286.099005] audit: type=1326 audit(1689202033.313:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598350.997125] audit: type=1326 audit(1689202098.213:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531385 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598352.184658] audit: type=1326 audit(1689202099.401:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541070 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598410.602708] audit: type=1326 audit(1689202157.816:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535596 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598458.134205] audit: type=1326 audit(1689202205.352:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=530585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598471.516156] audit: type=1326 audit(1689202218.732:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598480.334947] audit: type=1326 audit(1689202227.552:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531824 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598482.921116] audit: type=1326 audit(1689202230.140:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598493.766116] audit: type=1326 audit(1689202240.984:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=542354 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598537.882169] audit: type=1326 audit(1689202285.100:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552304 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598552.794779] audit: type=1326 audit(1689202300.012:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=545958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598601.517055] audit: type=1326 audit(1689202348.736:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=550148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598636.422226] audit: type=1326 audit(1689202383.640:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598696.930725] audit: type=1326 audit(1689202444.148:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598699.992536] audit: type=1326 audit(1689202447.208:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555330 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598764.002598] audit: type=1326 audit(1689202511.220:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=558821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598778.707897] audit: type=1326 audit(1689202525.924:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=559751 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598781.495884] audit: type=1326 audit(1689202528.712:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=571608 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598838.336938] audit: type=1326 audit(1689202585.556:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=566812 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598851.686782] audit: type=1326 audit(1689202598.904:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=557043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598921.757010] audit: type=1326 audit(1689202668.976:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=572500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598946.863553] audit: type=1326 audit(1689202694.080:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574758 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598979.367746] audit: type=1326 audit(1689202726.584:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=575821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599001.943831] audit: type=1326 audit(1689202749.160:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=577673 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599054.749238] audit: type=1326 audit(1689202801.968:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=573675 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599065.610701] audit: type=1326 audit(1689202812.828:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=579525 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599121.528672] audit: type=1326 audit(1689202868.744:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=583090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599156.266882] audit: type=1326 audit(1689202903.483:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599198.828291] audit: type=1326 audit(1689202946.043:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599208.132916] audit: type=1326 audit(1689202955.347:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586082 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599230.502686] audit: type=1326 audit(1689202977.719:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=576573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599296.025793] audit: type=1326 audit(1689203043.243:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=589839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599311.286462] audit: type=1326 audit(1689203058.503:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=590816 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599353.781004] audit: type=1326 audit(1689203100.995:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599357.016179] audit: type=1326 audit(1689203104.231:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599357.503764] audit: type=1326 audit(1689203104.719:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592880 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599379.763425] audit: type=1326 audit(1689203126.979:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599466.065105] audit: type=1326 audit(1689203213.279:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=597822 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599499.137048] audit: type=1326 audit(1689203246.351:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599505.276837] audit: type=1326 audit(1689203252.491:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=595019 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599507.683755] audit: type=1326 audit(1689203254.899:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598796 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599570.540316] audit: type=1326 audit(1689203317.755:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599584.813655] audit: type=1326 audit(1689203332.031:428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602286 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599642.444173] audit: type=1326 audit(1689203389.659:429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=603065 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599671.529067] audit: type=1326 audit(1689203418.743:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=596545 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599691.211475] audit: type=1326 audit(1689203438.427:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605507 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599691.379627] audit: type=1326 audit(1689203438.595:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599727.545269] audit: type=1326 audit(1689203474.759:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.062166] audit: type=1326 audit(1689203509.279:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.086813] audit: type=1326 audit(1689203509.279:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599794.446274] audit: type=1326 audit(1689203541.663:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604351 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599853.075039] audit: type=1326 audit(1689203600.290:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599854.839725] audit: type=1326 audit(1689203602.054:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599869.641444] audit: type=1326 audit(1689203616.854:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612658 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599904.012459] audit: type=1326 audit(1689203651.226:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=613836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600015.137399] audit: type=1326 audit(1689203762.350:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600016.195425] audit: type=1326 audit(1689203763.410:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600047.639331] audit: type=1326 audit(1689203794.854:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=609967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600049.671506] audit: type=1326 audit(1689203796.886:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600093.041099] audit: type=1326 audit(1689203840.254:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620895 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600136.261927] audit: type=1326 audit(1689203883.474:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=621806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600176.566249] audit: type=1326 audit(1689203923.778:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622882 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600177.846245] audit: type=1326 audit(1689203925.062:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622980 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600245.983660] audit: type=1326 audit(1689203993.198:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600255.622819] audit: type=1326 audit(1689204002.838:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627117 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600301.130225] audit: type=1326 audit(1689204048.342:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600313.685675] audit: type=1326 audit(1689204060.898:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600338.550728] audit: type=1326 audit(1689204085.766:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600339.475173] audit: type=1326 audit(1689204086.690:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600346.117313] audit: type=1326 audit(1689204093.330:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=625492 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600389.332439] audit: type=1326 audit(1689204136.546:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633029 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600413.679225] exe[552330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.533366] exe[616525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.845071] exe[553784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd587feee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600444.823774] audit: type=1326 audit(1689204192.038:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=628939 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600454.783559] audit: type=1326 audit(1689204201.998:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600460.297963] audit: type=1326 audit(1689204207.510:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=634120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600501.054928] audit: type=1326 audit(1689204248.270:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600501.459095] audit: type=1326 audit(1689204248.674:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600522.075266] audit: type=1326 audit(1689204269.290:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600532.895480] audit: type=1326 audit(1689204280.110:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=637127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600542.361069] audit: type=1326 audit(1689204289.574:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642337 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600618.878528] audit: type=1326 audit(1689204366.089:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=646857 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600662.564294] audit: type=1326 audit(1689204409.777:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642395 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600712.374259] audit: type=1326 audit(1689204459.585:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=644142 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600758.320683] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.381302] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.435987] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.460840] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600791.517421] audit: type=1326 audit(1689204538.729:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=647911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600796.510774] audit: type=1326 audit(1689204543.721:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=643074 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600821.804316] audit: type=1326 audit(1689204569.017:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600824.112759] audit: type=1326 audit(1689204571.325:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600837.837171] audit: type=1326 audit(1689204585.049:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=650926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600838.202708] audit: type=1326 audit(1689204585.413:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639619 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600862.491741] audit: type=1326 audit(1689204609.705:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=635997 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600952.331157] audit: type=1326 audit(1689204699.545:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=655568 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600984.800020] audit: type=1326 audit(1689204732.013:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=658564 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601000.447556] audit: type=1326 audit(1689204747.661:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659232 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601000.483579] audit: type=1326 audit(1689204747.697:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659242 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601093.169914] audit: type=1326 audit(1689204840.381:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=656730 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601098.482808] audit: type=1326 audit(1689204845.693:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=657512 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601113.225254] audit: type=1326 audit(1689204860.437:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666002 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601141.312313] audit: type=1326 audit(1689204888.525:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666552 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601145.359933] audit: type=1326 audit(1689204892.573:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666990 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601274.291260] audit: type=1326 audit(1689205021.505:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=671926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601306.606072] audit: type=1326 audit(1689205053.816:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601309.957748] audit: type=1326 audit(1689205057.168:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674553 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601341.904200] audit: type=1326 audit(1689205089.120:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=675836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601352.797313] audit: type=1326 audit(1689205100.012:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=670357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601367.443182] audit: type=1326 audit(1689205114.656:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601405.264683] audit: type=1326 audit(1689205152.480:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=678379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601436.248250] audit: type=1326 audit(1689205183.464:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=679261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601467.634913] audit: type=1326 audit(1689205214.848:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=680833 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601505.709842] audit: type=1326 audit(1689205252.924:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681793 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601506.056017] audit: type=1326 audit(1689205253.272:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601511.171917] audit: type=1326 audit(1689205258.388:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682176 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601597.695181] audit: type=1326 audit(1689205344.908:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=685750 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601628.435570] audit: type=1326 audit(1689205375.652:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687165 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601639.279190] audit: type=1326 audit(1689205386.492:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=693456 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601646.751183] audit: type=1326 audit(1689205393.964:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687780 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601648.323195] audit: type=1326 audit(1689205395.536:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601704.970538] audit: type=1326 audit(1689205452.184:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601726.438303] audit: type=1326 audit(1689205473.652:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=696962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601790.231890] audit: type=1326 audit(1689205537.448:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694256 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601870.281316] audit: type=1326 audit(1689205617.496:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692648 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601888.842697] audit: type=1326 audit(1689205636.056:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=698719 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601905.721655] audit: type=1326 audit(1689205652.936:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=699618 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601947.458397] audit: type=1326 audit(1689205694.672:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=700466 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601952.073376] audit: type=1326 audit(1689205699.288:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=701007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601958.768477] audit: type=1326 audit(1689205705.984:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=677034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601988.295493] audit: type=1326 audit(1689205735.508:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692547 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602050.588332] audit: type=1326 audit(1689205797.803:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=706687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602092.633316] audit: type=1326 audit(1689205839.847:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710024 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602109.458983] audit: type=1326 audit(1689205856.671:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.463185] audit: type=1326 audit(1689205857.675:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711039 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.945264] audit: type=1326 audit(1689205858.159:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602113.494614] audit: type=1326 audit(1689205860.707:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602167.835209] audit: type=1326 audit(1689205915.047:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=705931 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602212.164413] audit: type=1326 audit(1689205959.379:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=719035 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602228.614047] audit: type=1326 audit(1689205975.827:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602251.890213] audit: type=1326 audit(1689205999.103:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723451 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602263.451544] audit: type=1326 audit(1689206010.663:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=714805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602274.588673] audit: type=1326 audit(1689206021.803:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=726182 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602370.143134] audit: type=1326 audit(1689206117.355:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602373.347637] audit: type=1326 audit(1689206120.559:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735693 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602393.590611] audit: type=1326 audit(1689206140.803:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=737207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602422.998822] audit: type=1326 audit(1689206170.211:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=728959 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602436.005176] audit: type=1326 audit(1689206183.219:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=739202 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602484.595155] audit: type=1326 audit(1689206231.807:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=722293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602507.546522] audit: type=1326 audit(1689206254.759:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602535.958765] audit: type=1326 audit(1689206283.171:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742213 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602560.451117] audit: type=1326 audit(1689206307.663:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743728 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602579.163230] exe[728877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.244070] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.318329] exe[741075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2