I0719 21:52:19.083895 445017 calibrated_clock.go:74] CalibratedClock(Monotonic): ready I0719 21:52:19.084065 445017 calibrated_clock.go:74] CalibratedClock(Realtime): ready D0719 21:52:21.083355 445017 sampler.go:191] Time: Adjusting syscall overhead down to 875 D0719 21:52:22.082911 445017 sampler.go:191] Time: Adjusting syscall overhead down to 766 D0719 21:52:27.083598 445017 sampler.go:191] Time: Adjusting syscall overhead down to 875 D0719 21:52:35.083256 445017 sampler.go:191] Time: Adjusting syscall overhead down to 766 D0719 21:52:42.083276 445017 sampler.go:191] Time: Adjusting syscall overhead down to 671 I0719 21:52:52.826289 446768 main.go:230] *************************** I0719 21:52:52.826525 446768 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot exec -user=0:0 -cap CAP_CHOWN -cap CAP_DAC_OVERRIDE -cap CAP_DAC_READ_SEARCH -cap CAP_FOWNER -cap CAP_FSETID -cap CAP_KILL -cap CAP_SETGID -cap CAP_SETUID -cap CAP_SETPCAP -cap CAP_LINUX_IMMUTABLE -cap CAP_NET_BIND_SERVICE -cap CAP_NET_BROADCAST -cap CAP_NET_ADMIN -cap CAP_NET_RAW -cap CAP_IPC_LOCK -cap CAP_IPC_OWNER -cap CAP_SYS_MODULE -cap CAP_SYS_RAWIO -cap CAP_SYS_CHROOT -cap CAP_SYS_PTRACE -cap CAP_SYS_PACCT -cap CAP_SYS_ADMIN -cap CAP_SYS_BOOT -cap CAP_SYS_NICE -cap CAP_SYS_RESOURCE -cap CAP_SYS_TIME -cap CAP_SYS_TTY_CONFIG -cap CAP_MKNOD -cap CAP_LEASE -cap CAP_AUDIT_WRITE -cap CAP_AUDIT_CONTROL -cap CAP_SETFCAP -cap CAP_MAC_OVERRIDE -cap CAP_MAC_ADMIN -cap CAP_SYSLOG -cap CAP_WAKE_ALARM -cap CAP_BLOCK_SUSPEND -cap CAP_AUDIT_READ ci-gvisor-systrap-1-race-0 /syz-executor2063604648] I0719 21:52:52.826743 446768 main.go:232] Version 0.0.0 I0719 21:52:52.826799 446768 main.go:233] GOOS: linux I0719 21:52:52.826823 446768 main.go:234] GOARCH: amd64 I0719 21:52:52.826854 446768 main.go:235] PID: 446768 I0719 21:52:52.826891 446768 main.go:236] UID: 0, GID: 0 I0719 21:52:52.826931 446768 main.go:237] Configuration: I0719 21:52:52.826976 446768 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0719 21:52:52.827020 446768 main.go:239] Platform: systrap I0719 21:52:52.827051 446768 main.go:240] FileAccess: shared I0719 21:52:52.827113 446768 main.go:241] Directfs: true I0719 21:52:52.827158 446768 main.go:242] Overlay: none I0719 21:52:52.827203 446768 main.go:243] Network: sandbox, logging: false I0719 21:52:52.827240 446768 main.go:244] Strace: false, max size: 1024, syscalls: I0719 21:52:52.827288 446768 main.go:245] IOURING: false I0719 21:52:52.827357 446768 main.go:246] Debug: true I0719 21:52:52.827403 446768 main.go:247] Systemd: false I0719 21:52:52.827446 446768 main.go:248] *************************** W0719 21:52:52.827486 446768 main.go:253] Block the TERM signal. This is only safe in tests! D0719 21:52:52.827724 446768 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-0}, opts: {Exact:false SkipCheck:false TryLock:false RootContainer:false} D0719 21:52:52.833328 446768 container.go:654] Signal container, cid: ci-gvisor-systrap-1-race-0, signal: signal 0 (0) D0719 21:52:52.833406 446768 sandbox.go:1180] Signal sandbox "ci-gvisor-systrap-1-race-0" D0719 21:52:52.833442 446768 sandbox.go:606] Connecting to sandbox "ci-gvisor-systrap-1-race-0" D0719 21:52:52.833745 446768 urpc.go:568] urpc: successfully marshalled 106 bytes. D0719 21:52:52.834059 445017 urpc.go:611] urpc: unmarshal success. D0719 21:52:52.834518 445017 controller.go:619] containerManager.Signal: cid: ci-gvisor-systrap-1-race-0, PID: 0, signal: 0, mode: Process D0719 21:52:52.834796 445017 urpc.go:568] urpc: successfully marshalled 37 bytes. D0719 21:52:52.835070 446768 urpc.go:611] urpc: unmarshal success. D0719 21:52:52.835288 446768 exec.go:129] Exec arguments: /syz-executor2063604648 D0719 21:52:52.835385 446768 exec.go:130] Exec capabilities: &{PermittedCaps:274877906943 InheritableCaps:274877906943 EffectiveCaps:274877906943 BoundingCaps:274877906943 AmbientCaps:0} D0719 21:52:52.835480 446768 container.go:573] Execute in container, cid: ci-gvisor-systrap-1-race-0, args: /syz-executor2063604648 D0719 21:52:52.835528 446768 sandbox.go:552] Executing new process in container "ci-gvisor-systrap-1-race-0" in sandbox "ci-gvisor-systrap-1-race-0" D0719 21:52:52.835585 446768 sandbox.go:606] Connecting to sandbox "ci-gvisor-systrap-1-race-0" D0719 21:52:52.836626 445017 urpc.go:611] urpc: unmarshal success. D0719 21:52:52.837498 445017 controller.go:368] containerManager.ExecuteAsync, cid: ci-gvisor-systrap-1-race-0, args: /syz-executor2063604648 I0719 21:52:52.838032 445017 kernel.go:831] EXEC: [/syz-executor2063604648] D0719 21:52:52.839938 445017 syscalls.go:262] Allocating stack with size of 8388608 bytes D0719 21:52:52.840651 445017 loader.go:1124] updated processes: map[{ci-gvisor-systrap-1-race-0 0}:0xc00026e6c0 {ci-gvisor-systrap-1-race-0 7}:0xc00031afc0] D0719 21:52:52.840829 445017 urpc.go:568] urpc: successfully marshalled 36 bytes. D0719 21:52:52.840946 446768 urpc.go:568] urpc: successfully marshalled 462 bytes. D0719 21:52:52.841070 446768 urpc.go:611] urpc: unmarshal success. D0719 21:52:52.841183 446768 container.go:642] Wait on process 7 in container, cid: ci-gvisor-systrap-1-race-0 D0719 21:52:52.841281 446768 sandbox.go:1134] Waiting for PID 7 in sandbox "ci-gvisor-systrap-1-race-0" D0719 21:52:52.841323 446768 sandbox.go:606] Connecting to sandbox "ci-gvisor-systrap-1-race-0" D0719 21:52:52.841671 446768 urpc.go:568] urpc: successfully marshalled 88 bytes. D0719 21:52:52.841767 445017 urpc.go:611] urpc: unmarshal success. D0719 21:52:52.841943 445017 controller.go:558] containerManager.Wait, cid: ci-gvisor-systrap-1-race-0, pid: 7 D0719 21:52:52.859076 445017 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 558eff7af9f3:sysno 218 D0719 21:52:52.859238 445017 usertrap_amd64.go:106] [ 7: 7] Map a usertrap vma at 62000 D0719 21:52:52.859486 445017 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc000886180 1 D0719 21:52:52.859683 445017 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 558eff7af9f3 trap addr 62050 ([184 218 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0719 21:52:52.861174 445017 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 558eff7afa86:sysno 334 D0719 21:52:52.861231 445017 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc000886180 2 D0719 21:52:52.861301 445017 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 558eff7afa86 trap addr 620a0 ([184 78 1 0 0 15 5] -> [255 36 37 160 32 6 0]) I0719 21:52:52.861561 445017 compat.go:120] Unsupported syscall rseq(0x558eff831da0,0x20,0x0,0x53053053,0x0,0x558eff7fbd04). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/rseq for more information. D0719 21:52:52.862833 445017 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 558eff7bfd19:sysno 318 D0719 21:52:52.862887 445017 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc000886180 3 D0719 21:52:52.862938 445017 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 558eff7bfd19 trap addr 620f0 ([184 62 1 0 0 15 5] -> [255 36 37 240 32 6 0]) D0719 21:52:52.863818 445017 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 558eff7a6450:sysno 12 D0719 21:52:52.863876 445017 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc000886180 4 D0719 21:52:52.863944 445017 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 558eff7a6450 trap addr 62140 ([184 12 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0719 21:52:52.865988 445017 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 558eff7a6750:sysno 10 D0719 21:52:52.866092 445017 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc000886180 5 D0719 21:52:52.866170 445017 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 558eff7a6750 trap addr 62190 ([184 10 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0719 21:52:52.867131 445017 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 558eff7a4c40:sysno 39 D0719 21:52:52.867189 445017 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc000886180 6 D0719 21:52:52.867260 445017 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 558eff7a4c40 trap addr 621e0 ([184 39 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0719 21:52:52.868265 445017 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 558eff7a561a:sysno 257 D0719 21:52:52.868373 445017 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc000886180 7 D0719 21:52:52.868494 445017 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 558eff7a561a trap addr 62230 ([184 1 1 0 0 15 5] -> [255 36 37 48 34 6 0]) D0719 21:52:52.869826 445017 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 558eff7a5573:sysno 262 D0719 21:52:52.869871 445017 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc000886180 8 D0719 21:52:52.869929 445017 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 558eff7a5573 trap addr 62280 ([184 6 1 0 0 15 5] -> [255 36 37 128 34 6 0]) D0719 21:52:52.872269 445017 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 558eff770ff8:sysno 13 D0719 21:52:52.872325 445017 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc000886180 9 D0719 21:52:52.872383 445017 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 558eff770ff8 trap addr 622d0 ([184 13 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0719 21:52:52.873724 445017 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 558eff7a7b10:sysno 272 D0719 21:52:52.873817 445017 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc000886180 10 D0719 21:52:52.873973 445017 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 558eff7a7b10 trap addr 62320 ([184 16 1 0 0 15 5] -> [255 36 37 32 35 6 0]) D0719 21:52:52.876967 445017 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 558eff7a44ec:sysno 56 D0719 21:52:52.877057 445017 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc000886180 11 D0719 21:52:52.877163 445017 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 558eff7a44ec trap addr 62370 ([184 56 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0719 21:52:52.911961 445017 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 558eff7a3f5c:sysno 61 D0719 21:52:52.912037 445017 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc000886180 12 D0719 21:52:52.912303 445017 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 558eff7a3f5c trap addr 623c0 ([184 61 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0719 21:52:52.939799 445017 usertrap_amd64.go:212] [ 8( 1): 8( 1)] Found the pattern at ip 558eff7a4526:sysno 273 D0719 21:52:52.939959 445017 usertrap_amd64.go:122] [ 8( 1): 8( 1)] Allocate a new trap: 0xc0008860c0 12 D0719 21:52:52.940579 445017 usertrap_amd64.go:225] [ 8( 1): 8( 1)] Apply the binary patch addr 558eff7a4526 trap addr 623c0 ([184 17 1 0 0 15 5] -> [255 36 37 192 35 6 0]) D0719 21:52:52.945592 445017 usertrap_amd64.go:212] [ 8( 1): 8( 1)] Found the pattern at ip 558eff7a7ab3:sysno 165 D0719 21:52:52.945705 445017 usertrap_amd64.go:122] [ 8( 1): 8( 1)] Allocate a new trap: 0xc0008860c0 13 D0719 21:52:52.945776 445017 usertrap_amd64.go:225] [ 8( 1): 8( 1)] Apply the binary patch addr 558eff7a7ab3 trap addr 62410 ([184 165 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0719 21:52:52.946681 445017 usertrap_amd64.go:212] [ 8( 1): 8( 1)] Found the pattern at ip 558eff7a7936:sysno 157 D0719 21:52:52.946736 445017 usertrap_amd64.go:122] [ 8( 1): 8( 1)] Allocate a new trap: 0xc0008860c0 14 D0719 21:52:52.946826 445017 usertrap_amd64.go:225] [ 8( 1): 8( 1)] Apply the binary patch addr 558eff7a7936 trap addr 62460 ([184 157 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0719 21:52:52.947276 445017 usertrap_amd64.go:212] [ 8( 1): 8( 1)] Found the pattern at ip 558eff7a4c60:sysno 112 D0719 21:52:52.947337 445017 usertrap_amd64.go:122] [ 8( 1): 8( 1)] Allocate a new trap: 0xc0008860c0 15 D0719 21:52:52.947410 445017 usertrap_amd64.go:225] [ 8( 1): 8( 1)] Apply the binary patch addr 558eff7a4c60 trap addr 624b0 ([184 112 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0719 21:52:52.949827 445017 usertrap_amd64.go:212] [ 8( 1): 8( 1)] Found the pattern at ip 558eff7a57a9:sysno 1 D0719 21:52:52.949910 445017 usertrap_amd64.go:122] [ 8( 1): 8( 1)] Allocate a new trap: 0xc0008860c0 16 D0719 21:52:52.949980 445017 usertrap_amd64.go:225] [ 8( 1): 8( 1)] Apply the binary patch addr 558eff7a57a9 trap addr 62500 ([184 1 0 0 0 15 5] -> [255 36 37 0 37 6 0]) D0719 21:52:52.950815 445017 usertrap_amd64.go:212] [ 8( 1): 8( 1)] Found the pattern at ip 558eff7a5879:sysno 3 D0719 21:52:52.950867 445017 usertrap_amd64.go:122] [ 8( 1): 8( 1)] Allocate a new trap: 0xc0008860c0 17 D0719 21:52:52.950927 445017 usertrap_amd64.go:225] [ 8( 1): 8( 1)] Apply the binary patch addr 558eff7a5879 trap addr 62550 ([184 3 0 0 0 15 5] -> [255 36 37 80 37 6 0]) D0719 21:52:52.992838 445017 usertrap_amd64.go:212] [ 8( 1): 8( 1)] Found the pattern at ip 558eff7a5900:sysno 33 D0719 21:52:52.992946 445017 usertrap_amd64.go:122] [ 8( 1): 8( 1)] Allocate a new trap: 0xc0008860c0 18 D0719 21:52:52.993010 445017 usertrap_amd64.go:225] [ 8( 1): 8( 1)] Apply the binary patch addr 558eff7a5900 trap addr 625a0 ([184 33 0 0 0 15 5] -> [255 36 37 160 37 6 0]) D0719 21:52:52.993241 445017 usertrap_amd64.go:212] [ 8( 1): 8( 1)] Found the pattern at ip 558eff7a6554:sysno 16 D0719 21:52:52.993336 445017 usertrap_amd64.go:122] [ 8( 1): 8( 1)] Allocate a new trap: 0xc0008860c0 19 D0719 21:52:52.993400 445017 usertrap_amd64.go:225] [ 8( 1): 8( 1)] Apply the binary patch addr 558eff7a6554 trap addr 625f0 ([184 16 0 0 0 15 5] -> [255 36 37 240 37 6 0]) D0719 21:52:53.002859 445017 usertrap_amd64.go:212] [ 8( 1): 8( 1)] Found the pattern at ip 558eff7a80a0:sysno 41 D0719 21:52:53.002977 445017 usertrap_amd64.go:122] [ 8( 1): 8( 1)] Allocate a new trap: 0xc0008860c0 20 D0719 21:52:53.003073 445017 usertrap_amd64.go:225] [ 8( 1): 8( 1)] Apply the binary patch addr 558eff7a80a0 trap addr 62640 ([184 41 0 0 0 15 5] -> [255 36 37 64 38 6 0]) D0719 21:52:53.005245 445017 usertrap_amd64.go:212] [ 8( 1): 8( 1)] Found the pattern at ip 558eff7a60d0:sysno 3 D0719 21:52:53.005371 445017 usertrap_amd64.go:122] [ 8( 1): 8( 1)] Allocate a new trap: 0xc0008860c0 21 D0719 21:52:53.005459 445017 usertrap_amd64.go:225] [ 8( 1): 8( 1)] Apply the binary patch addr 558eff7a60d0 trap addr 62690 ([184 3 0 0 0 15 5] -> [255 36 37 144 38 6 0]) D0719 21:52:53.011064 445017 usertrap_amd64.go:212] [ 8( 1): 8( 1)] Found the pattern at ip 558eff7a7fec:sysno 44 D0719 21:52:53.011223 445017 usertrap_amd64.go:122] [ 8( 1): 8( 1)] Allocate a new trap: 0xc0008860c0 22 D0719 21:52:53.011330 445017 usertrap_amd64.go:225] [ 8( 1): 8( 1)] Apply the binary patch addr 558eff7a7fec trap addr 626e0 ([184 44 0 0 0 15 5] -> [255 36 37 224 38 6 0]) D0719 21:52:53.011923 445017 usertrap_amd64.go:212] [ 8( 1): 8( 1)] Found the pattern at ip 558eff7a7f32:sysno 45 D0719 21:52:53.011979 445017 usertrap_amd64.go:122] [ 8( 1): 8( 1)] Allocate a new trap: 0xc0008860c0 23 D0719 21:52:53.012067 445017 usertrap_amd64.go:225] [ 8( 1): 8( 1)] Apply the binary patch addr 558eff7a7f32 trap addr 62730 ([184 45 0 0 0 15 5] -> [255 36 37 48 39 6 0]) D0719 21:52:53.023347 445017 usertrap_amd64.go:212] [ 8( 1): 8( 1)] Found the pattern at ip 558eff7a55a0:sysno 83 D0719 21:52:53.023557 445017 usertrap_amd64.go:122] [ 8( 1): 8( 1)] Allocate a new trap: 0xc0008860c0 24 D0719 21:52:53.023701 445017 usertrap_amd64.go:225] [ 8( 1): 8( 1)] Apply the binary patch addr 558eff7a55a0 trap addr 62780 ([184 83 0 0 0 15 5] -> [255 36 37 128 39 6 0]) D0719 21:52:53.024562 445017 usertrap_amd64.go:212] [ 8( 1): 8( 1)] Found the pattern at ip 558eff7a60a0:sysno 88 D0719 21:52:53.024624 445017 usertrap_amd64.go:122] [ 8( 1): 8( 1)] Allocate a new trap: 0xc0008860c0 25 D0719 21:52:53.024723 445017 usertrap_amd64.go:225] [ 8( 1): 8( 1)] Apply the binary patch addr 558eff7a60a0 trap addr 627d0 ([184 88 0 0 0 15 5] -> [255 36 37 208 39 6 0]) D0719 21:52:53.030465 445017 usertrap_amd64.go:212] [ 8( 1): 8( 1)] Found the pattern at ip 558eff7a3f5c:sysno 61 D0719 21:52:53.030580 445017 usertrap_amd64.go:122] [ 8( 1): 8( 1)] Allocate a new trap: 0xc0008860c0 26 D0719 21:52:53.030957 445017 usertrap_amd64.go:225] [ 8( 1): 8( 1)] Apply the binary patch addr 558eff7a3f5c trap addr 62820 ([184 61 0 0 0 15 5] -> [255 36 37 32 40 6 0]) D0719 21:52:53.032168 445017 usertrap_amd64.go:212] [ 8( 1): 8( 1)] Found the pattern at ip 558eff7e0ebc:sysno 230 D0719 21:52:53.032243 445017 usertrap_amd64.go:122] [ 8( 1): 8( 1)] Allocate a new trap: 0xc0008860c0 27 D0719 21:52:53.032303 445017 usertrap_amd64.go:225] [ 8( 1): 8( 1)] Apply the binary patch addr 558eff7e0ebc trap addr 62870 ([184 230 0 0 0 15 5] -> [255 36 37 112 40 6 0]) D0719 21:52:53.048283 445017 usertrap_amd64.go:212] [ 9( 2): 9( 2)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:53.048420 445017 usertrap_amd64.go:122] [ 9( 2): 9( 2)] Allocate a new trap: 0xc00037e660 26 D0719 21:52:53.048627 445017 usertrap_amd64.go:225] [ 9( 2): 9( 2)] Apply the binary patch addr 558eff7d6540 trap addr 62820 ([184 109 0 0 0 15 5] -> [255 36 37 32 40 6 0]) executing program D0719 21:52:53.057993 445017 usertrap_amd64.go:212] [ 9( 2): 9( 2)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:53.058089 445017 usertrap_amd64.go:122] [ 9( 2): 9( 2)] Allocate a new trap: 0xc00037e660 27 D0719 21:52:53.058161 445017 usertrap_amd64.go:225] [ 9( 2): 9( 2)] Apply the binary patch addr 558eff7813d2 trap addr 62870 ([184 14 0 0 0 15 5] -> [255 36 37 112 40 6 0]) D0719 21:52:53.059643 445017 usertrap_amd64.go:212] [ 9( 2): 9( 2)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:53.059814 445017 usertrap_amd64.go:122] [ 9( 2): 9( 2)] Allocate a new trap: 0xc00037e660 28 D0719 21:52:53.059918 445017 usertrap_amd64.go:225] [ 9( 2): 9( 2)] Apply the binary patch addr 558eff7a66cc trap addr 628c0 ([184 9 0 0 0 15 5] -> [255 36 37 192 40 6 0]) D0719 21:52:53.064051 445017 usertrap_amd64.go:212] [ 9( 2): 9( 2)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:53.064167 445017 usertrap_amd64.go:122] [ 9( 2): 9( 2)] Allocate a new trap: 0xc00037e660 29 D0719 21:52:53.064279 445017 usertrap_amd64.go:225] [ 9( 2): 9( 2)] Apply the binary patch addr 558eff7d6982 trap addr 62910 ([184 179 1 0 0 15 5] -> [255 36 37 16 41 6 0]) I0719 21:52:53.064540 445017 compat.go:120] Unsupported syscall clone3(0x7ee64fcce830,0x58,0x558eff7809a0,0x8,0x7ed6b8b696c0,0x7ee64fcce917). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/clone3 for more information. D0719 21:52:53.064709 445017 usertrap_amd64.go:212] [ 9( 2): 9( 2)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:53.064760 445017 usertrap_amd64.go:122] [ 9( 2): 9( 2)] Allocate a new trap: 0xc00037e660 30 D0719 21:52:53.064836 445017 usertrap_amd64.go:225] [ 9( 2): 9( 2)] Apply the binary patch addr 558eff7d693b trap addr 62960 ([184 56 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:53.065597 445017 usertrap_amd64.go:212] [ 9( 2): 9( 2)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:53.065661 445017 usertrap_amd64.go:122] [ 9( 2): 9( 2)] Allocate a new trap: 0xc00037e660 31 D0719 21:52:53.065728 445017 usertrap_amd64.go:225] [ 9( 2): 9( 2)] Apply the binary patch addr 558eff781340 trap addr 629b0 ([184 14 0 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:53.065990 445017 usertrap_amd64.go:212] [ 9( 2): 10( 3)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:53.066092 445017 usertrap_amd64.go:122] [ 9( 2): 10( 3)] Allocate a new trap: 0xc00037e660 32 D0719 21:52:53.066187 445017 usertrap_amd64.go:225] [ 9( 2): 10( 3)] Apply the binary patch addr 558eff780a50 trap addr 62a00 ([184 17 1 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:53.117420 445017 usertrap_amd64.go:212] [ 9( 2): 9( 2)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:53.117558 445017 usertrap_amd64.go:122] [ 9( 2): 9( 2)] Allocate a new trap: 0xc00037e660 33 D0719 21:52:53.117674 445017 usertrap_amd64.go:225] [ 9( 2): 9( 2)] Apply the binary patch addr 558eff7a58a3 trap addr 62a50 ([184 3 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:53.120632 445017 usertrap_amd64.go:212] [ 9( 2): 9( 2)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:53.120712 445017 usertrap_amd64.go:122] [ 9( 2): 9( 2)] Allocate a new trap: 0xc00037e660 34 D0719 21:52:53.120797 445017 usertrap_amd64.go:225] [ 9( 2): 9( 2)] Apply the binary patch addr 558eff7a57e8 trap addr 62aa0 ([184 1 0 0 0 15 5] -> [255 36 37 160 42 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:53.121550 445017 task_exit.go:204] [ 9( 2): 9( 2)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.121730 445017 task_signals.go:204] [ 9( 2): 12( 5)] Signal 9, PID: 12, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.121846 445017 task_signals.go:204] [ 9( 2): 10( 3)] Signal 9, PID: 10, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.121854 445017 task_exit.go:204] [ 9( 2): 12( 5)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.122041 445017 task_signals.go:204] [ 9( 2): 11( 4)] Signal 9, PID: 11, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.123107 445017 task_exit.go:204] [ 9( 2): 12( 5)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.123156 445017 task_exit.go:204] [ 9( 2): 12( 5)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.123378 445017 task_exit.go:204] [ 9( 2): 10( 3)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.123525 445017 task_exit.go:204] [ 9( 2): 11( 4)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.123800 445017 task_exit.go:204] [ 9( 2): 11( 4)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.123857 445017 task_exit.go:204] [ 9( 2): 11( 4)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.124108 445017 task_exit.go:204] [ 9( 2): 9( 2)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.127043 445017 task_exit.go:204] [ 9( 2): 10( 3)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.127112 445017 task_exit.go:204] [ 9( 2): 10( 3)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.127191 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:53.127896 445017 task_exit.go:204] [ 9( 2): 9( 2)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.135657 445017 usertrap_amd64.go:212] [ 13( 6): 13( 6)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:53.135791 445017 usertrap_amd64.go:122] [ 13( 6): 13( 6)] Allocate a new trap: 0xc00037e6c0 28 D0719 21:52:53.136259 445017 usertrap_amd64.go:225] [ 13( 6): 13( 6)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:53.140467 445017 usertrap_amd64.go:212] [ 13( 6): 13( 6)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:53.140543 445017 usertrap_amd64.go:122] [ 13( 6): 13( 6)] Allocate a new trap: 0xc00037e6c0 29 D0719 21:52:53.140614 445017 usertrap_amd64.go:225] [ 13( 6): 13( 6)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:53.141652 445017 usertrap_amd64.go:212] [ 13( 6): 13( 6)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:53.141713 445017 usertrap_amd64.go:122] [ 13( 6): 13( 6)] Allocate a new trap: 0xc00037e6c0 30 D0719 21:52:53.141764 445017 usertrap_amd64.go:225] [ 13( 6): 13( 6)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:53.145158 445017 usertrap_amd64.go:212] [ 13( 6): 13( 6)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:53.145230 445017 usertrap_amd64.go:122] [ 13( 6): 13( 6)] Allocate a new trap: 0xc00037e6c0 31 D0719 21:52:53.145288 445017 usertrap_amd64.go:225] [ 13( 6): 13( 6)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:53.145472 445017 usertrap_amd64.go:212] [ 13( 6): 13( 6)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:53.145522 445017 usertrap_amd64.go:122] [ 13( 6): 13( 6)] Allocate a new trap: 0xc00037e6c0 32 D0719 21:52:53.145565 445017 usertrap_amd64.go:225] [ 13( 6): 13( 6)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:53.146074 445017 usertrap_amd64.go:212] [ 13( 6): 13( 6)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:53.146119 445017 usertrap_amd64.go:122] [ 13( 6): 13( 6)] Allocate a new trap: 0xc00037e6c0 33 D0719 21:52:53.146182 445017 usertrap_amd64.go:225] [ 13( 6): 13( 6)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:53.146647 445017 usertrap_amd64.go:212] [ 13( 6): 14( 7)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:53.146708 445017 usertrap_amd64.go:122] [ 13( 6): 14( 7)] Allocate a new trap: 0xc00037e6c0 34 D0719 21:52:53.146860 445017 usertrap_amd64.go:225] [ 13( 6): 14( 7)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:53.177883 445017 usertrap_amd64.go:212] [ 13( 6): 13( 6)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:53.178019 445017 usertrap_amd64.go:122] [ 13( 6): 13( 6)] Allocate a new trap: 0xc00037e6c0 35 D0719 21:52:53.178111 445017 usertrap_amd64.go:225] [ 13( 6): 13( 6)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:53.188046 445017 usertrap_amd64.go:212] [ 13( 6): 13( 6)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:53.188146 445017 usertrap_amd64.go:122] [ 13( 6): 13( 6)] Allocate a new trap: 0xc00037e6c0 36 D0719 21:52:53.188231 445017 usertrap_amd64.go:225] [ 13( 6): 13( 6)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:53.189182 445017 task_exit.go:204] [ 13( 6): 13( 6)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.189466 445017 task_exit.go:204] [ 13( 6): 13( 6)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.189649 445017 task_signals.go:204] [ 13( 6): 14( 7)] Signal 13, PID: 14, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.189723 445017 task_exit.go:204] [ 13( 6): 14( 7)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.189911 445017 task_exit.go:204] [ 13( 6): 14( 7)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.189952 445017 task_exit.go:204] [ 13( 6): 14( 7)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.190119 445017 task_signals.go:204] [ 13( 6): 15( 8)] Signal 13, PID: 15, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.190229 445017 task_exit.go:204] [ 13( 6): 15( 8)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.193561 445017 task_exit.go:204] [ 13( 6): 15( 8)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.193914 445017 task_exit.go:204] [ 13( 6): 15( 8)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.194095 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:53.194225 445017 task_exit.go:204] [ 13( 6): 13( 6)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.201523 445017 usertrap_amd64.go:212] [ 16( 9): 16( 9)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:53.201621 445017 usertrap_amd64.go:122] [ 16( 9): 16( 9)] Allocate a new trap: 0xc000048030 28 D0719 21:52:53.202025 445017 usertrap_amd64.go:225] [ 16( 9): 16( 9)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:53.208774 445017 usertrap_amd64.go:212] [ 16( 9): 16( 9)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:53.208976 445017 usertrap_amd64.go:122] [ 16( 9): 16( 9)] Allocate a new trap: 0xc000048030 29 D0719 21:52:53.209113 445017 usertrap_amd64.go:225] [ 16( 9): 16( 9)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:53.210359 445017 usertrap_amd64.go:212] [ 16( 9): 16( 9)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:53.210491 445017 usertrap_amd64.go:122] [ 16( 9): 16( 9)] Allocate a new trap: 0xc000048030 30 D0719 21:52:53.210615 445017 usertrap_amd64.go:225] [ 16( 9): 16( 9)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:53.223510 445017 usertrap_amd64.go:212] [ 16( 9): 16( 9)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:53.223736 445017 usertrap_amd64.go:122] [ 16( 9): 16( 9)] Allocate a new trap: 0xc000048030 31 D0719 21:52:53.223887 445017 usertrap_amd64.go:225] [ 16( 9): 16( 9)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:53.224136 445017 usertrap_amd64.go:212] [ 16( 9): 16( 9)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:53.224198 445017 usertrap_amd64.go:122] [ 16( 9): 16( 9)] Allocate a new trap: 0xc000048030 32 D0719 21:52:53.224242 445017 usertrap_amd64.go:225] [ 16( 9): 16( 9)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:53.224723 445017 usertrap_amd64.go:212] [ 16( 9): 16( 9)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:53.224791 445017 usertrap_amd64.go:122] [ 16( 9): 16( 9)] Allocate a new trap: 0xc000048030 33 D0719 21:52:53.224849 445017 usertrap_amd64.go:225] [ 16( 9): 16( 9)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:53.225586 445017 usertrap_amd64.go:212] [ 16( 9): 17( 10)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:53.225665 445017 usertrap_amd64.go:122] [ 16( 9): 17( 10)] Allocate a new trap: 0xc000048030 34 D0719 21:52:53.225734 445017 usertrap_amd64.go:225] [ 16( 9): 17( 10)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:53.232399 445017 usertrap_amd64.go:212] [ 16( 9): 16( 9)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:53.232520 445017 usertrap_amd64.go:122] [ 16( 9): 16( 9)] Allocate a new trap: 0xc000048030 35 D0719 21:52:53.232602 445017 usertrap_amd64.go:225] [ 16( 9): 16( 9)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:53.234440 445017 usertrap_amd64.go:212] [ 16( 9): 16( 9)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:53.234600 445017 usertrap_amd64.go:122] [ 16( 9): 16( 9)] Allocate a new trap: 0xc000048030 36 D0719 21:52:53.234706 445017 usertrap_amd64.go:225] [ 16( 9): 16( 9)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:53.235249 445017 task_exit.go:204] [ 16( 9): 16( 9)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.235501 445017 task_exit.go:204] [ 16( 9): 16( 9)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.235696 445017 task_signals.go:204] [ 16( 9): 17( 10)] Signal 16, PID: 17, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.235837 445017 task_signals.go:204] [ 16( 9): 18( 11)] Signal 16, PID: 18, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.235914 445017 task_exit.go:204] [ 16( 9): 17( 10)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.236032 445017 task_exit.go:204] [ 16( 9): 18( 11)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.236302 445017 task_exit.go:204] [ 16( 9): 18( 11)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.236397 445017 task_exit.go:204] [ 16( 9): 18( 11)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.239492 445017 task_exit.go:204] [ 16( 9): 17( 10)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.239554 445017 task_exit.go:204] [ 16( 9): 17( 10)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.239682 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:53.240732 445017 task_exit.go:204] [ 16( 9): 16( 9)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.248800 445017 usertrap_amd64.go:212] [ 19( 12): 19( 12)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:53.248892 445017 usertrap_amd64.go:122] [ 19( 12): 19( 12)] Allocate a new trap: 0xc000886090 28 D0719 21:52:53.249315 445017 usertrap_amd64.go:225] [ 19( 12): 19( 12)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:53.252889 445017 usertrap_amd64.go:212] [ 19( 12): 19( 12)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:53.252957 445017 usertrap_amd64.go:122] [ 19( 12): 19( 12)] Allocate a new trap: 0xc000886090 29 D0719 21:52:53.253029 445017 usertrap_amd64.go:225] [ 19( 12): 19( 12)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:53.254297 445017 usertrap_amd64.go:212] [ 19( 12): 19( 12)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:53.254345 445017 usertrap_amd64.go:122] [ 19( 12): 19( 12)] Allocate a new trap: 0xc000886090 30 D0719 21:52:53.254404 445017 usertrap_amd64.go:225] [ 19( 12): 19( 12)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:53.257691 445017 usertrap_amd64.go:212] [ 19( 12): 19( 12)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:53.257772 445017 usertrap_amd64.go:122] [ 19( 12): 19( 12)] Allocate a new trap: 0xc000886090 31 D0719 21:52:53.257860 445017 usertrap_amd64.go:225] [ 19( 12): 19( 12)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:53.258058 445017 usertrap_amd64.go:212] [ 19( 12): 19( 12)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:53.258108 445017 usertrap_amd64.go:122] [ 19( 12): 19( 12)] Allocate a new trap: 0xc000886090 32 D0719 21:52:53.258172 445017 usertrap_amd64.go:225] [ 19( 12): 19( 12)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:53.258782 445017 usertrap_amd64.go:212] [ 19( 12): 19( 12)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:53.258846 445017 usertrap_amd64.go:122] [ 19( 12): 19( 12)] Allocate a new trap: 0xc000886090 33 D0719 21:52:53.258902 445017 usertrap_amd64.go:225] [ 19( 12): 19( 12)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:53.259342 445017 usertrap_amd64.go:212] [ 19( 12): 20( 13)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:53.259391 445017 usertrap_amd64.go:122] [ 19( 12): 20( 13)] Allocate a new trap: 0xc000886090 34 D0719 21:52:53.259443 445017 usertrap_amd64.go:225] [ 19( 12): 20( 13)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:53.270212 445017 usertrap_amd64.go:212] [ 19( 12): 19( 12)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:53.270307 445017 usertrap_amd64.go:122] [ 19( 12): 19( 12)] Allocate a new trap: 0xc000886090 35 D0719 21:52:53.270388 445017 usertrap_amd64.go:225] [ 19( 12): 19( 12)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:53.273296 445017 usertrap_amd64.go:212] [ 19( 12): 19( 12)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:53.273373 445017 usertrap_amd64.go:122] [ 19( 12): 19( 12)] Allocate a new trap: 0xc000886090 36 D0719 21:52:53.273441 445017 usertrap_amd64.go:225] [ 19( 12): 19( 12)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:53.274197 445017 task_exit.go:204] [ 19( 12): 19( 12)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.274442 445017 task_signals.go:204] [ 19( 12): 20( 13)] Signal 19, PID: 20, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.274569 445017 task_exit.go:204] [ 19( 12): 20( 13)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.274563 445017 task_signals.go:204] [ 19( 12): 21( 14)] Signal 19, PID: 21, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.274653 445017 task_exit.go:204] [ 19( 12): 21( 14)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.274772 445017 task_exit.go:204] [ 19( 12): 19( 12)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.274957 445017 task_exit.go:204] [ 19( 12): 20( 13)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.275010 445017 task_exit.go:204] [ 19( 12): 20( 13)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.278041 445017 task_exit.go:204] [ 19( 12): 21( 14)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.278106 445017 task_exit.go:204] [ 19( 12): 21( 14)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.278165 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:53.278984 445017 task_exit.go:204] [ 19( 12): 19( 12)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.286016 445017 usertrap_amd64.go:212] [ 22( 15): 22( 15)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:53.286112 445017 usertrap_amd64.go:122] [ 22( 15): 22( 15)] Allocate a new trap: 0xc00030ea80 28 D0719 21:52:53.286598 445017 usertrap_amd64.go:225] [ 22( 15): 22( 15)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:53.291218 445017 usertrap_amd64.go:212] [ 22( 15): 22( 15)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:53.291285 445017 usertrap_amd64.go:122] [ 22( 15): 22( 15)] Allocate a new trap: 0xc00030ea80 29 D0719 21:52:53.291355 445017 usertrap_amd64.go:225] [ 22( 15): 22( 15)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:53.292503 445017 usertrap_amd64.go:212] [ 22( 15): 22( 15)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:53.292556 445017 usertrap_amd64.go:122] [ 22( 15): 22( 15)] Allocate a new trap: 0xc00030ea80 30 D0719 21:52:53.292639 445017 usertrap_amd64.go:225] [ 22( 15): 22( 15)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:53.296253 445017 usertrap_amd64.go:212] [ 22( 15): 22( 15)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:53.296299 445017 usertrap_amd64.go:122] [ 22( 15): 22( 15)] Allocate a new trap: 0xc00030ea80 31 D0719 21:52:53.296342 445017 usertrap_amd64.go:225] [ 22( 15): 22( 15)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:53.296531 445017 usertrap_amd64.go:212] [ 22( 15): 22( 15)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:53.296576 445017 usertrap_amd64.go:122] [ 22( 15): 22( 15)] Allocate a new trap: 0xc00030ea80 32 D0719 21:52:53.296643 445017 usertrap_amd64.go:225] [ 22( 15): 22( 15)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:53.297475 445017 usertrap_amd64.go:212] [ 22( 15): 22( 15)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:53.297603 445017 usertrap_amd64.go:122] [ 22( 15): 22( 15)] Allocate a new trap: 0xc00030ea80 33 D0719 21:52:53.297698 445017 usertrap_amd64.go:225] [ 22( 15): 22( 15)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:53.297832 445017 usertrap_amd64.go:212] [ 22( 15): 23( 16)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:53.297940 445017 usertrap_amd64.go:122] [ 22( 15): 23( 16)] Allocate a new trap: 0xc00030ea80 34 D0719 21:52:53.298041 445017 usertrap_amd64.go:225] [ 22( 15): 23( 16)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:53.306719 445017 usertrap_amd64.go:212] [ 22( 15): 22( 15)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:53.306841 445017 usertrap_amd64.go:122] [ 22( 15): 22( 15)] Allocate a new trap: 0xc00030ea80 35 D0719 21:52:53.306918 445017 usertrap_amd64.go:225] [ 22( 15): 22( 15)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:53.309465 445017 usertrap_amd64.go:212] [ 22( 15): 22( 15)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:53.309547 445017 usertrap_amd64.go:122] [ 22( 15): 22( 15)] Allocate a new trap: 0xc00030ea80 36 D0719 21:52:53.309610 445017 usertrap_amd64.go:225] [ 22( 15): 22( 15)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:53.310025 445017 task_exit.go:204] [ 22( 15): 22( 15)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.310249 445017 task_signals.go:204] [ 22( 15): 23( 16)] Signal 22, PID: 23, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.310323 445017 task_signals.go:204] [ 22( 15): 24( 17)] Signal 22, PID: 24, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.310408 445017 task_exit.go:204] [ 22( 15): 22( 15)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.310524 445017 task_exit.go:204] [ 22( 15): 23( 16)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.310714 445017 task_exit.go:204] [ 22( 15): 23( 16)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.310780 445017 task_exit.go:204] [ 22( 15): 23( 16)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.310909 445017 task_exit.go:204] [ 22( 15): 24( 17)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.314066 445017 task_exit.go:204] [ 22( 15): 24( 17)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.314141 445017 task_exit.go:204] [ 22( 15): 24( 17)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.314238 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:53.315763 445017 task_exit.go:204] [ 22( 15): 22( 15)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.330633 445017 usertrap_amd64.go:212] [ 25( 18): 25( 18)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:53.330785 445017 usertrap_amd64.go:122] [ 25( 18): 25( 18)] Allocate a new trap: 0xc0008c20c0 28 D0719 21:52:53.331467 445017 usertrap_amd64.go:225] [ 25( 18): 25( 18)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:53.335096 445017 usertrap_amd64.go:212] [ 25( 18): 25( 18)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:53.335172 445017 usertrap_amd64.go:122] [ 25( 18): 25( 18)] Allocate a new trap: 0xc0008c20c0 29 D0719 21:52:53.335243 445017 usertrap_amd64.go:225] [ 25( 18): 25( 18)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:53.336206 445017 usertrap_amd64.go:212] [ 25( 18): 25( 18)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:53.336266 445017 usertrap_amd64.go:122] [ 25( 18): 25( 18)] Allocate a new trap: 0xc0008c20c0 30 D0719 21:52:53.336311 445017 usertrap_amd64.go:225] [ 25( 18): 25( 18)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:53.341196 445017 usertrap_amd64.go:212] [ 25( 18): 25( 18)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:53.341261 445017 usertrap_amd64.go:122] [ 25( 18): 25( 18)] Allocate a new trap: 0xc0008c20c0 31 D0719 21:52:53.341338 445017 usertrap_amd64.go:225] [ 25( 18): 25( 18)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:53.341595 445017 usertrap_amd64.go:212] [ 25( 18): 25( 18)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:53.341720 445017 usertrap_amd64.go:122] [ 25( 18): 25( 18)] Allocate a new trap: 0xc0008c20c0 32 D0719 21:52:53.341840 445017 usertrap_amd64.go:225] [ 25( 18): 25( 18)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:53.342504 445017 usertrap_amd64.go:212] [ 25( 18): 25( 18)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:53.342809 445017 usertrap_amd64.go:122] [ 25( 18): 25( 18)] Allocate a new trap: 0xc0008c20c0 33 D0719 21:52:53.342911 445017 usertrap_amd64.go:225] [ 25( 18): 25( 18)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:53.343170 445017 usertrap_amd64.go:212] [ 25( 18): 26( 19)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:53.343237 445017 usertrap_amd64.go:122] [ 25( 18): 26( 19)] Allocate a new trap: 0xc0008c20c0 34 D0719 21:52:53.343329 445017 usertrap_amd64.go:225] [ 25( 18): 26( 19)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:53.352504 445017 usertrap_amd64.go:212] [ 25( 18): 25( 18)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:53.352614 445017 usertrap_amd64.go:122] [ 25( 18): 25( 18)] Allocate a new trap: 0xc0008c20c0 35 D0719 21:52:53.352686 445017 usertrap_amd64.go:225] [ 25( 18): 25( 18)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:53.355220 445017 usertrap_amd64.go:212] [ 25( 18): 25( 18)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:53.355303 445017 usertrap_amd64.go:122] [ 25( 18): 25( 18)] Allocate a new trap: 0xc0008c20c0 36 D0719 21:52:53.355407 445017 usertrap_amd64.go:225] [ 25( 18): 25( 18)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:53.356661 445017 task_exit.go:204] [ 25( 18): 25( 18)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.356841 445017 task_signals.go:204] [ 25( 18): 26( 19)] Signal 25, PID: 26, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.356936 445017 task_signals.go:204] [ 25( 18): 27( 20)] Signal 25, PID: 27, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.356970 445017 task_exit.go:204] [ 25( 18): 26( 19)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.357130 445017 task_exit.go:204] [ 25( 18): 27( 20)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.357336 445017 task_exit.go:204] [ 25( 18): 25( 18)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.357459 445017 task_exit.go:204] [ 25( 18): 26( 19)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.357514 445017 task_exit.go:204] [ 25( 18): 26( 19)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.361221 445017 task_exit.go:204] [ 25( 18): 27( 20)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.361322 445017 task_exit.go:204] [ 25( 18): 27( 20)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.361424 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:53.361947 445017 task_exit.go:204] [ 25( 18): 25( 18)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.369501 445017 usertrap_amd64.go:212] [ 28( 21): 28( 21)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:53.369570 445017 usertrap_amd64.go:122] [ 28( 21): 28( 21)] Allocate a new trap: 0xc00030ee40 28 D0719 21:52:53.369996 445017 usertrap_amd64.go:225] [ 28( 21): 28( 21)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:53.373266 445017 usertrap_amd64.go:212] [ 28( 21): 28( 21)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:53.373327 445017 usertrap_amd64.go:122] [ 28( 21): 28( 21)] Allocate a new trap: 0xc00030ee40 29 D0719 21:52:53.373383 445017 usertrap_amd64.go:225] [ 28( 21): 28( 21)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:53.374046 445017 usertrap_amd64.go:212] [ 28( 21): 28( 21)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:53.374110 445017 usertrap_amd64.go:122] [ 28( 21): 28( 21)] Allocate a new trap: 0xc00030ee40 30 D0719 21:52:53.374188 445017 usertrap_amd64.go:225] [ 28( 21): 28( 21)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:53.376887 445017 usertrap_amd64.go:212] [ 28( 21): 28( 21)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:53.376945 445017 usertrap_amd64.go:122] [ 28( 21): 28( 21)] Allocate a new trap: 0xc00030ee40 31 D0719 21:52:53.376997 445017 usertrap_amd64.go:225] [ 28( 21): 28( 21)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:53.377187 445017 usertrap_amd64.go:212] [ 28( 21): 28( 21)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:53.377234 445017 usertrap_amd64.go:122] [ 28( 21): 28( 21)] Allocate a new trap: 0xc00030ee40 32 D0719 21:52:53.377284 445017 usertrap_amd64.go:225] [ 28( 21): 28( 21)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:53.377779 445017 usertrap_amd64.go:212] [ 28( 21): 28( 21)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:53.377835 445017 usertrap_amd64.go:122] [ 28( 21): 28( 21)] Allocate a new trap: 0xc00030ee40 33 D0719 21:52:53.377890 445017 usertrap_amd64.go:225] [ 28( 21): 28( 21)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:53.378530 445017 usertrap_amd64.go:212] [ 28( 21): 29( 22)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:53.378580 445017 usertrap_amd64.go:122] [ 28( 21): 29( 22)] Allocate a new trap: 0xc00030ee40 34 D0719 21:52:53.378829 445017 usertrap_amd64.go:225] [ 28( 21): 29( 22)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:53.384681 445017 usertrap_amd64.go:212] [ 28( 21): 28( 21)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:53.384744 445017 usertrap_amd64.go:122] [ 28( 21): 28( 21)] Allocate a new trap: 0xc00030ee40 35 D0719 21:52:53.384795 445017 usertrap_amd64.go:225] [ 28( 21): 28( 21)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:53.386946 445017 usertrap_amd64.go:212] [ 28( 21): 28( 21)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:53.387003 445017 usertrap_amd64.go:122] [ 28( 21): 28( 21)] Allocate a new trap: 0xc00030ee40 36 D0719 21:52:53.387166 445017 usertrap_amd64.go:225] [ 28( 21): 28( 21)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:53.387570 445017 task_exit.go:204] [ 28( 21): 28( 21)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.387748 445017 task_signals.go:204] [ 28( 21): 29( 22)] Signal 28, PID: 29, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.387828 445017 task_signals.go:204] [ 28( 21): 30( 23)] Signal 28, PID: 30, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.387902 445017 task_exit.go:204] [ 28( 21): 28( 21)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.387987 445017 task_exit.go:204] [ 28( 21): 29( 22)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.388083 445017 task_exit.go:204] [ 28( 21): 30( 23)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.388426 445017 task_exit.go:204] [ 28( 21): 29( 22)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.388486 445017 task_exit.go:204] [ 28( 21): 29( 22)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.391008 445017 task_exit.go:204] [ 28( 21): 30( 23)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.391070 445017 task_exit.go:204] [ 28( 21): 30( 23)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.391221 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:53.391842 445017 task_exit.go:204] [ 28( 21): 28( 21)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.397735 445017 usertrap_amd64.go:212] [ 31( 24): 31( 24)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:53.397840 445017 usertrap_amd64.go:122] [ 31( 24): 31( 24)] Allocate a new trap: 0xc00037e780 28 D0719 21:52:53.398268 445017 usertrap_amd64.go:225] [ 31( 24): 31( 24)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:53.401382 445017 usertrap_amd64.go:212] [ 31( 24): 31( 24)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:53.401455 445017 usertrap_amd64.go:122] [ 31( 24): 31( 24)] Allocate a new trap: 0xc00037e780 29 D0719 21:52:53.401534 445017 usertrap_amd64.go:225] [ 31( 24): 31( 24)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:53.402547 445017 usertrap_amd64.go:212] [ 31( 24): 31( 24)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:53.402600 445017 usertrap_amd64.go:122] [ 31( 24): 31( 24)] Allocate a new trap: 0xc00037e780 30 D0719 21:52:53.402654 445017 usertrap_amd64.go:225] [ 31( 24): 31( 24)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:53.407007 445017 usertrap_amd64.go:212] [ 31( 24): 31( 24)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:53.407103 445017 usertrap_amd64.go:122] [ 31( 24): 31( 24)] Allocate a new trap: 0xc00037e780 31 D0719 21:52:53.407214 445017 usertrap_amd64.go:225] [ 31( 24): 31( 24)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:53.407470 445017 usertrap_amd64.go:212] [ 31( 24): 31( 24)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:53.407511 445017 usertrap_amd64.go:122] [ 31( 24): 31( 24)] Allocate a new trap: 0xc00037e780 32 D0719 21:52:53.407558 445017 usertrap_amd64.go:225] [ 31( 24): 31( 24)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:53.408307 445017 usertrap_amd64.go:212] [ 31( 24): 31( 24)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:53.408387 445017 usertrap_amd64.go:122] [ 31( 24): 31( 24)] Allocate a new trap: 0xc00037e780 33 D0719 21:52:53.408490 445017 usertrap_amd64.go:225] [ 31( 24): 31( 24)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:53.408754 445017 usertrap_amd64.go:212] [ 31( 24): 32( 25)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:53.408852 445017 usertrap_amd64.go:122] [ 31( 24): 32( 25)] Allocate a new trap: 0xc00037e780 34 D0719 21:52:53.408928 445017 usertrap_amd64.go:225] [ 31( 24): 32( 25)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:53.415080 445017 usertrap_amd64.go:212] [ 31( 24): 31( 24)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:53.415135 445017 usertrap_amd64.go:122] [ 31( 24): 31( 24)] Allocate a new trap: 0xc00037e780 35 D0719 21:52:53.415199 445017 usertrap_amd64.go:225] [ 31( 24): 31( 24)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:53.417900 445017 usertrap_amd64.go:212] [ 31( 24): 31( 24)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:53.417992 445017 usertrap_amd64.go:122] [ 31( 24): 31( 24)] Allocate a new trap: 0xc00037e780 36 D0719 21:52:53.418052 445017 usertrap_amd64.go:225] [ 31( 24): 31( 24)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:53.418650 445017 task_exit.go:204] [ 31( 24): 31( 24)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.418898 445017 task_signals.go:204] [ 31( 24): 32( 25)] Signal 31, PID: 32, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.418998 445017 task_signals.go:204] [ 31( 24): 33( 26)] Signal 31, PID: 33, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.419040 445017 task_exit.go:204] [ 31( 24): 32( 25)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.419171 445017 task_exit.go:204] [ 31( 24): 31( 24)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.419389 445017 task_exit.go:204] [ 31( 24): 32( 25)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.419451 445017 task_exit.go:204] [ 31( 24): 32( 25)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.419583 445017 task_exit.go:204] [ 31( 24): 33( 26)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.422991 445017 task_exit.go:204] [ 31( 24): 33( 26)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.423073 445017 task_exit.go:204] [ 31( 24): 33( 26)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.423152 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:53.424420 445017 task_exit.go:204] [ 31( 24): 31( 24)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.432075 445017 usertrap_amd64.go:212] [ 34( 27): 34( 27)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:53.432182 445017 usertrap_amd64.go:122] [ 34( 27): 34( 27)] Allocate a new trap: 0xc000b12090 28 D0719 21:52:53.432709 445017 usertrap_amd64.go:225] [ 34( 27): 34( 27)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:53.437004 445017 usertrap_amd64.go:212] [ 34( 27): 34( 27)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:53.437093 445017 usertrap_amd64.go:122] [ 34( 27): 34( 27)] Allocate a new trap: 0xc000b12090 29 D0719 21:52:53.437150 445017 usertrap_amd64.go:225] [ 34( 27): 34( 27)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:53.438769 445017 usertrap_amd64.go:212] [ 34( 27): 34( 27)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:53.438877 445017 usertrap_amd64.go:122] [ 34( 27): 34( 27)] Allocate a new trap: 0xc000b12090 30 D0719 21:52:53.438954 445017 usertrap_amd64.go:225] [ 34( 27): 34( 27)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:53.443058 445017 usertrap_amd64.go:212] [ 34( 27): 34( 27)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:53.443127 445017 usertrap_amd64.go:122] [ 34( 27): 34( 27)] Allocate a new trap: 0xc000b12090 31 D0719 21:52:53.443184 445017 usertrap_amd64.go:225] [ 34( 27): 34( 27)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:53.443463 445017 usertrap_amd64.go:212] [ 34( 27): 34( 27)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:53.443539 445017 usertrap_amd64.go:122] [ 34( 27): 34( 27)] Allocate a new trap: 0xc000b12090 32 D0719 21:52:53.443642 445017 usertrap_amd64.go:225] [ 34( 27): 34( 27)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:53.444441 445017 usertrap_amd64.go:212] [ 34( 27): 34( 27)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:53.444485 445017 usertrap_amd64.go:122] [ 34( 27): 34( 27)] Allocate a new trap: 0xc000b12090 33 D0719 21:52:53.444529 445017 usertrap_amd64.go:225] [ 34( 27): 34( 27)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:53.445337 445017 usertrap_amd64.go:212] [ 34( 27): 35( 28)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:53.445411 445017 usertrap_amd64.go:122] [ 34( 27): 35( 28)] Allocate a new trap: 0xc000b12090 34 D0719 21:52:53.445503 445017 usertrap_amd64.go:225] [ 34( 27): 35( 28)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:53.454436 445017 usertrap_amd64.go:212] [ 34( 27): 34( 27)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:53.454526 445017 usertrap_amd64.go:122] [ 34( 27): 34( 27)] Allocate a new trap: 0xc000b12090 35 D0719 21:52:53.454580 445017 usertrap_amd64.go:225] [ 34( 27): 34( 27)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:53.457008 445017 usertrap_amd64.go:212] [ 34( 27): 34( 27)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:53.457076 445017 usertrap_amd64.go:122] [ 34( 27): 34( 27)] Allocate a new trap: 0xc000b12090 36 D0719 21:52:53.457168 445017 usertrap_amd64.go:225] [ 34( 27): 34( 27)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:53.457626 445017 task_exit.go:204] [ 34( 27): 34( 27)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.457754 445017 task_signals.go:204] [ 34( 27): 35( 28)] Signal 34, PID: 35, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.457895 445017 task_exit.go:204] [ 34( 27): 35( 28)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.458071 445017 task_signals.go:204] [ 34( 27): 36( 29)] Signal 34, PID: 36, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.458262 445017 task_exit.go:204] [ 34( 27): 35( 28)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.458358 445017 task_exit.go:204] [ 34( 27): 35( 28)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.458581 445017 task_exit.go:204] [ 34( 27): 36( 29)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.458958 445017 task_exit.go:204] [ 34( 27): 34( 27)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.461662 445017 task_exit.go:204] [ 34( 27): 36( 29)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.461721 445017 task_exit.go:204] [ 34( 27): 36( 29)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.461814 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:53.462064 445017 task_exit.go:204] [ 34( 27): 34( 27)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.476780 445017 usertrap_amd64.go:212] [ 37( 30): 37( 30)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:53.476855 445017 usertrap_amd64.go:122] [ 37( 30): 37( 30)] Allocate a new trap: 0xc000886270 28 D0719 21:52:53.477186 445017 usertrap_amd64.go:225] [ 37( 30): 37( 30)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:53.480568 445017 usertrap_amd64.go:212] [ 37( 30): 37( 30)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:53.480623 445017 usertrap_amd64.go:122] [ 37( 30): 37( 30)] Allocate a new trap: 0xc000886270 29 D0719 21:52:53.480686 445017 usertrap_amd64.go:225] [ 37( 30): 37( 30)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:53.481474 445017 usertrap_amd64.go:212] [ 37( 30): 37( 30)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:53.481525 445017 usertrap_amd64.go:122] [ 37( 30): 37( 30)] Allocate a new trap: 0xc000886270 30 D0719 21:52:53.481583 445017 usertrap_amd64.go:225] [ 37( 30): 37( 30)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:53.485058 445017 usertrap_amd64.go:212] [ 37( 30): 37( 30)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:53.485134 445017 usertrap_amd64.go:122] [ 37( 30): 37( 30)] Allocate a new trap: 0xc000886270 31 D0719 21:52:53.485212 445017 usertrap_amd64.go:225] [ 37( 30): 37( 30)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:53.485429 445017 usertrap_amd64.go:212] [ 37( 30): 37( 30)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:53.485499 445017 usertrap_amd64.go:122] [ 37( 30): 37( 30)] Allocate a new trap: 0xc000886270 32 D0719 21:52:53.485565 445017 usertrap_amd64.go:225] [ 37( 30): 37( 30)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:53.486086 445017 usertrap_amd64.go:212] [ 37( 30): 37( 30)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:53.486148 445017 usertrap_amd64.go:122] [ 37( 30): 37( 30)] Allocate a new trap: 0xc000886270 33 D0719 21:52:53.486221 445017 usertrap_amd64.go:225] [ 37( 30): 37( 30)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:53.486626 445017 usertrap_amd64.go:212] [ 37( 30): 38( 31)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:53.486789 445017 usertrap_amd64.go:122] [ 37( 30): 38( 31)] Allocate a new trap: 0xc000886270 34 D0719 21:52:53.486959 445017 usertrap_amd64.go:225] [ 37( 30): 38( 31)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:53.499643 445017 usertrap_amd64.go:212] [ 37( 30): 37( 30)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:53.500636 445017 usertrap_amd64.go:122] [ 37( 30): 37( 30)] Allocate a new trap: 0xc000886270 35 D0719 21:52:53.500806 445017 usertrap_amd64.go:225] [ 37( 30): 37( 30)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:53.504653 445017 usertrap_amd64.go:212] [ 37( 30): 37( 30)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:53.504732 445017 usertrap_amd64.go:122] [ 37( 30): 37( 30)] Allocate a new trap: 0xc000886270 36 D0719 21:52:53.504801 445017 usertrap_amd64.go:225] [ 37( 30): 37( 30)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:53.507477 445017 task_exit.go:204] [ 37( 30): 37( 30)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.507850 445017 task_exit.go:204] [ 37( 30): 37( 30)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.508115 445017 task_signals.go:204] [ 37( 30): 39( 32)] Signal 37, PID: 39, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.508196 445017 task_signals.go:204] [ 37( 30): 38( 31)] Signal 37, PID: 38, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.508275 445017 task_exit.go:204] [ 37( 30): 38( 31)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.508486 445017 task_exit.go:204] [ 37( 30): 38( 31)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.508538 445017 task_exit.go:204] [ 37( 30): 38( 31)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.508666 445017 task_exit.go:204] [ 37( 30): 39( 32)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.511459 445017 task_exit.go:204] [ 37( 30): 39( 32)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.511671 445017 task_exit.go:204] [ 37( 30): 39( 32)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.511828 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:53.511965 445017 task_exit.go:204] [ 37( 30): 37( 30)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.545375 445017 usertrap_amd64.go:212] [ 40( 33): 40( 33)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:53.545461 445017 usertrap_amd64.go:122] [ 40( 33): 40( 33)] Allocate a new trap: 0xc000886000 28 D0719 21:52:53.545893 445017 usertrap_amd64.go:225] [ 40( 33): 40( 33)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:53.550339 445017 usertrap_amd64.go:212] [ 40( 33): 40( 33)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:53.550413 445017 usertrap_amd64.go:122] [ 40( 33): 40( 33)] Allocate a new trap: 0xc000886000 29 D0719 21:52:53.550510 445017 usertrap_amd64.go:225] [ 40( 33): 40( 33)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:53.551949 445017 usertrap_amd64.go:212] [ 40( 33): 40( 33)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:53.552045 445017 usertrap_amd64.go:122] [ 40( 33): 40( 33)] Allocate a new trap: 0xc000886000 30 D0719 21:52:53.552153 445017 usertrap_amd64.go:225] [ 40( 33): 40( 33)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:53.556842 445017 usertrap_amd64.go:212] [ 40( 33): 40( 33)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:53.556909 445017 usertrap_amd64.go:122] [ 40( 33): 40( 33)] Allocate a new trap: 0xc000886000 31 D0719 21:52:53.556958 445017 usertrap_amd64.go:225] [ 40( 33): 40( 33)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:53.557205 445017 usertrap_amd64.go:212] [ 40( 33): 40( 33)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:53.557246 445017 usertrap_amd64.go:122] [ 40( 33): 40( 33)] Allocate a new trap: 0xc000886000 32 D0719 21:52:53.557295 445017 usertrap_amd64.go:225] [ 40( 33): 40( 33)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:53.557803 445017 usertrap_amd64.go:212] [ 40( 33): 40( 33)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:53.557846 445017 usertrap_amd64.go:122] [ 40( 33): 40( 33)] Allocate a new trap: 0xc000886000 33 D0719 21:52:53.557911 445017 usertrap_amd64.go:225] [ 40( 33): 40( 33)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:53.558341 445017 usertrap_amd64.go:212] [ 40( 33): 41( 34)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:53.558439 445017 usertrap_amd64.go:122] [ 40( 33): 41( 34)] Allocate a new trap: 0xc000886000 34 D0719 21:52:53.558562 445017 usertrap_amd64.go:225] [ 40( 33): 41( 34)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:53.565700 445017 usertrap_amd64.go:212] [ 40( 33): 40( 33)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:53.565791 445017 usertrap_amd64.go:122] [ 40( 33): 40( 33)] Allocate a new trap: 0xc000886000 35 D0719 21:52:53.565871 445017 usertrap_amd64.go:225] [ 40( 33): 40( 33)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:53.568175 445017 usertrap_amd64.go:212] [ 40( 33): 40( 33)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:53.568233 445017 usertrap_amd64.go:122] [ 40( 33): 40( 33)] Allocate a new trap: 0xc000886000 36 D0719 21:52:53.568285 445017 usertrap_amd64.go:225] [ 40( 33): 40( 33)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:53.568680 445017 task_exit.go:204] [ 40( 33): 40( 33)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.568805 445017 task_signals.go:204] [ 40( 33): 42( 35)] Signal 40, PID: 42, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.568911 445017 task_signals.go:204] [ 40( 33): 41( 34)] Signal 40, PID: 41, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.569044 445017 task_exit.go:204] [ 40( 33): 42( 35)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.569153 445017 task_exit.go:204] [ 40( 33): 41( 34)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.569393 445017 task_exit.go:204] [ 40( 33): 41( 34)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.569444 445017 task_exit.go:204] [ 40( 33): 41( 34)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.569566 445017 task_exit.go:204] [ 40( 33): 40( 33)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.572376 445017 task_exit.go:204] [ 40( 33): 42( 35)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.572498 445017 task_exit.go:204] [ 40( 33): 42( 35)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.572604 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:53.574197 445017 task_exit.go:204] [ 40( 33): 40( 33)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.586523 445017 usertrap_amd64.go:212] [ 43( 36): 43( 36)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:53.586658 445017 usertrap_amd64.go:122] [ 43( 36): 43( 36)] Allocate a new trap: 0xc00030ea20 28 D0719 21:52:53.587167 445017 usertrap_amd64.go:225] [ 43( 36): 43( 36)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:53.592468 445017 usertrap_amd64.go:212] [ 43( 36): 43( 36)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:53.592586 445017 usertrap_amd64.go:122] [ 43( 36): 43( 36)] Allocate a new trap: 0xc00030ea20 29 D0719 21:52:53.592652 445017 usertrap_amd64.go:225] [ 43( 36): 43( 36)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:53.594057 445017 usertrap_amd64.go:212] [ 43( 36): 43( 36)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:53.594154 445017 usertrap_amd64.go:122] [ 43( 36): 43( 36)] Allocate a new trap: 0xc00030ea20 30 D0719 21:52:53.594253 445017 usertrap_amd64.go:225] [ 43( 36): 43( 36)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:53.606202 445017 usertrap_amd64.go:212] [ 43( 36): 43( 36)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:53.606265 445017 usertrap_amd64.go:122] [ 43( 36): 43( 36)] Allocate a new trap: 0xc00030ea20 31 D0719 21:52:53.606357 445017 usertrap_amd64.go:225] [ 43( 36): 43( 36)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:53.606868 445017 usertrap_amd64.go:212] [ 43( 36): 43( 36)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:53.606968 445017 usertrap_amd64.go:122] [ 43( 36): 43( 36)] Allocate a new trap: 0xc00030ea20 32 D0719 21:52:53.607054 445017 usertrap_amd64.go:225] [ 43( 36): 43( 36)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:53.608187 445017 usertrap_amd64.go:212] [ 43( 36): 43( 36)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:53.608267 445017 usertrap_amd64.go:122] [ 43( 36): 43( 36)] Allocate a new trap: 0xc00030ea20 33 D0719 21:52:53.608438 445017 usertrap_amd64.go:225] [ 43( 36): 43( 36)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:53.608729 445017 usertrap_amd64.go:212] [ 43( 36): 44( 37)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:53.608849 445017 usertrap_amd64.go:122] [ 43( 36): 44( 37)] Allocate a new trap: 0xc00030ea20 34 D0719 21:52:53.608940 445017 usertrap_amd64.go:225] [ 43( 36): 44( 37)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:53.616987 445017 usertrap_amd64.go:212] [ 43( 36): 43( 36)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:53.617104 445017 usertrap_amd64.go:122] [ 43( 36): 43( 36)] Allocate a new trap: 0xc00030ea20 35 D0719 21:52:53.617245 445017 usertrap_amd64.go:225] [ 43( 36): 43( 36)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:53.620125 445017 usertrap_amd64.go:212] [ 43( 36): 43( 36)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:53.620252 445017 usertrap_amd64.go:122] [ 43( 36): 43( 36)] Allocate a new trap: 0xc00030ea20 36 D0719 21:52:53.620367 445017 usertrap_amd64.go:225] [ 43( 36): 43( 36)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:53.621156 445017 task_exit.go:204] [ 43( 36): 43( 36)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.621458 445017 task_exit.go:204] [ 43( 36): 43( 36)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.621602 445017 task_signals.go:204] [ 43( 36): 44( 37)] Signal 43, PID: 44, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.621624 445017 task_signals.go:204] [ 43( 36): 45( 38)] Signal 43, PID: 45, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.621743 445017 task_exit.go:204] [ 43( 36): 45( 38)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.621880 445017 task_exit.go:204] [ 43( 36): 44( 37)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.622213 445017 task_exit.go:204] [ 43( 36): 45( 38)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.622289 445017 task_exit.go:204] [ 43( 36): 45( 38)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.625494 445017 task_exit.go:204] [ 43( 36): 44( 37)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.625602 445017 task_exit.go:204] [ 43( 36): 44( 37)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.625693 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:53.625895 445017 task_exit.go:204] [ 43( 36): 43( 36)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.634988 445017 usertrap_amd64.go:212] [ 46( 39): 46( 39)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:53.635092 445017 usertrap_amd64.go:122] [ 46( 39): 46( 39)] Allocate a new trap: 0xc000b12030 28 D0719 21:52:53.635718 445017 usertrap_amd64.go:225] [ 46( 39): 46( 39)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:53.646529 445017 usertrap_amd64.go:212] [ 46( 39): 46( 39)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:53.646604 445017 usertrap_amd64.go:122] [ 46( 39): 46( 39)] Allocate a new trap: 0xc000b12030 29 D0719 21:52:53.646698 445017 usertrap_amd64.go:225] [ 46( 39): 46( 39)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:53.652932 445017 usertrap_amd64.go:212] [ 46( 39): 46( 39)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:53.653110 445017 usertrap_amd64.go:122] [ 46( 39): 46( 39)] Allocate a new trap: 0xc000b12030 30 D0719 21:52:53.653205 445017 usertrap_amd64.go:225] [ 46( 39): 46( 39)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:53.657741 445017 usertrap_amd64.go:212] [ 46( 39): 46( 39)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:53.657805 445017 usertrap_amd64.go:122] [ 46( 39): 46( 39)] Allocate a new trap: 0xc000b12030 31 D0719 21:52:53.657882 445017 usertrap_amd64.go:225] [ 46( 39): 46( 39)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:53.658160 445017 usertrap_amd64.go:212] [ 46( 39): 46( 39)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:53.658203 445017 usertrap_amd64.go:122] [ 46( 39): 46( 39)] Allocate a new trap: 0xc000b12030 32 D0719 21:52:53.658285 445017 usertrap_amd64.go:225] [ 46( 39): 46( 39)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:53.659311 445017 usertrap_amd64.go:212] [ 46( 39): 46( 39)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:53.659378 445017 usertrap_amd64.go:122] [ 46( 39): 46( 39)] Allocate a new trap: 0xc000b12030 33 D0719 21:52:53.659465 445017 usertrap_amd64.go:225] [ 46( 39): 46( 39)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:53.660198 445017 usertrap_amd64.go:212] [ 46( 39): 47( 40)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:53.660287 445017 usertrap_amd64.go:122] [ 46( 39): 47( 40)] Allocate a new trap: 0xc000b12030 34 D0719 21:52:53.660398 445017 usertrap_amd64.go:225] [ 46( 39): 47( 40)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:53.679868 445017 usertrap_amd64.go:212] [ 46( 39): 46( 39)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:53.679945 445017 usertrap_amd64.go:122] [ 46( 39): 46( 39)] Allocate a new trap: 0xc000b12030 35 D0719 21:52:53.680016 445017 usertrap_amd64.go:225] [ 46( 39): 46( 39)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:53.681990 445017 usertrap_amd64.go:212] [ 46( 39): 46( 39)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:53.682053 445017 usertrap_amd64.go:122] [ 46( 39): 46( 39)] Allocate a new trap: 0xc000b12030 36 D0719 21:52:53.682130 445017 usertrap_amd64.go:225] [ 46( 39): 46( 39)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:53.682669 445017 task_exit.go:204] [ 46( 39): 46( 39)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.682873 445017 task_signals.go:204] [ 46( 39): 47( 40)] Signal 46, PID: 47, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.682955 445017 task_signals.go:204] [ 46( 39): 48( 41)] Signal 46, PID: 48, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.683022 445017 task_exit.go:204] [ 46( 39): 47( 40)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.683161 445017 task_exit.go:204] [ 46( 39): 48( 41)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.683550 445017 task_exit.go:204] [ 46( 39): 48( 41)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.683647 445017 task_exit.go:204] [ 46( 39): 48( 41)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.683757 445017 task_exit.go:204] [ 46( 39): 46( 39)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.686021 445017 task_exit.go:204] [ 46( 39): 47( 40)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.686072 445017 task_exit.go:204] [ 46( 39): 47( 40)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.686133 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:53.689104 445017 task_exit.go:204] [ 46( 39): 46( 39)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.700965 445017 usertrap_amd64.go:212] [ 49( 42): 49( 42)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:53.701050 445017 usertrap_amd64.go:122] [ 49( 42): 49( 42)] Allocate a new trap: 0xc000b12060 28 D0719 21:52:53.701529 445017 usertrap_amd64.go:225] [ 49( 42): 49( 42)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:53.704788 445017 usertrap_amd64.go:212] [ 49( 42): 49( 42)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:53.704868 445017 usertrap_amd64.go:122] [ 49( 42): 49( 42)] Allocate a new trap: 0xc000b12060 29 D0719 21:52:53.704929 445017 usertrap_amd64.go:225] [ 49( 42): 49( 42)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:53.705807 445017 usertrap_amd64.go:212] [ 49( 42): 49( 42)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:53.705858 445017 usertrap_amd64.go:122] [ 49( 42): 49( 42)] Allocate a new trap: 0xc000b12060 30 D0719 21:52:53.705906 445017 usertrap_amd64.go:225] [ 49( 42): 49( 42)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:53.711133 445017 usertrap_amd64.go:212] [ 49( 42): 49( 42)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:53.711224 445017 usertrap_amd64.go:122] [ 49( 42): 49( 42)] Allocate a new trap: 0xc000b12060 31 D0719 21:52:53.711283 445017 usertrap_amd64.go:225] [ 49( 42): 49( 42)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:53.711512 445017 usertrap_amd64.go:212] [ 49( 42): 49( 42)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:53.711567 445017 usertrap_amd64.go:122] [ 49( 42): 49( 42)] Allocate a new trap: 0xc000b12060 32 D0719 21:52:53.711673 445017 usertrap_amd64.go:225] [ 49( 42): 49( 42)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:53.712591 445017 usertrap_amd64.go:212] [ 49( 42): 49( 42)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:53.712661 445017 usertrap_amd64.go:122] [ 49( 42): 49( 42)] Allocate a new trap: 0xc000b12060 33 D0719 21:52:53.712711 445017 usertrap_amd64.go:225] [ 49( 42): 49( 42)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:53.713049 445017 usertrap_amd64.go:212] [ 49( 42): 50( 43)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:53.713110 445017 usertrap_amd64.go:122] [ 49( 42): 50( 43)] Allocate a new trap: 0xc000b12060 34 D0719 21:52:53.713360 445017 usertrap_amd64.go:225] [ 49( 42): 50( 43)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:53.721347 445017 usertrap_amd64.go:212] [ 49( 42): 49( 42)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:53.721488 445017 usertrap_amd64.go:122] [ 49( 42): 49( 42)] Allocate a new trap: 0xc000b12060 35 D0719 21:52:53.721593 445017 usertrap_amd64.go:225] [ 49( 42): 49( 42)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:53.723909 445017 usertrap_amd64.go:212] [ 49( 42): 49( 42)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:53.723972 445017 usertrap_amd64.go:122] [ 49( 42): 49( 42)] Allocate a new trap: 0xc000b12060 36 D0719 21:52:53.724071 445017 usertrap_amd64.go:225] [ 49( 42): 49( 42)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:53.724604 445017 task_exit.go:204] [ 49( 42): 49( 42)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.725054 445017 task_signals.go:204] [ 49( 42): 51( 44)] Signal 49, PID: 51, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.725061 445017 task_signals.go:204] [ 49( 42): 50( 43)] Signal 49, PID: 50, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.725116 445017 task_exit.go:204] [ 49( 42): 49( 42)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.725259 445017 task_exit.go:204] [ 49( 42): 51( 44)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.725394 445017 task_exit.go:204] [ 49( 42): 50( 43)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.725592 445017 task_exit.go:204] [ 49( 42): 51( 44)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.725665 445017 task_exit.go:204] [ 49( 42): 51( 44)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.728457 445017 task_exit.go:204] [ 49( 42): 50( 43)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.728516 445017 task_exit.go:204] [ 49( 42): 50( 43)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.728604 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:53.730021 445017 task_exit.go:204] [ 49( 42): 49( 42)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.741353 445017 usertrap_amd64.go:212] [ 52( 45): 52( 45)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:53.741478 445017 usertrap_amd64.go:122] [ 52( 45): 52( 45)] Allocate a new trap: 0xc000a680c0 28 D0719 21:52:53.742009 445017 usertrap_amd64.go:225] [ 52( 45): 52( 45)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:53.745818 445017 usertrap_amd64.go:212] [ 52( 45): 52( 45)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:53.745868 445017 usertrap_amd64.go:122] [ 52( 45): 52( 45)] Allocate a new trap: 0xc000a680c0 29 D0719 21:52:53.745977 445017 usertrap_amd64.go:225] [ 52( 45): 52( 45)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:53.747212 445017 usertrap_amd64.go:212] [ 52( 45): 52( 45)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:53.747272 445017 usertrap_amd64.go:122] [ 52( 45): 52( 45)] Allocate a new trap: 0xc000a680c0 30 D0719 21:52:53.747332 445017 usertrap_amd64.go:225] [ 52( 45): 52( 45)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:53.752645 445017 usertrap_amd64.go:212] [ 52( 45): 52( 45)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:53.752733 445017 usertrap_amd64.go:122] [ 52( 45): 52( 45)] Allocate a new trap: 0xc000a680c0 31 D0719 21:52:53.752781 445017 usertrap_amd64.go:225] [ 52( 45): 52( 45)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:53.753007 445017 usertrap_amd64.go:212] [ 52( 45): 52( 45)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:53.753047 445017 usertrap_amd64.go:122] [ 52( 45): 52( 45)] Allocate a new trap: 0xc000a680c0 32 D0719 21:52:53.753100 445017 usertrap_amd64.go:225] [ 52( 45): 52( 45)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:53.753701 445017 usertrap_amd64.go:212] [ 52( 45): 52( 45)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:53.753749 445017 usertrap_amd64.go:122] [ 52( 45): 52( 45)] Allocate a new trap: 0xc000a680c0 33 D0719 21:52:53.753811 445017 usertrap_amd64.go:225] [ 52( 45): 52( 45)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:53.754035 445017 usertrap_amd64.go:212] [ 52( 45): 53( 46)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:53.754100 445017 usertrap_amd64.go:122] [ 52( 45): 53( 46)] Allocate a new trap: 0xc000a680c0 34 D0719 21:52:53.754305 445017 usertrap_amd64.go:225] [ 52( 45): 53( 46)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:53.760344 445017 usertrap_amd64.go:212] [ 52( 45): 52( 45)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:53.760455 445017 usertrap_amd64.go:122] [ 52( 45): 52( 45)] Allocate a new trap: 0xc000a680c0 35 D0719 21:52:53.760564 445017 usertrap_amd64.go:225] [ 52( 45): 52( 45)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:53.762668 445017 usertrap_amd64.go:212] [ 52( 45): 52( 45)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:53.762751 445017 usertrap_amd64.go:122] [ 52( 45): 52( 45)] Allocate a new trap: 0xc000a680c0 36 D0719 21:52:53.762809 445017 usertrap_amd64.go:225] [ 52( 45): 52( 45)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:53.763721 445017 task_exit.go:204] [ 52( 45): 52( 45)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.763939 445017 task_signals.go:204] [ 52( 45): 53( 46)] Signal 52, PID: 53, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.764002 445017 task_signals.go:204] [ 52( 45): 54( 47)] Signal 52, PID: 54, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.764071 445017 task_exit.go:204] [ 52( 45): 52( 45)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.764209 445017 task_exit.go:204] [ 52( 45): 53( 46)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.764371 445017 task_exit.go:204] [ 52( 45): 54( 47)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.764601 445017 task_exit.go:204] [ 52( 45): 54( 47)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.764649 445017 task_exit.go:204] [ 52( 45): 54( 47)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.768151 445017 task_exit.go:204] [ 52( 45): 53( 46)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.768215 445017 task_exit.go:204] [ 52( 45): 53( 46)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.768275 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:53.769003 445017 task_exit.go:204] [ 52( 45): 52( 45)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.775280 445017 usertrap_amd64.go:212] [ 55( 48): 55( 48)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:53.775376 445017 usertrap_amd64.go:122] [ 55( 48): 55( 48)] Allocate a new trap: 0xc00037e690 28 D0719 21:52:53.775760 445017 usertrap_amd64.go:225] [ 55( 48): 55( 48)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:53.778567 445017 usertrap_amd64.go:212] [ 55( 48): 55( 48)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:53.778632 445017 usertrap_amd64.go:122] [ 55( 48): 55( 48)] Allocate a new trap: 0xc00037e690 29 D0719 21:52:53.778690 445017 usertrap_amd64.go:225] [ 55( 48): 55( 48)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:53.779467 445017 usertrap_amd64.go:212] [ 55( 48): 55( 48)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:53.779512 445017 usertrap_amd64.go:122] [ 55( 48): 55( 48)] Allocate a new trap: 0xc00037e690 30 D0719 21:52:53.779587 445017 usertrap_amd64.go:225] [ 55( 48): 55( 48)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:53.782663 445017 usertrap_amd64.go:212] [ 55( 48): 55( 48)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:53.782752 445017 usertrap_amd64.go:122] [ 55( 48): 55( 48)] Allocate a new trap: 0xc00037e690 31 D0719 21:52:53.782867 445017 usertrap_amd64.go:225] [ 55( 48): 55( 48)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:53.783053 445017 usertrap_amd64.go:212] [ 55( 48): 55( 48)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:53.783100 445017 usertrap_amd64.go:122] [ 55( 48): 55( 48)] Allocate a new trap: 0xc00037e690 32 D0719 21:52:53.783149 445017 usertrap_amd64.go:225] [ 55( 48): 55( 48)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:53.783595 445017 usertrap_amd64.go:212] [ 55( 48): 55( 48)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:53.783692 445017 usertrap_amd64.go:122] [ 55( 48): 55( 48)] Allocate a new trap: 0xc00037e690 33 D0719 21:52:53.783781 445017 usertrap_amd64.go:225] [ 55( 48): 55( 48)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:53.784330 445017 usertrap_amd64.go:212] [ 55( 48): 56( 49)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:53.784388 445017 usertrap_amd64.go:122] [ 55( 48): 56( 49)] Allocate a new trap: 0xc00037e690 34 D0719 21:52:53.784593 445017 usertrap_amd64.go:225] [ 55( 48): 56( 49)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:53.790369 445017 usertrap_amd64.go:212] [ 55( 48): 55( 48)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:53.790419 445017 usertrap_amd64.go:122] [ 55( 48): 55( 48)] Allocate a new trap: 0xc00037e690 35 D0719 21:52:53.790464 445017 usertrap_amd64.go:225] [ 55( 48): 55( 48)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:53.792357 445017 usertrap_amd64.go:212] [ 55( 48): 55( 48)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:53.792403 445017 usertrap_amd64.go:122] [ 55( 48): 55( 48)] Allocate a new trap: 0xc00037e690 36 D0719 21:52:53.792457 445017 usertrap_amd64.go:225] [ 55( 48): 55( 48)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:53.792920 445017 task_exit.go:204] [ 55( 48): 55( 48)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.793019 445017 task_signals.go:204] [ 55( 48): 57( 50)] Signal 55, PID: 57, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.793211 445017 task_exit.go:204] [ 55( 48): 57( 50)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.793362 445017 task_signals.go:204] [ 55( 48): 56( 49)] Signal 55, PID: 56, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.793440 445017 task_exit.go:204] [ 55( 48): 56( 49)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.793697 445017 task_exit.go:204] [ 55( 48): 56( 49)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.793764 445017 task_exit.go:204] [ 55( 48): 56( 49)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.794073 445017 task_exit.go:204] [ 55( 48): 57( 50)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.794161 445017 task_exit.go:204] [ 55( 48): 57( 50)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.796143 445017 task_exit.go:204] [ 55( 48): 55( 48)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.796211 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:53.796584 445017 task_exit.go:204] [ 55( 48): 55( 48)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.802538 445017 usertrap_amd64.go:212] [ 58( 51): 58( 51)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:53.802641 445017 usertrap_amd64.go:122] [ 58( 51): 58( 51)] Allocate a new trap: 0xc00030ee10 28 D0719 21:52:53.803151 445017 usertrap_amd64.go:225] [ 58( 51): 58( 51)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:53.807183 445017 usertrap_amd64.go:212] [ 58( 51): 58( 51)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:53.807256 445017 usertrap_amd64.go:122] [ 58( 51): 58( 51)] Allocate a new trap: 0xc00030ee10 29 D0719 21:52:53.807328 445017 usertrap_amd64.go:225] [ 58( 51): 58( 51)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:53.808394 445017 usertrap_amd64.go:212] [ 58( 51): 58( 51)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:53.808454 445017 usertrap_amd64.go:122] [ 58( 51): 58( 51)] Allocate a new trap: 0xc00030ee10 30 D0719 21:52:53.808514 445017 usertrap_amd64.go:225] [ 58( 51): 58( 51)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:53.811832 445017 usertrap_amd64.go:212] [ 58( 51): 58( 51)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:53.811895 445017 usertrap_amd64.go:122] [ 58( 51): 58( 51)] Allocate a new trap: 0xc00030ee10 31 D0719 21:52:53.811980 445017 usertrap_amd64.go:225] [ 58( 51): 58( 51)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:53.812190 445017 usertrap_amd64.go:212] [ 58( 51): 58( 51)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:53.812263 445017 usertrap_amd64.go:122] [ 58( 51): 58( 51)] Allocate a new trap: 0xc00030ee10 32 D0719 21:52:53.812349 445017 usertrap_amd64.go:225] [ 58( 51): 58( 51)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:53.812825 445017 usertrap_amd64.go:212] [ 58( 51): 58( 51)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:53.812884 445017 usertrap_amd64.go:122] [ 58( 51): 58( 51)] Allocate a new trap: 0xc00030ee10 33 D0719 21:52:53.812967 445017 usertrap_amd64.go:225] [ 58( 51): 58( 51)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:53.813164 445017 usertrap_amd64.go:212] [ 58( 51): 59( 52)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:53.813230 445017 usertrap_amd64.go:122] [ 58( 51): 59( 52)] Allocate a new trap: 0xc00030ee10 34 D0719 21:52:53.813294 445017 usertrap_amd64.go:225] [ 58( 51): 59( 52)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:53.818667 445017 usertrap_amd64.go:212] [ 58( 51): 58( 51)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:53.818739 445017 usertrap_amd64.go:122] [ 58( 51): 58( 51)] Allocate a new trap: 0xc00030ee10 35 D0719 21:52:53.818816 445017 usertrap_amd64.go:225] [ 58( 51): 58( 51)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:53.820715 445017 usertrap_amd64.go:212] [ 58( 51): 58( 51)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:53.820769 445017 usertrap_amd64.go:122] [ 58( 51): 58( 51)] Allocate a new trap: 0xc00030ee10 36 D0719 21:52:53.820826 445017 usertrap_amd64.go:225] [ 58( 51): 58( 51)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:53.821356 445017 task_exit.go:204] [ 58( 51): 58( 51)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.821626 445017 task_exit.go:204] [ 58( 51): 58( 51)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.821749 445017 task_signals.go:204] [ 58( 51): 59( 52)] Signal 58, PID: 59, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.821838 445017 task_signals.go:204] [ 58( 51): 60( 53)] Signal 58, PID: 60, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.821859 445017 task_exit.go:204] [ 58( 51): 59( 52)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.821950 445017 task_exit.go:204] [ 58( 51): 60( 53)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.822310 445017 task_exit.go:204] [ 58( 51): 59( 52)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.822370 445017 task_exit.go:204] [ 58( 51): 59( 52)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.825209 445017 task_exit.go:204] [ 58( 51): 60( 53)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.825320 445017 task_exit.go:204] [ 58( 51): 60( 53)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.825469 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:53.826198 445017 task_exit.go:204] [ 58( 51): 58( 51)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.833720 445017 usertrap_amd64.go:212] [ 61( 54): 61( 54)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:53.833884 445017 usertrap_amd64.go:122] [ 61( 54): 61( 54)] Allocate a new trap: 0xc00030eea0 28 D0719 21:52:53.834359 445017 usertrap_amd64.go:225] [ 61( 54): 61( 54)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:53.837837 445017 usertrap_amd64.go:212] [ 61( 54): 61( 54)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:53.837898 445017 usertrap_amd64.go:122] [ 61( 54): 61( 54)] Allocate a new trap: 0xc00030eea0 29 D0719 21:52:53.837965 445017 usertrap_amd64.go:225] [ 61( 54): 61( 54)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:53.838694 445017 usertrap_amd64.go:212] [ 61( 54): 61( 54)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:53.838749 445017 usertrap_amd64.go:122] [ 61( 54): 61( 54)] Allocate a new trap: 0xc00030eea0 30 D0719 21:52:53.838805 445017 usertrap_amd64.go:225] [ 61( 54): 61( 54)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:53.844638 445017 usertrap_amd64.go:212] [ 61( 54): 61( 54)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:53.844702 445017 usertrap_amd64.go:122] [ 61( 54): 61( 54)] Allocate a new trap: 0xc00030eea0 31 D0719 21:52:53.845353 445017 usertrap_amd64.go:225] [ 61( 54): 61( 54)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:53.845706 445017 usertrap_amd64.go:212] [ 61( 54): 61( 54)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:53.845902 445017 usertrap_amd64.go:122] [ 61( 54): 61( 54)] Allocate a new trap: 0xc00030eea0 32 D0719 21:52:53.846011 445017 usertrap_amd64.go:225] [ 61( 54): 61( 54)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:53.846639 445017 usertrap_amd64.go:212] [ 61( 54): 61( 54)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:53.846706 445017 usertrap_amd64.go:122] [ 61( 54): 61( 54)] Allocate a new trap: 0xc00030eea0 33 D0719 21:52:53.847710 445017 usertrap_amd64.go:225] [ 61( 54): 61( 54)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:53.848071 445017 usertrap_amd64.go:212] [ 61( 54): 62( 55)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:53.848167 445017 usertrap_amd64.go:122] [ 61( 54): 62( 55)] Allocate a new trap: 0xc00030eea0 34 D0719 21:52:53.848255 445017 usertrap_amd64.go:225] [ 61( 54): 62( 55)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:53.859671 445017 usertrap_amd64.go:212] [ 61( 54): 61( 54)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:53.859750 445017 usertrap_amd64.go:122] [ 61( 54): 61( 54)] Allocate a new trap: 0xc00030eea0 35 D0719 21:52:53.859813 445017 usertrap_amd64.go:225] [ 61( 54): 61( 54)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:53.861795 445017 usertrap_amd64.go:212] [ 61( 54): 61( 54)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:53.861851 445017 usertrap_amd64.go:122] [ 61( 54): 61( 54)] Allocate a new trap: 0xc00030eea0 36 D0719 21:52:53.861933 445017 usertrap_amd64.go:225] [ 61( 54): 61( 54)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:53.862437 445017 task_exit.go:204] [ 61( 54): 61( 54)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.862674 445017 task_signals.go:204] [ 61( 54): 62( 55)] Signal 61, PID: 62, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.862774 445017 task_signals.go:204] [ 61( 54): 63( 56)] Signal 61, PID: 63, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.862820 445017 task_exit.go:204] [ 61( 54): 61( 54)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.862952 445017 task_exit.go:204] [ 61( 54): 62( 55)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.863124 445017 task_exit.go:204] [ 61( 54): 62( 55)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.863165 445017 task_exit.go:204] [ 61( 54): 62( 55)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.863236 445017 task_exit.go:204] [ 61( 54): 63( 56)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.865630 445017 task_exit.go:204] [ 61( 54): 63( 56)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.865680 445017 task_exit.go:204] [ 61( 54): 63( 56)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.865765 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:53.865854 445017 task_exit.go:204] [ 61( 54): 61( 54)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.874951 445017 usertrap_amd64.go:212] [ 64( 57): 64( 57)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:53.875040 445017 usertrap_amd64.go:122] [ 64( 57): 64( 57)] Allocate a new trap: 0xc000b12360 28 D0719 21:52:53.875549 445017 usertrap_amd64.go:225] [ 64( 57): 64( 57)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:53.879056 445017 usertrap_amd64.go:212] [ 64( 57): 64( 57)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:53.879132 445017 usertrap_amd64.go:122] [ 64( 57): 64( 57)] Allocate a new trap: 0xc000b12360 29 D0719 21:52:53.879197 445017 usertrap_amd64.go:225] [ 64( 57): 64( 57)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:53.880074 445017 usertrap_amd64.go:212] [ 64( 57): 64( 57)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:53.880129 445017 usertrap_amd64.go:122] [ 64( 57): 64( 57)] Allocate a new trap: 0xc000b12360 30 D0719 21:52:53.880198 445017 usertrap_amd64.go:225] [ 64( 57): 64( 57)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:53.884938 445017 usertrap_amd64.go:212] [ 64( 57): 64( 57)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:53.885041 445017 usertrap_amd64.go:122] [ 64( 57): 64( 57)] Allocate a new trap: 0xc000b12360 31 D0719 21:52:53.885200 445017 usertrap_amd64.go:225] [ 64( 57): 64( 57)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:53.885473 445017 usertrap_amd64.go:212] [ 64( 57): 64( 57)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:53.885545 445017 usertrap_amd64.go:122] [ 64( 57): 64( 57)] Allocate a new trap: 0xc000b12360 32 D0719 21:52:53.885627 445017 usertrap_amd64.go:225] [ 64( 57): 64( 57)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:53.886597 445017 usertrap_amd64.go:212] [ 64( 57): 64( 57)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:53.886670 445017 usertrap_amd64.go:122] [ 64( 57): 64( 57)] Allocate a new trap: 0xc000b12360 33 D0719 21:52:53.886785 445017 usertrap_amd64.go:225] [ 64( 57): 64( 57)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:53.886958 445017 usertrap_amd64.go:212] [ 64( 57): 65( 58)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:53.887055 445017 usertrap_amd64.go:122] [ 64( 57): 65( 58)] Allocate a new trap: 0xc000b12360 34 D0719 21:52:53.887154 445017 usertrap_amd64.go:225] [ 64( 57): 65( 58)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:53.896488 445017 usertrap_amd64.go:212] [ 64( 57): 64( 57)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:53.896564 445017 usertrap_amd64.go:122] [ 64( 57): 64( 57)] Allocate a new trap: 0xc000b12360 35 D0719 21:52:53.897976 445017 usertrap_amd64.go:225] [ 64( 57): 64( 57)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:53.902886 445017 usertrap_amd64.go:212] [ 64( 57): 64( 57)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:53.902949 445017 usertrap_amd64.go:122] [ 64( 57): 64( 57)] Allocate a new trap: 0xc000b12360 36 D0719 21:52:53.903013 445017 usertrap_amd64.go:225] [ 64( 57): 64( 57)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:53.903462 445017 task_exit.go:204] [ 64( 57): 64( 57)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.903741 445017 task_signals.go:204] [ 64( 57): 65( 58)] Signal 64, PID: 65, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.903827 445017 task_exit.go:204] [ 64( 57): 64( 57)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.903941 445017 task_signals.go:204] [ 64( 57): 66( 59)] Signal 64, PID: 66, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.904089 445017 task_exit.go:204] [ 64( 57): 65( 58)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.904359 445017 task_exit.go:204] [ 64( 57): 65( 58)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.904408 445017 task_exit.go:204] [ 64( 57): 65( 58)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.904526 445017 task_exit.go:204] [ 64( 57): 66( 59)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.907483 445017 task_exit.go:204] [ 64( 57): 66( 59)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.907543 445017 task_exit.go:204] [ 64( 57): 66( 59)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.907655 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:53.909100 445017 task_exit.go:204] [ 64( 57): 64( 57)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.918527 445017 usertrap_amd64.go:212] [ 67( 60): 67( 60)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:53.918633 445017 usertrap_amd64.go:122] [ 67( 60): 67( 60)] Allocate a new trap: 0xc000048150 28 D0719 21:52:53.918988 445017 usertrap_amd64.go:225] [ 67( 60): 67( 60)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:53.924982 445017 usertrap_amd64.go:212] [ 67( 60): 67( 60)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:53.925084 445017 usertrap_amd64.go:122] [ 67( 60): 67( 60)] Allocate a new trap: 0xc000048150 29 D0719 21:52:53.925150 445017 usertrap_amd64.go:225] [ 67( 60): 67( 60)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:53.926245 445017 usertrap_amd64.go:212] [ 67( 60): 67( 60)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:53.926360 445017 usertrap_amd64.go:122] [ 67( 60): 67( 60)] Allocate a new trap: 0xc000048150 30 D0719 21:52:53.926493 445017 usertrap_amd64.go:225] [ 67( 60): 67( 60)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:53.930170 445017 usertrap_amd64.go:212] [ 67( 60): 67( 60)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:53.930230 445017 usertrap_amd64.go:122] [ 67( 60): 67( 60)] Allocate a new trap: 0xc000048150 31 D0719 21:52:53.930290 445017 usertrap_amd64.go:225] [ 67( 60): 67( 60)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:53.930600 445017 usertrap_amd64.go:212] [ 67( 60): 67( 60)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:53.930668 445017 usertrap_amd64.go:122] [ 67( 60): 67( 60)] Allocate a new trap: 0xc000048150 32 D0719 21:52:53.930764 445017 usertrap_amd64.go:225] [ 67( 60): 67( 60)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:53.931272 445017 usertrap_amd64.go:212] [ 67( 60): 67( 60)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:53.931331 445017 usertrap_amd64.go:122] [ 67( 60): 67( 60)] Allocate a new trap: 0xc000048150 33 D0719 21:52:53.931414 445017 usertrap_amd64.go:225] [ 67( 60): 67( 60)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:53.932119 445017 usertrap_amd64.go:212] [ 67( 60): 68( 61)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:53.932179 445017 usertrap_amd64.go:122] [ 67( 60): 68( 61)] Allocate a new trap: 0xc000048150 34 D0719 21:52:53.932271 445017 usertrap_amd64.go:225] [ 67( 60): 68( 61)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:53.938392 445017 usertrap_amd64.go:212] [ 67( 60): 67( 60)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:53.938480 445017 usertrap_amd64.go:122] [ 67( 60): 67( 60)] Allocate a new trap: 0xc000048150 35 D0719 21:52:53.938554 445017 usertrap_amd64.go:225] [ 67( 60): 67( 60)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:53.940622 445017 usertrap_amd64.go:212] [ 67( 60): 67( 60)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:53.940691 445017 usertrap_amd64.go:122] [ 67( 60): 67( 60)] Allocate a new trap: 0xc000048150 36 D0719 21:52:53.940765 445017 usertrap_amd64.go:225] [ 67( 60): 67( 60)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:53.941455 445017 task_exit.go:204] [ 67( 60): 67( 60)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.941721 445017 task_exit.go:204] [ 67( 60): 67( 60)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.941870 445017 task_signals.go:204] [ 67( 60): 68( 61)] Signal 67, PID: 68, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.941966 445017 task_exit.go:204] [ 67( 60): 68( 61)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.942155 445017 task_exit.go:204] [ 67( 60): 68( 61)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.942207 445017 task_exit.go:204] [ 67( 60): 68( 61)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.942413 445017 task_signals.go:204] [ 67( 60): 69( 62)] Signal 67, PID: 69, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.942523 445017 task_exit.go:204] [ 67( 60): 69( 62)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.945949 445017 task_exit.go:204] [ 67( 60): 69( 62)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.946004 445017 task_exit.go:204] [ 67( 60): 69( 62)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.946087 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:53.946291 445017 task_exit.go:204] [ 67( 60): 67( 60)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.953339 445017 usertrap_amd64.go:212] [ 70( 63): 70( 63)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:53.953442 445017 usertrap_amd64.go:122] [ 70( 63): 70( 63)] Allocate a new trap: 0xc0008861b0 28 D0719 21:52:53.953897 445017 usertrap_amd64.go:225] [ 70( 63): 70( 63)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:53.958507 445017 usertrap_amd64.go:212] [ 70( 63): 70( 63)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:53.958607 445017 usertrap_amd64.go:122] [ 70( 63): 70( 63)] Allocate a new trap: 0xc0008861b0 29 D0719 21:52:53.958676 445017 usertrap_amd64.go:225] [ 70( 63): 70( 63)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:53.959872 445017 usertrap_amd64.go:212] [ 70( 63): 70( 63)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:53.959938 445017 usertrap_amd64.go:122] [ 70( 63): 70( 63)] Allocate a new trap: 0xc0008861b0 30 D0719 21:52:53.960043 445017 usertrap_amd64.go:225] [ 70( 63): 70( 63)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:53.964612 445017 usertrap_amd64.go:212] [ 70( 63): 70( 63)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:53.964676 445017 usertrap_amd64.go:122] [ 70( 63): 70( 63)] Allocate a new trap: 0xc0008861b0 31 D0719 21:52:53.964803 445017 usertrap_amd64.go:225] [ 70( 63): 70( 63)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:53.965206 445017 usertrap_amd64.go:212] [ 70( 63): 70( 63)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:53.965278 445017 usertrap_amd64.go:122] [ 70( 63): 70( 63)] Allocate a new trap: 0xc0008861b0 32 D0719 21:52:53.965370 445017 usertrap_amd64.go:225] [ 70( 63): 70( 63)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:53.965941 445017 usertrap_amd64.go:212] [ 70( 63): 70( 63)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:53.965989 445017 usertrap_amd64.go:122] [ 70( 63): 70( 63)] Allocate a new trap: 0xc0008861b0 33 D0719 21:52:53.966076 445017 usertrap_amd64.go:225] [ 70( 63): 70( 63)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:53.966541 445017 usertrap_amd64.go:212] [ 70( 63): 71( 64)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:53.966595 445017 usertrap_amd64.go:122] [ 70( 63): 71( 64)] Allocate a new trap: 0xc0008861b0 34 D0719 21:52:53.967009 445017 usertrap_amd64.go:225] [ 70( 63): 71( 64)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:53.975508 445017 usertrap_amd64.go:212] [ 70( 63): 70( 63)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:53.975590 445017 usertrap_amd64.go:122] [ 70( 63): 70( 63)] Allocate a new trap: 0xc0008861b0 35 D0719 21:52:53.975702 445017 usertrap_amd64.go:225] [ 70( 63): 70( 63)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:53.979192 445017 usertrap_amd64.go:212] [ 70( 63): 70( 63)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:53.979256 445017 usertrap_amd64.go:122] [ 70( 63): 70( 63)] Allocate a new trap: 0xc0008861b0 36 D0719 21:52:53.979476 445017 usertrap_amd64.go:225] [ 70( 63): 70( 63)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:53.989566 445017 task_exit.go:204] [ 70( 63): 70( 63)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.989935 445017 task_exit.go:204] [ 70( 63): 70( 63)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.990148 445017 task_signals.go:204] [ 70( 63): 71( 64)] Signal 70, PID: 71, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.990271 445017 task_exit.go:204] [ 70( 63): 71( 64)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.990434 445017 task_exit.go:204] [ 70( 63): 71( 64)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.990435 445017 task_signals.go:204] [ 70( 63): 72( 65)] Signal 70, PID: 72, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:53.990464 445017 task_exit.go:204] [ 70( 63): 71( 64)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.990593 445017 task_exit.go:204] [ 70( 63): 72( 65)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:53.994004 445017 task_exit.go:204] [ 70( 63): 72( 65)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:53.994086 445017 task_exit.go:204] [ 70( 63): 72( 65)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:53.994175 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:53.994323 445017 task_exit.go:204] [ 70( 63): 70( 63)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.002468 445017 usertrap_amd64.go:212] [ 73( 66): 73( 66)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.002697 445017 usertrap_amd64.go:122] [ 73( 66): 73( 66)] Allocate a new trap: 0xc000b12000 28 D0719 21:52:54.003261 445017 usertrap_amd64.go:225] [ 73( 66): 73( 66)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.007750 445017 usertrap_amd64.go:212] [ 73( 66): 73( 66)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.007838 445017 usertrap_amd64.go:122] [ 73( 66): 73( 66)] Allocate a new trap: 0xc000b12000 29 D0719 21:52:54.007927 445017 usertrap_amd64.go:225] [ 73( 66): 73( 66)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.008745 445017 usertrap_amd64.go:212] [ 73( 66): 73( 66)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.008808 445017 usertrap_amd64.go:122] [ 73( 66): 73( 66)] Allocate a new trap: 0xc000b12000 30 D0719 21:52:54.008862 445017 usertrap_amd64.go:225] [ 73( 66): 73( 66)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.012606 445017 usertrap_amd64.go:212] [ 73( 66): 73( 66)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.012668 445017 usertrap_amd64.go:122] [ 73( 66): 73( 66)] Allocate a new trap: 0xc000b12000 31 D0719 21:52:54.012720 445017 usertrap_amd64.go:225] [ 73( 66): 73( 66)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.012931 445017 usertrap_amd64.go:212] [ 73( 66): 73( 66)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.012973 445017 usertrap_amd64.go:122] [ 73( 66): 73( 66)] Allocate a new trap: 0xc000b12000 32 D0719 21:52:54.013023 445017 usertrap_amd64.go:225] [ 73( 66): 73( 66)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.013680 445017 usertrap_amd64.go:212] [ 73( 66): 73( 66)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.013807 445017 usertrap_amd64.go:122] [ 73( 66): 73( 66)] Allocate a new trap: 0xc000b12000 33 D0719 21:52:54.013922 445017 usertrap_amd64.go:225] [ 73( 66): 73( 66)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.014111 445017 usertrap_amd64.go:212] [ 73( 66): 74( 67)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.014199 445017 usertrap_amd64.go:122] [ 73( 66): 74( 67)] Allocate a new trap: 0xc000b12000 34 D0719 21:52:54.014296 445017 usertrap_amd64.go:225] [ 73( 66): 74( 67)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.022615 445017 usertrap_amd64.go:212] [ 73( 66): 73( 66)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.022696 445017 usertrap_amd64.go:122] [ 73( 66): 73( 66)] Allocate a new trap: 0xc000b12000 35 D0719 21:52:54.022761 445017 usertrap_amd64.go:225] [ 73( 66): 73( 66)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.025009 445017 usertrap_amd64.go:212] [ 73( 66): 73( 66)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.025056 445017 usertrap_amd64.go:122] [ 73( 66): 73( 66)] Allocate a new trap: 0xc000b12000 36 D0719 21:52:54.025102 445017 usertrap_amd64.go:225] [ 73( 66): 73( 66)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.025489 445017 task_exit.go:204] [ 73( 66): 73( 66)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.025758 445017 task_exit.go:204] [ 73( 66): 73( 66)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.025922 445017 task_signals.go:204] [ 73( 66): 75( 68)] Signal 73, PID: 75, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.025912 445017 task_signals.go:204] [ 73( 66): 74( 67)] Signal 73, PID: 74, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.026017 445017 task_exit.go:204] [ 73( 66): 75( 68)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.026277 445017 task_exit.go:204] [ 73( 66): 75( 68)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.026349 445017 task_exit.go:204] [ 73( 66): 75( 68)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.026466 445017 task_exit.go:204] [ 73( 66): 74( 67)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.029743 445017 task_exit.go:204] [ 73( 66): 74( 67)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.029906 445017 task_exit.go:204] [ 73( 66): 74( 67)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.030019 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.030138 445017 task_exit.go:204] [ 73( 66): 73( 66)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.038418 445017 usertrap_amd64.go:212] [ 76( 69): 76( 69)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.038540 445017 usertrap_amd64.go:122] [ 76( 69): 76( 69)] Allocate a new trap: 0xc00030ecc0 28 D0719 21:52:54.039030 445017 usertrap_amd64.go:225] [ 76( 69): 76( 69)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.043325 445017 usertrap_amd64.go:212] [ 76( 69): 76( 69)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.043417 445017 usertrap_amd64.go:122] [ 76( 69): 76( 69)] Allocate a new trap: 0xc00030ecc0 29 D0719 21:52:54.043476 445017 usertrap_amd64.go:225] [ 76( 69): 76( 69)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.044887 445017 usertrap_amd64.go:212] [ 76( 69): 76( 69)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.045013 445017 usertrap_amd64.go:122] [ 76( 69): 76( 69)] Allocate a new trap: 0xc00030ecc0 30 D0719 21:52:54.045142 445017 usertrap_amd64.go:225] [ 76( 69): 76( 69)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.050581 445017 usertrap_amd64.go:212] [ 76( 69): 76( 69)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.050656 445017 usertrap_amd64.go:122] [ 76( 69): 76( 69)] Allocate a new trap: 0xc00030ecc0 31 D0719 21:52:54.050713 445017 usertrap_amd64.go:225] [ 76( 69): 76( 69)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.051021 445017 usertrap_amd64.go:212] [ 76( 69): 76( 69)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.051087 445017 usertrap_amd64.go:122] [ 76( 69): 76( 69)] Allocate a new trap: 0xc00030ecc0 32 D0719 21:52:54.051134 445017 usertrap_amd64.go:225] [ 76( 69): 76( 69)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.051756 445017 usertrap_amd64.go:212] [ 76( 69): 76( 69)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.051810 445017 usertrap_amd64.go:122] [ 76( 69): 76( 69)] Allocate a new trap: 0xc00030ecc0 33 D0719 21:52:54.051867 445017 usertrap_amd64.go:225] [ 76( 69): 76( 69)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.052485 445017 usertrap_amd64.go:212] [ 76( 69): 77( 70)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.052591 445017 usertrap_amd64.go:122] [ 76( 69): 77( 70)] Allocate a new trap: 0xc00030ecc0 34 D0719 21:52:54.052670 445017 usertrap_amd64.go:225] [ 76( 69): 77( 70)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.059573 445017 usertrap_amd64.go:212] [ 76( 69): 76( 69)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.059687 445017 usertrap_amd64.go:122] [ 76( 69): 76( 69)] Allocate a new trap: 0xc00030ecc0 35 D0719 21:52:54.059755 445017 usertrap_amd64.go:225] [ 76( 69): 76( 69)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.062166 445017 usertrap_amd64.go:212] [ 76( 69): 76( 69)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.062255 445017 usertrap_amd64.go:122] [ 76( 69): 76( 69)] Allocate a new trap: 0xc00030ecc0 36 D0719 21:52:54.062362 445017 usertrap_amd64.go:225] [ 76( 69): 76( 69)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.062868 445017 task_exit.go:204] [ 76( 69): 76( 69)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.063107 445017 task_exit.go:204] [ 76( 69): 76( 69)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.063106 445017 task_signals.go:204] [ 76( 69): 78( 71)] Signal 76, PID: 78, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.063260 445017 task_exit.go:204] [ 76( 69): 78( 71)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.063252 445017 task_signals.go:204] [ 76( 69): 77( 70)] Signal 76, PID: 77, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.063473 445017 task_exit.go:204] [ 76( 69): 77( 70)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.063880 445017 task_exit.go:204] [ 76( 69): 78( 71)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.063953 445017 task_exit.go:204] [ 76( 69): 78( 71)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.066955 445017 task_exit.go:204] [ 76( 69): 77( 70)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.067037 445017 task_exit.go:204] [ 76( 69): 77( 70)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.067116 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.067448 445017 task_exit.go:204] [ 76( 69): 76( 69)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.074030 445017 usertrap_amd64.go:212] [ 79( 72): 79( 72)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.074117 445017 usertrap_amd64.go:122] [ 79( 72): 79( 72)] Allocate a new trap: 0xc0008862a0 28 D0719 21:52:54.074553 445017 usertrap_amd64.go:225] [ 79( 72): 79( 72)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.077705 445017 usertrap_amd64.go:212] [ 79( 72): 79( 72)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.077761 445017 usertrap_amd64.go:122] [ 79( 72): 79( 72)] Allocate a new trap: 0xc0008862a0 29 D0719 21:52:54.077820 445017 usertrap_amd64.go:225] [ 79( 72): 79( 72)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.078715 445017 usertrap_amd64.go:212] [ 79( 72): 79( 72)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.078758 445017 usertrap_amd64.go:122] [ 79( 72): 79( 72)] Allocate a new trap: 0xc0008862a0 30 D0719 21:52:54.078826 445017 usertrap_amd64.go:225] [ 79( 72): 79( 72)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.082788 445017 usertrap_amd64.go:212] [ 79( 72): 79( 72)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.082863 445017 usertrap_amd64.go:122] [ 79( 72): 79( 72)] Allocate a new trap: 0xc0008862a0 31 D0719 21:52:54.082934 445017 usertrap_amd64.go:225] [ 79( 72): 79( 72)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.083255 445017 usertrap_amd64.go:212] [ 79( 72): 79( 72)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.083298 445017 usertrap_amd64.go:122] [ 79( 72): 79( 72)] Allocate a new trap: 0xc0008862a0 32 D0719 21:52:54.083363 445017 usertrap_amd64.go:225] [ 79( 72): 79( 72)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.084024 445017 usertrap_amd64.go:212] [ 79( 72): 79( 72)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.084083 445017 usertrap_amd64.go:122] [ 79( 72): 79( 72)] Allocate a new trap: 0xc0008862a0 33 D0719 21:52:54.084162 445017 usertrap_amd64.go:225] [ 79( 72): 79( 72)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.084776 445017 usertrap_amd64.go:212] [ 79( 72): 80( 73)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.084902 445017 usertrap_amd64.go:122] [ 79( 72): 80( 73)] Allocate a new trap: 0xc0008862a0 34 D0719 21:52:54.085036 445017 usertrap_amd64.go:225] [ 79( 72): 80( 73)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.091354 445017 usertrap_amd64.go:212] [ 79( 72): 79( 72)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.091460 445017 usertrap_amd64.go:122] [ 79( 72): 79( 72)] Allocate a new trap: 0xc0008862a0 35 D0719 21:52:54.091516 445017 usertrap_amd64.go:225] [ 79( 72): 79( 72)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.093564 445017 usertrap_amd64.go:212] [ 79( 72): 79( 72)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.093641 445017 usertrap_amd64.go:122] [ 79( 72): 79( 72)] Allocate a new trap: 0xc0008862a0 36 D0719 21:52:54.093693 445017 usertrap_amd64.go:225] [ 79( 72): 79( 72)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.094185 445017 task_exit.go:204] [ 79( 72): 79( 72)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.094388 445017 task_signals.go:204] [ 79( 72): 81( 74)] Signal 79, PID: 81, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.094421 445017 task_exit.go:204] [ 79( 72): 79( 72)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.094414 445017 task_signals.go:204] [ 79( 72): 80( 73)] Signal 79, PID: 80, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.094499 445017 task_exit.go:204] [ 79( 72): 81( 74)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.094684 445017 task_exit.go:204] [ 79( 72): 80( 73)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.094953 445017 task_exit.go:204] [ 79( 72): 81( 74)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.095006 445017 task_exit.go:204] [ 79( 72): 81( 74)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.097759 445017 task_exit.go:204] [ 79( 72): 80( 73)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.097846 445017 task_exit.go:204] [ 79( 72): 80( 73)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.097930 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.098322 445017 task_exit.go:204] [ 79( 72): 79( 72)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.105168 445017 usertrap_amd64.go:212] [ 82( 75): 82( 75)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.105283 445017 usertrap_amd64.go:122] [ 82( 75): 82( 75)] Allocate a new trap: 0xc000bfa060 28 D0719 21:52:54.105682 445017 usertrap_amd64.go:225] [ 82( 75): 82( 75)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.109131 445017 usertrap_amd64.go:212] [ 82( 75): 82( 75)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.109212 445017 usertrap_amd64.go:122] [ 82( 75): 82( 75)] Allocate a new trap: 0xc000bfa060 29 D0719 21:52:54.109337 445017 usertrap_amd64.go:225] [ 82( 75): 82( 75)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.110346 445017 usertrap_amd64.go:212] [ 82( 75): 82( 75)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.110409 445017 usertrap_amd64.go:122] [ 82( 75): 82( 75)] Allocate a new trap: 0xc000bfa060 30 D0719 21:52:54.110475 445017 usertrap_amd64.go:225] [ 82( 75): 82( 75)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.113926 445017 usertrap_amd64.go:212] [ 82( 75): 82( 75)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.114006 445017 usertrap_amd64.go:122] [ 82( 75): 82( 75)] Allocate a new trap: 0xc000bfa060 31 D0719 21:52:54.114090 445017 usertrap_amd64.go:225] [ 82( 75): 82( 75)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.114320 445017 usertrap_amd64.go:212] [ 82( 75): 82( 75)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.114371 445017 usertrap_amd64.go:122] [ 82( 75): 82( 75)] Allocate a new trap: 0xc000bfa060 32 D0719 21:52:54.114442 445017 usertrap_amd64.go:225] [ 82( 75): 82( 75)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.114974 445017 usertrap_amd64.go:212] [ 82( 75): 82( 75)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.115030 445017 usertrap_amd64.go:122] [ 82( 75): 82( 75)] Allocate a new trap: 0xc000bfa060 33 D0719 21:52:54.115100 445017 usertrap_amd64.go:225] [ 82( 75): 82( 75)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.115577 445017 usertrap_amd64.go:212] [ 82( 75): 83( 76)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.115698 445017 usertrap_amd64.go:122] [ 82( 75): 83( 76)] Allocate a new trap: 0xc000bfa060 34 D0719 21:52:54.115829 445017 usertrap_amd64.go:225] [ 82( 75): 83( 76)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.122107 445017 usertrap_amd64.go:212] [ 82( 75): 82( 75)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.122175 445017 usertrap_amd64.go:122] [ 82( 75): 82( 75)] Allocate a new trap: 0xc000bfa060 35 D0719 21:52:54.122268 445017 usertrap_amd64.go:225] [ 82( 75): 82( 75)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.124476 445017 usertrap_amd64.go:212] [ 82( 75): 82( 75)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.124528 445017 usertrap_amd64.go:122] [ 82( 75): 82( 75)] Allocate a new trap: 0xc000bfa060 36 D0719 21:52:54.124585 445017 usertrap_amd64.go:225] [ 82( 75): 82( 75)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.125040 445017 task_exit.go:204] [ 82( 75): 82( 75)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.125277 445017 task_signals.go:204] [ 82( 75): 84( 77)] Signal 82, PID: 84, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.125265 445017 task_signals.go:204] [ 82( 75): 83( 76)] Signal 82, PID: 83, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.125337 445017 task_exit.go:204] [ 82( 75): 82( 75)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.125489 445017 task_exit.go:204] [ 82( 75): 84( 77)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.125649 445017 task_exit.go:204] [ 82( 75): 83( 76)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.125865 445017 task_exit.go:204] [ 82( 75): 84( 77)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.125975 445017 task_exit.go:204] [ 82( 75): 84( 77)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.128859 445017 task_exit.go:204] [ 82( 75): 83( 76)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.128930 445017 task_exit.go:204] [ 82( 75): 83( 76)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.129009 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.129245 445017 task_exit.go:204] [ 82( 75): 82( 75)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.135750 445017 usertrap_amd64.go:212] [ 85( 78): 85( 78)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.135845 445017 usertrap_amd64.go:122] [ 85( 78): 85( 78)] Allocate a new trap: 0xc00037e6f0 28 D0719 21:52:54.136335 445017 usertrap_amd64.go:225] [ 85( 78): 85( 78)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.140092 445017 usertrap_amd64.go:212] [ 85( 78): 85( 78)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.140181 445017 usertrap_amd64.go:122] [ 85( 78): 85( 78)] Allocate a new trap: 0xc00037e6f0 29 D0719 21:52:54.140250 445017 usertrap_amd64.go:225] [ 85( 78): 85( 78)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.141107 445017 usertrap_amd64.go:212] [ 85( 78): 85( 78)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.141208 445017 usertrap_amd64.go:122] [ 85( 78): 85( 78)] Allocate a new trap: 0xc00037e6f0 30 D0719 21:52:54.141282 445017 usertrap_amd64.go:225] [ 85( 78): 85( 78)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.145363 445017 usertrap_amd64.go:212] [ 85( 78): 85( 78)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.145454 445017 usertrap_amd64.go:122] [ 85( 78): 85( 78)] Allocate a new trap: 0xc00037e6f0 31 D0719 21:52:54.145522 445017 usertrap_amd64.go:225] [ 85( 78): 85( 78)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.145764 445017 usertrap_amd64.go:212] [ 85( 78): 85( 78)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.145831 445017 usertrap_amd64.go:122] [ 85( 78): 85( 78)] Allocate a new trap: 0xc00037e6f0 32 D0719 21:52:54.145933 445017 usertrap_amd64.go:225] [ 85( 78): 85( 78)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.146571 445017 usertrap_amd64.go:212] [ 85( 78): 85( 78)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.146634 445017 usertrap_amd64.go:122] [ 85( 78): 85( 78)] Allocate a new trap: 0xc00037e6f0 33 D0719 21:52:54.146696 445017 usertrap_amd64.go:225] [ 85( 78): 85( 78)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.146927 445017 usertrap_amd64.go:212] [ 85( 78): 86( 79)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.146993 445017 usertrap_amd64.go:122] [ 85( 78): 86( 79)] Allocate a new trap: 0xc00037e6f0 34 D0719 21:52:54.147048 445017 usertrap_amd64.go:225] [ 85( 78): 86( 79)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.153303 445017 usertrap_amd64.go:212] [ 85( 78): 85( 78)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.153355 445017 usertrap_amd64.go:122] [ 85( 78): 85( 78)] Allocate a new trap: 0xc00037e6f0 35 D0719 21:52:54.153443 445017 usertrap_amd64.go:225] [ 85( 78): 85( 78)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.155726 445017 usertrap_amd64.go:212] [ 85( 78): 85( 78)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.155781 445017 usertrap_amd64.go:122] [ 85( 78): 85( 78)] Allocate a new trap: 0xc00037e6f0 36 D0719 21:52:54.155850 445017 usertrap_amd64.go:225] [ 85( 78): 85( 78)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.156301 445017 task_exit.go:204] [ 85( 78): 85( 78)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.156434 445017 task_signals.go:204] [ 85( 78): 87( 80)] Signal 85, PID: 87, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.156504 445017 task_exit.go:204] [ 85( 78): 85( 78)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.156631 445017 task_exit.go:204] [ 85( 78): 87( 80)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.156736 445017 task_signals.go:204] [ 85( 78): 86( 79)] Signal 85, PID: 86, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.156826 445017 task_exit.go:204] [ 85( 78): 86( 79)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.156966 445017 task_exit.go:204] [ 85( 78): 87( 80)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.157020 445017 task_exit.go:204] [ 85( 78): 87( 80)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.160434 445017 task_exit.go:204] [ 85( 78): 86( 79)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.160509 445017 task_exit.go:204] [ 85( 78): 86( 79)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.160590 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.161098 445017 task_exit.go:204] [ 85( 78): 85( 78)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.168605 445017 usertrap_amd64.go:212] [ 88( 81): 88( 81)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.168719 445017 usertrap_amd64.go:122] [ 88( 81): 88( 81)] Allocate a new trap: 0xc000a68120 28 D0719 21:52:54.169102 445017 usertrap_amd64.go:225] [ 88( 81): 88( 81)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.172859 445017 usertrap_amd64.go:212] [ 88( 81): 88( 81)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.172948 445017 usertrap_amd64.go:122] [ 88( 81): 88( 81)] Allocate a new trap: 0xc000a68120 29 D0719 21:52:54.173029 445017 usertrap_amd64.go:225] [ 88( 81): 88( 81)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.174081 445017 usertrap_amd64.go:212] [ 88( 81): 88( 81)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.174172 445017 usertrap_amd64.go:122] [ 88( 81): 88( 81)] Allocate a new trap: 0xc000a68120 30 D0719 21:52:54.174250 445017 usertrap_amd64.go:225] [ 88( 81): 88( 81)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.179026 445017 usertrap_amd64.go:212] [ 88( 81): 88( 81)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.179148 445017 usertrap_amd64.go:122] [ 88( 81): 88( 81)] Allocate a new trap: 0xc000a68120 31 D0719 21:52:54.179249 445017 usertrap_amd64.go:225] [ 88( 81): 88( 81)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.179483 445017 usertrap_amd64.go:212] [ 88( 81): 88( 81)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.179535 445017 usertrap_amd64.go:122] [ 88( 81): 88( 81)] Allocate a new trap: 0xc000a68120 32 D0719 21:52:54.179682 445017 usertrap_amd64.go:225] [ 88( 81): 88( 81)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.180471 445017 usertrap_amd64.go:212] [ 88( 81): 88( 81)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.180545 445017 usertrap_amd64.go:122] [ 88( 81): 88( 81)] Allocate a new trap: 0xc000a68120 33 D0719 21:52:54.180628 445017 usertrap_amd64.go:225] [ 88( 81): 88( 81)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.181045 445017 usertrap_amd64.go:212] [ 88( 81): 89( 82)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.181231 445017 usertrap_amd64.go:122] [ 88( 81): 89( 82)] Allocate a new trap: 0xc000a68120 34 D0719 21:52:54.181405 445017 usertrap_amd64.go:225] [ 88( 81): 89( 82)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.189789 445017 usertrap_amd64.go:212] [ 88( 81): 88( 81)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.189868 445017 usertrap_amd64.go:122] [ 88( 81): 88( 81)] Allocate a new trap: 0xc000a68120 35 D0719 21:52:54.189944 445017 usertrap_amd64.go:225] [ 88( 81): 88( 81)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.192445 445017 usertrap_amd64.go:212] [ 88( 81): 88( 81)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.192505 445017 usertrap_amd64.go:122] [ 88( 81): 88( 81)] Allocate a new trap: 0xc000a68120 36 D0719 21:52:54.192588 445017 usertrap_amd64.go:225] [ 88( 81): 88( 81)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.193222 445017 task_exit.go:204] [ 88( 81): 88( 81)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.193358 445017 task_signals.go:204] [ 88( 81): 90( 83)] Signal 88, PID: 90, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.193402 445017 task_signals.go:204] [ 88( 81): 89( 82)] Signal 88, PID: 89, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.193579 445017 task_exit.go:204] [ 88( 81): 90( 83)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.193762 445017 task_exit.go:204] [ 88( 81): 90( 83)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.193812 445017 task_exit.go:204] [ 88( 81): 90( 83)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.193902 445017 task_exit.go:204] [ 88( 81): 89( 82)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.194111 445017 task_exit.go:204] [ 88( 81): 88( 81)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.196834 445017 task_exit.go:204] [ 88( 81): 89( 82)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.196888 445017 task_exit.go:204] [ 88( 81): 89( 82)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.196989 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.197111 445017 task_exit.go:204] [ 88( 81): 88( 81)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.205135 445017 usertrap_amd64.go:212] [ 91( 84): 91( 84)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.205262 445017 usertrap_amd64.go:122] [ 91( 84): 91( 84)] Allocate a new trap: 0xc000b12420 28 D0719 21:52:54.205980 445017 usertrap_amd64.go:225] [ 91( 84): 91( 84)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.209907 445017 usertrap_amd64.go:212] [ 91( 84): 91( 84)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.210014 445017 usertrap_amd64.go:122] [ 91( 84): 91( 84)] Allocate a new trap: 0xc000b12420 29 D0719 21:52:54.210089 445017 usertrap_amd64.go:225] [ 91( 84): 91( 84)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.211288 445017 usertrap_amd64.go:212] [ 91( 84): 91( 84)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.211368 445017 usertrap_amd64.go:122] [ 91( 84): 91( 84)] Allocate a new trap: 0xc000b12420 30 D0719 21:52:54.211450 445017 usertrap_amd64.go:225] [ 91( 84): 91( 84)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.215432 445017 usertrap_amd64.go:212] [ 91( 84): 91( 84)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.215510 445017 usertrap_amd64.go:122] [ 91( 84): 91( 84)] Allocate a new trap: 0xc000b12420 31 D0719 21:52:54.215585 445017 usertrap_amd64.go:225] [ 91( 84): 91( 84)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.215983 445017 usertrap_amd64.go:212] [ 91( 84): 91( 84)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.216049 445017 usertrap_amd64.go:122] [ 91( 84): 91( 84)] Allocate a new trap: 0xc000b12420 32 D0719 21:52:54.216117 445017 usertrap_amd64.go:225] [ 91( 84): 91( 84)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.216598 445017 usertrap_amd64.go:212] [ 91( 84): 91( 84)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.216676 445017 usertrap_amd64.go:122] [ 91( 84): 91( 84)] Allocate a new trap: 0xc000b12420 33 D0719 21:52:54.216741 445017 usertrap_amd64.go:225] [ 91( 84): 91( 84)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.217212 445017 usertrap_amd64.go:212] [ 91( 84): 92( 85)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.217274 445017 usertrap_amd64.go:122] [ 91( 84): 92( 85)] Allocate a new trap: 0xc000b12420 34 D0719 21:52:54.217461 445017 usertrap_amd64.go:225] [ 91( 84): 92( 85)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.225453 445017 usertrap_amd64.go:212] [ 91( 84): 91( 84)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.225520 445017 usertrap_amd64.go:122] [ 91( 84): 91( 84)] Allocate a new trap: 0xc000b12420 35 D0719 21:52:54.225613 445017 usertrap_amd64.go:225] [ 91( 84): 91( 84)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.228066 445017 usertrap_amd64.go:212] [ 91( 84): 91( 84)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.228171 445017 usertrap_amd64.go:122] [ 91( 84): 91( 84)] Allocate a new trap: 0xc000b12420 36 D0719 21:52:54.228273 445017 usertrap_amd64.go:225] [ 91( 84): 91( 84)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.228822 445017 task_exit.go:204] [ 91( 84): 91( 84)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.229060 445017 task_exit.go:204] [ 91( 84): 91( 84)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.229183 445017 task_signals.go:204] [ 91( 84): 93( 86)] Signal 91, PID: 93, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.229189 445017 task_signals.go:204] [ 91( 84): 92( 85)] Signal 91, PID: 92, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.229357 445017 task_exit.go:204] [ 91( 84): 93( 86)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.229682 445017 task_exit.go:204] [ 91( 84): 92( 85)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.229919 445017 task_exit.go:204] [ 91( 84): 93( 86)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.229984 445017 task_exit.go:204] [ 91( 84): 93( 86)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.233289 445017 task_exit.go:204] [ 91( 84): 92( 85)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.233377 445017 task_exit.go:204] [ 91( 84): 92( 85)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.233472 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.233676 445017 task_exit.go:204] [ 91( 84): 91( 84)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.240621 445017 usertrap_amd64.go:212] [ 94( 87): 94( 87)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.240734 445017 usertrap_amd64.go:122] [ 94( 87): 94( 87)] Allocate a new trap: 0xc000bfa120 28 D0719 21:52:54.241260 445017 usertrap_amd64.go:225] [ 94( 87): 94( 87)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.245027 445017 usertrap_amd64.go:212] [ 94( 87): 94( 87)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.245089 445017 usertrap_amd64.go:122] [ 94( 87): 94( 87)] Allocate a new trap: 0xc000bfa120 29 D0719 21:52:54.245148 445017 usertrap_amd64.go:225] [ 94( 87): 94( 87)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.246115 445017 usertrap_amd64.go:212] [ 94( 87): 94( 87)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.246200 445017 usertrap_amd64.go:122] [ 94( 87): 94( 87)] Allocate a new trap: 0xc000bfa120 30 D0719 21:52:54.246249 445017 usertrap_amd64.go:225] [ 94( 87): 94( 87)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.250149 445017 usertrap_amd64.go:212] [ 94( 87): 94( 87)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.250215 445017 usertrap_amd64.go:122] [ 94( 87): 94( 87)] Allocate a new trap: 0xc000bfa120 31 D0719 21:52:54.250300 445017 usertrap_amd64.go:225] [ 94( 87): 94( 87)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.250774 445017 usertrap_amd64.go:212] [ 94( 87): 94( 87)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.250832 445017 usertrap_amd64.go:122] [ 94( 87): 94( 87)] Allocate a new trap: 0xc000bfa120 32 D0719 21:52:54.250890 445017 usertrap_amd64.go:225] [ 94( 87): 94( 87)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.252225 445017 usertrap_amd64.go:212] [ 94( 87): 94( 87)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.252305 445017 usertrap_amd64.go:122] [ 94( 87): 94( 87)] Allocate a new trap: 0xc000bfa120 33 D0719 21:52:54.252382 445017 usertrap_amd64.go:225] [ 94( 87): 94( 87)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.253183 445017 usertrap_amd64.go:212] [ 94( 87): 95( 88)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.253277 445017 usertrap_amd64.go:122] [ 94( 87): 95( 88)] Allocate a new trap: 0xc000bfa120 34 D0719 21:52:54.253473 445017 usertrap_amd64.go:225] [ 94( 87): 95( 88)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.260751 445017 usertrap_amd64.go:212] [ 94( 87): 94( 87)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.260833 445017 usertrap_amd64.go:122] [ 94( 87): 94( 87)] Allocate a new trap: 0xc000bfa120 35 D0719 21:52:54.260906 445017 usertrap_amd64.go:225] [ 94( 87): 94( 87)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.263404 445017 usertrap_amd64.go:212] [ 94( 87): 94( 87)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.263479 445017 usertrap_amd64.go:122] [ 94( 87): 94( 87)] Allocate a new trap: 0xc000bfa120 36 D0719 21:52:54.263669 445017 usertrap_amd64.go:225] [ 94( 87): 94( 87)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.264436 445017 task_exit.go:204] [ 94( 87): 94( 87)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.264614 445017 task_signals.go:204] [ 94( 87): 95( 88)] Signal 94, PID: 95, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.264717 445017 task_exit.go:204] [ 94( 87): 94( 87)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.264849 445017 task_exit.go:204] [ 94( 87): 95( 88)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.264822 445017 task_signals.go:204] [ 94( 87): 96( 89)] Signal 94, PID: 96, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.265016 445017 task_exit.go:204] [ 94( 87): 96( 89)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.265281 445017 task_exit.go:204] [ 94( 87): 96( 89)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.265361 445017 task_exit.go:204] [ 94( 87): 96( 89)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.268982 445017 task_exit.go:204] [ 94( 87): 95( 88)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.269066 445017 task_exit.go:204] [ 94( 87): 95( 88)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.269145 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.269691 445017 task_exit.go:204] [ 94( 87): 94( 87)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.277189 445017 usertrap_amd64.go:212] [ 97( 90): 97( 90)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.277270 445017 usertrap_amd64.go:122] [ 97( 90): 97( 90)] Allocate a new trap: 0xc000b12480 28 D0719 21:52:54.277698 445017 usertrap_amd64.go:225] [ 97( 90): 97( 90)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.281964 445017 usertrap_amd64.go:212] [ 97( 90): 97( 90)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.282022 445017 usertrap_amd64.go:122] [ 97( 90): 97( 90)] Allocate a new trap: 0xc000b12480 29 D0719 21:52:54.282087 445017 usertrap_amd64.go:225] [ 97( 90): 97( 90)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.282922 445017 usertrap_amd64.go:212] [ 97( 90): 97( 90)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.282976 445017 usertrap_amd64.go:122] [ 97( 90): 97( 90)] Allocate a new trap: 0xc000b12480 30 D0719 21:52:54.283044 445017 usertrap_amd64.go:225] [ 97( 90): 97( 90)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.286721 445017 usertrap_amd64.go:212] [ 97( 90): 97( 90)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.286811 445017 usertrap_amd64.go:122] [ 97( 90): 97( 90)] Allocate a new trap: 0xc000b12480 31 D0719 21:52:54.286911 445017 usertrap_amd64.go:225] [ 97( 90): 97( 90)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.287237 445017 usertrap_amd64.go:212] [ 97( 90): 97( 90)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.287297 445017 usertrap_amd64.go:122] [ 97( 90): 97( 90)] Allocate a new trap: 0xc000b12480 32 D0719 21:52:54.287365 445017 usertrap_amd64.go:225] [ 97( 90): 97( 90)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.288053 445017 usertrap_amd64.go:212] [ 97( 90): 97( 90)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.288111 445017 usertrap_amd64.go:122] [ 97( 90): 97( 90)] Allocate a new trap: 0xc000b12480 33 D0719 21:52:54.288201 445017 usertrap_amd64.go:225] [ 97( 90): 97( 90)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.288365 445017 usertrap_amd64.go:212] [ 97( 90): 98( 91)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.288435 445017 usertrap_amd64.go:122] [ 97( 90): 98( 91)] Allocate a new trap: 0xc000b12480 34 D0719 21:52:54.288515 445017 usertrap_amd64.go:225] [ 97( 90): 98( 91)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.296535 445017 usertrap_amd64.go:212] [ 97( 90): 97( 90)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.296591 445017 usertrap_amd64.go:122] [ 97( 90): 97( 90)] Allocate a new trap: 0xc000b12480 35 D0719 21:52:54.296687 445017 usertrap_amd64.go:225] [ 97( 90): 97( 90)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.298789 445017 usertrap_amd64.go:212] [ 97( 90): 97( 90)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.298860 445017 usertrap_amd64.go:122] [ 97( 90): 97( 90)] Allocate a new trap: 0xc000b12480 36 D0719 21:52:54.298936 445017 usertrap_amd64.go:225] [ 97( 90): 97( 90)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.299391 445017 task_exit.go:204] [ 97( 90): 97( 90)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.299540 445017 task_signals.go:204] [ 97( 90): 99( 92)] Signal 97, PID: 99, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.299550 445017 task_signals.go:204] [ 97( 90): 98( 91)] Signal 97, PID: 98, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.299666 445017 task_exit.go:204] [ 97( 90): 97( 90)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.299728 445017 task_exit.go:204] [ 97( 90): 98( 91)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.299949 445017 task_exit.go:204] [ 97( 90): 99( 92)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.300116 445017 task_exit.go:204] [ 97( 90): 98( 91)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.300196 445017 task_exit.go:204] [ 97( 90): 98( 91)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.302863 445017 task_exit.go:204] [ 97( 90): 99( 92)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.302930 445017 task_exit.go:204] [ 97( 90): 99( 92)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.302988 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.304016 445017 task_exit.go:204] [ 97( 90): 97( 90)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.310471 445017 usertrap_amd64.go:212] [ 100( 93): 100( 93)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.310553 445017 usertrap_amd64.go:122] [ 100( 93): 100( 93)] Allocate a new trap: 0xc000bfa1e0 28 D0719 21:52:54.310977 445017 usertrap_amd64.go:225] [ 100( 93): 100( 93)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.314264 445017 usertrap_amd64.go:212] [ 100( 93): 100( 93)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.314318 445017 usertrap_amd64.go:122] [ 100( 93): 100( 93)] Allocate a new trap: 0xc000bfa1e0 29 D0719 21:52:54.314394 445017 usertrap_amd64.go:225] [ 100( 93): 100( 93)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.315205 445017 usertrap_amd64.go:212] [ 100( 93): 100( 93)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.315262 445017 usertrap_amd64.go:122] [ 100( 93): 100( 93)] Allocate a new trap: 0xc000bfa1e0 30 D0719 21:52:54.315313 445017 usertrap_amd64.go:225] [ 100( 93): 100( 93)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.318304 445017 usertrap_amd64.go:212] [ 100( 93): 100( 93)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.318400 445017 usertrap_amd64.go:122] [ 100( 93): 100( 93)] Allocate a new trap: 0xc000bfa1e0 31 D0719 21:52:54.318535 445017 usertrap_amd64.go:225] [ 100( 93): 100( 93)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.318848 445017 usertrap_amd64.go:212] [ 100( 93): 100( 93)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.318901 445017 usertrap_amd64.go:122] [ 100( 93): 100( 93)] Allocate a new trap: 0xc000bfa1e0 32 D0719 21:52:54.318978 445017 usertrap_amd64.go:225] [ 100( 93): 100( 93)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.319771 445017 usertrap_amd64.go:212] [ 100( 93): 100( 93)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.319831 445017 usertrap_amd64.go:122] [ 100( 93): 100( 93)] Allocate a new trap: 0xc000bfa1e0 33 D0719 21:52:54.319905 445017 usertrap_amd64.go:225] [ 100( 93): 100( 93)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.320286 445017 usertrap_amd64.go:212] [ 100( 93): 101( 94)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.320358 445017 usertrap_amd64.go:122] [ 100( 93): 101( 94)] Allocate a new trap: 0xc000bfa1e0 34 D0719 21:52:54.320422 445017 usertrap_amd64.go:225] [ 100( 93): 101( 94)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.327642 445017 usertrap_amd64.go:212] [ 100( 93): 100( 93)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.327743 445017 usertrap_amd64.go:122] [ 100( 93): 100( 93)] Allocate a new trap: 0xc000bfa1e0 35 D0719 21:52:54.327822 445017 usertrap_amd64.go:225] [ 100( 93): 100( 93)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.330466 445017 usertrap_amd64.go:212] [ 100( 93): 100( 93)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.330530 445017 usertrap_amd64.go:122] [ 100( 93): 100( 93)] Allocate a new trap: 0xc000bfa1e0 36 D0719 21:52:54.330600 445017 usertrap_amd64.go:225] [ 100( 93): 100( 93)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.331006 445017 task_exit.go:204] [ 100( 93): 100( 93)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.331220 445017 task_signals.go:204] [ 100( 93): 102( 95)] Signal 100, PID: 102, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.331309 445017 task_exit.go:204] [ 100( 93): 100( 93)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.331434 445017 task_signals.go:204] [ 100( 93): 101( 94)] Signal 100, PID: 101, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.331478 445017 task_exit.go:204] [ 100( 93): 102( 95)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.331638 445017 task_exit.go:204] [ 100( 93): 101( 94)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.332105 445017 task_exit.go:204] [ 100( 93): 101( 94)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.332184 445017 task_exit.go:204] [ 100( 93): 101( 94)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.337589 445017 task_exit.go:204] [ 100( 93): 102( 95)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.337670 445017 task_exit.go:204] [ 100( 93): 102( 95)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.337758 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.338847 445017 task_exit.go:204] [ 100( 93): 100( 93)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.351827 445017 usertrap_amd64.go:212] [ 103( 96): 103( 96)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.351976 445017 usertrap_amd64.go:122] [ 103( 96): 103( 96)] Allocate a new trap: 0xc00030e870 28 D0719 21:52:54.352440 445017 usertrap_amd64.go:225] [ 103( 96): 103( 96)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.355507 445017 usertrap_amd64.go:212] [ 103( 96): 103( 96)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.355554 445017 usertrap_amd64.go:122] [ 103( 96): 103( 96)] Allocate a new trap: 0xc00030e870 29 D0719 21:52:54.355650 445017 usertrap_amd64.go:225] [ 103( 96): 103( 96)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.356519 445017 usertrap_amd64.go:212] [ 103( 96): 103( 96)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.356573 445017 usertrap_amd64.go:122] [ 103( 96): 103( 96)] Allocate a new trap: 0xc00030e870 30 D0719 21:52:54.356641 445017 usertrap_amd64.go:225] [ 103( 96): 103( 96)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.359823 445017 usertrap_amd64.go:212] [ 103( 96): 103( 96)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.359900 445017 usertrap_amd64.go:122] [ 103( 96): 103( 96)] Allocate a new trap: 0xc00030e870 31 D0719 21:52:54.359966 445017 usertrap_amd64.go:225] [ 103( 96): 103( 96)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.360218 445017 usertrap_amd64.go:212] [ 103( 96): 103( 96)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.360264 445017 usertrap_amd64.go:122] [ 103( 96): 103( 96)] Allocate a new trap: 0xc00030e870 32 D0719 21:52:54.360344 445017 usertrap_amd64.go:225] [ 103( 96): 103( 96)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.360863 445017 usertrap_amd64.go:212] [ 103( 96): 103( 96)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.360931 445017 usertrap_amd64.go:122] [ 103( 96): 103( 96)] Allocate a new trap: 0xc00030e870 33 D0719 21:52:54.360988 445017 usertrap_amd64.go:225] [ 103( 96): 103( 96)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.361527 445017 usertrap_amd64.go:212] [ 103( 96): 104( 97)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.361725 445017 usertrap_amd64.go:122] [ 103( 96): 104( 97)] Allocate a new trap: 0xc00030e870 34 D0719 21:52:54.361999 445017 usertrap_amd64.go:225] [ 103( 96): 104( 97)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.369313 445017 usertrap_amd64.go:212] [ 103( 96): 103( 96)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.369415 445017 usertrap_amd64.go:122] [ 103( 96): 103( 96)] Allocate a new trap: 0xc00030e870 35 D0719 21:52:54.369482 445017 usertrap_amd64.go:225] [ 103( 96): 103( 96)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.374681 445017 usertrap_amd64.go:212] [ 103( 96): 103( 96)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.374746 445017 usertrap_amd64.go:122] [ 103( 96): 103( 96)] Allocate a new trap: 0xc00030e870 36 D0719 21:52:54.374805 445017 usertrap_amd64.go:225] [ 103( 96): 103( 96)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.375259 445017 task_exit.go:204] [ 103( 96): 103( 96)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.375367 445017 task_signals.go:204] [ 103( 96): 104( 97)] Signal 103, PID: 104, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.375386 445017 task_signals.go:204] [ 103( 96): 105( 98)] Signal 103, PID: 105, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.375556 445017 task_exit.go:204] [ 103( 96): 105( 98)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.375756 445017 task_exit.go:204] [ 103( 96): 103( 96)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.375907 445017 task_exit.go:204] [ 103( 96): 104( 97)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.376125 445017 task_exit.go:204] [ 103( 96): 105( 98)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.376201 445017 task_exit.go:204] [ 103( 96): 105( 98)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.379728 445017 task_exit.go:204] [ 103( 96): 104( 97)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.379803 445017 task_exit.go:204] [ 103( 96): 104( 97)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.379889 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.383912 445017 task_exit.go:204] [ 103( 96): 103( 96)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.395674 445017 usertrap_amd64.go:212] [ 106( 99): 106( 99)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.395820 445017 usertrap_amd64.go:122] [ 106( 99): 106( 99)] Allocate a new trap: 0xc000a68000 28 D0719 21:52:54.396306 445017 usertrap_amd64.go:225] [ 106( 99): 106( 99)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.400009 445017 usertrap_amd64.go:212] [ 106( 99): 106( 99)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.400092 445017 usertrap_amd64.go:122] [ 106( 99): 106( 99)] Allocate a new trap: 0xc000a68000 29 D0719 21:52:54.400195 445017 usertrap_amd64.go:225] [ 106( 99): 106( 99)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.400996 445017 usertrap_amd64.go:212] [ 106( 99): 106( 99)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.401066 445017 usertrap_amd64.go:122] [ 106( 99): 106( 99)] Allocate a new trap: 0xc000a68000 30 D0719 21:52:54.401157 445017 usertrap_amd64.go:225] [ 106( 99): 106( 99)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.405271 445017 usertrap_amd64.go:212] [ 106( 99): 106( 99)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.405351 445017 usertrap_amd64.go:122] [ 106( 99): 106( 99)] Allocate a new trap: 0xc000a68000 31 D0719 21:52:54.405436 445017 usertrap_amd64.go:225] [ 106( 99): 106( 99)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.405681 445017 usertrap_amd64.go:212] [ 106( 99): 106( 99)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.405744 445017 usertrap_amd64.go:122] [ 106( 99): 106( 99)] Allocate a new trap: 0xc000a68000 32 D0719 21:52:54.405811 445017 usertrap_amd64.go:225] [ 106( 99): 106( 99)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.406492 445017 usertrap_amd64.go:212] [ 106( 99): 106( 99)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.406669 445017 usertrap_amd64.go:122] [ 106( 99): 106( 99)] Allocate a new trap: 0xc000a68000 33 D0719 21:52:54.406774 445017 usertrap_amd64.go:225] [ 106( 99): 106( 99)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.406909 445017 usertrap_amd64.go:212] [ 106( 99): 107( 100)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.406993 445017 usertrap_amd64.go:122] [ 106( 99): 107( 100)] Allocate a new trap: 0xc000a68000 34 D0719 21:52:54.407066 445017 usertrap_amd64.go:225] [ 106( 99): 107( 100)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.415552 445017 usertrap_amd64.go:212] [ 106( 99): 106( 99)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.415728 445017 usertrap_amd64.go:122] [ 106( 99): 106( 99)] Allocate a new trap: 0xc000a68000 35 D0719 21:52:54.415845 445017 usertrap_amd64.go:225] [ 106( 99): 106( 99)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.419025 445017 usertrap_amd64.go:212] [ 106( 99): 106( 99)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.419093 445017 usertrap_amd64.go:122] [ 106( 99): 106( 99)] Allocate a new trap: 0xc000a68000 36 D0719 21:52:54.419162 445017 usertrap_amd64.go:225] [ 106( 99): 106( 99)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.419784 445017 task_exit.go:204] [ 106( 99): 106( 99)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.419940 445017 task_signals.go:204] [ 106( 99): 108( 101)] Signal 106, PID: 108, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.420041 445017 task_exit.go:204] [ 106( 99): 106( 99)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.420079 445017 task_signals.go:204] [ 106( 99): 107( 100)] Signal 106, PID: 107, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.420157 445017 task_exit.go:204] [ 106( 99): 108( 101)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.420396 445017 task_exit.go:204] [ 106( 99): 108( 101)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.420471 445017 task_exit.go:204] [ 106( 99): 108( 101)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.420586 445017 task_exit.go:204] [ 106( 99): 107( 100)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.424000 445017 task_exit.go:204] [ 106( 99): 107( 100)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.424074 445017 task_exit.go:204] [ 106( 99): 107( 100)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.424191 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.425099 445017 task_exit.go:204] [ 106( 99): 106( 99)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.431741 445017 usertrap_amd64.go:212] [ 109( 102): 109( 102)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.431833 445017 usertrap_amd64.go:122] [ 109( 102): 109( 102)] Allocate a new trap: 0xc000b12030 28 D0719 21:52:54.432250 445017 usertrap_amd64.go:225] [ 109( 102): 109( 102)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.436443 445017 usertrap_amd64.go:212] [ 109( 102): 109( 102)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.436521 445017 usertrap_amd64.go:122] [ 109( 102): 109( 102)] Allocate a new trap: 0xc000b12030 29 D0719 21:52:54.436608 445017 usertrap_amd64.go:225] [ 109( 102): 109( 102)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.438222 445017 usertrap_amd64.go:212] [ 109( 102): 109( 102)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.438315 445017 usertrap_amd64.go:122] [ 109( 102): 109( 102)] Allocate a new trap: 0xc000b12030 30 D0719 21:52:54.438415 445017 usertrap_amd64.go:225] [ 109( 102): 109( 102)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.442062 445017 usertrap_amd64.go:212] [ 109( 102): 109( 102)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.442128 445017 usertrap_amd64.go:122] [ 109( 102): 109( 102)] Allocate a new trap: 0xc000b12030 31 D0719 21:52:54.442241 445017 usertrap_amd64.go:225] [ 109( 102): 109( 102)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.442485 445017 usertrap_amd64.go:212] [ 109( 102): 109( 102)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.442526 445017 usertrap_amd64.go:122] [ 109( 102): 109( 102)] Allocate a new trap: 0xc000b12030 32 D0719 21:52:54.442571 445017 usertrap_amd64.go:225] [ 109( 102): 109( 102)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.443122 445017 usertrap_amd64.go:212] [ 109( 102): 109( 102)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.443182 445017 usertrap_amd64.go:122] [ 109( 102): 109( 102)] Allocate a new trap: 0xc000b12030 33 D0719 21:52:54.443271 445017 usertrap_amd64.go:225] [ 109( 102): 109( 102)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.443798 445017 usertrap_amd64.go:212] [ 109( 102): 110( 103)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.443880 445017 usertrap_amd64.go:122] [ 109( 102): 110( 103)] Allocate a new trap: 0xc000b12030 34 D0719 21:52:54.443961 445017 usertrap_amd64.go:225] [ 109( 102): 110( 103)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.451452 445017 usertrap_amd64.go:212] [ 109( 102): 109( 102)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.451558 445017 usertrap_amd64.go:122] [ 109( 102): 109( 102)] Allocate a new trap: 0xc000b12030 35 D0719 21:52:54.451670 445017 usertrap_amd64.go:225] [ 109( 102): 109( 102)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.454241 445017 usertrap_amd64.go:212] [ 109( 102): 109( 102)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.454322 445017 usertrap_amd64.go:122] [ 109( 102): 109( 102)] Allocate a new trap: 0xc000b12030 36 D0719 21:52:54.454375 445017 usertrap_amd64.go:225] [ 109( 102): 109( 102)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.454816 445017 task_exit.go:204] [ 109( 102): 109( 102)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.455016 445017 task_signals.go:204] [ 109( 102): 110( 103)] Signal 109, PID: 110, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.455161 445017 task_exit.go:204] [ 109( 102): 110( 103)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.455150 445017 task_signals.go:204] [ 109( 102): 111( 104)] Signal 109, PID: 111, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.455283 445017 task_exit.go:204] [ 109( 102): 111( 104)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.455547 445017 task_exit.go:204] [ 109( 102): 109( 102)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.455748 445017 task_exit.go:204] [ 109( 102): 111( 104)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.455814 445017 task_exit.go:204] [ 109( 102): 111( 104)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.458582 445017 task_exit.go:204] [ 109( 102): 110( 103)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.458719 445017 task_exit.go:204] [ 109( 102): 110( 103)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.458853 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.459793 445017 task_exit.go:204] [ 109( 102): 109( 102)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.468345 445017 usertrap_amd64.go:212] [ 112( 105): 112( 105)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.468445 445017 usertrap_amd64.go:122] [ 112( 105): 112( 105)] Allocate a new trap: 0xc00037e810 28 D0719 21:52:54.468945 445017 usertrap_amd64.go:225] [ 112( 105): 112( 105)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.472819 445017 usertrap_amd64.go:212] [ 112( 105): 112( 105)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.472895 445017 usertrap_amd64.go:122] [ 112( 105): 112( 105)] Allocate a new trap: 0xc00037e810 29 D0719 21:52:54.472999 445017 usertrap_amd64.go:225] [ 112( 105): 112( 105)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.473978 445017 usertrap_amd64.go:212] [ 112( 105): 112( 105)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.474051 445017 usertrap_amd64.go:122] [ 112( 105): 112( 105)] Allocate a new trap: 0xc00037e810 30 D0719 21:52:54.474141 445017 usertrap_amd64.go:225] [ 112( 105): 112( 105)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.478428 445017 usertrap_amd64.go:212] [ 112( 105): 112( 105)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.478504 445017 usertrap_amd64.go:122] [ 112( 105): 112( 105)] Allocate a new trap: 0xc00037e810 31 D0719 21:52:54.478580 445017 usertrap_amd64.go:225] [ 112( 105): 112( 105)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.478814 445017 usertrap_amd64.go:212] [ 112( 105): 112( 105)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.478860 445017 usertrap_amd64.go:122] [ 112( 105): 112( 105)] Allocate a new trap: 0xc00037e810 32 D0719 21:52:54.478944 445017 usertrap_amd64.go:225] [ 112( 105): 112( 105)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.479675 445017 usertrap_amd64.go:212] [ 112( 105): 112( 105)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.479735 445017 usertrap_amd64.go:122] [ 112( 105): 112( 105)] Allocate a new trap: 0xc00037e810 33 D0719 21:52:54.479790 445017 usertrap_amd64.go:225] [ 112( 105): 112( 105)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.480051 445017 usertrap_amd64.go:212] [ 112( 105): 113( 106)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.480156 445017 usertrap_amd64.go:122] [ 112( 105): 113( 106)] Allocate a new trap: 0xc00037e810 34 D0719 21:52:54.480383 445017 usertrap_amd64.go:225] [ 112( 105): 113( 106)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.487739 445017 usertrap_amd64.go:212] [ 112( 105): 112( 105)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.487808 445017 usertrap_amd64.go:122] [ 112( 105): 112( 105)] Allocate a new trap: 0xc00037e810 35 D0719 21:52:54.487873 445017 usertrap_amd64.go:225] [ 112( 105): 112( 105)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.490173 445017 usertrap_amd64.go:212] [ 112( 105): 112( 105)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.490232 445017 usertrap_amd64.go:122] [ 112( 105): 112( 105)] Allocate a new trap: 0xc00037e810 36 D0719 21:52:54.490293 445017 usertrap_amd64.go:225] [ 112( 105): 112( 105)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.491256 445017 task_exit.go:204] [ 112( 105): 112( 105)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.491468 445017 task_exit.go:204] [ 112( 105): 112( 105)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.491599 445017 task_signals.go:204] [ 112( 105): 113( 106)] Signal 112, PID: 113, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.491675 445017 task_signals.go:204] [ 112( 105): 114( 107)] Signal 112, PID: 114, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.491775 445017 task_exit.go:204] [ 112( 105): 113( 106)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.491852 445017 task_exit.go:204] [ 112( 105): 114( 107)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.492254 445017 task_exit.go:204] [ 112( 105): 114( 107)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.492320 445017 task_exit.go:204] [ 112( 105): 114( 107)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.495295 445017 task_exit.go:204] [ 112( 105): 113( 106)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.495349 445017 task_exit.go:204] [ 112( 105): 113( 106)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.495410 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.496278 445017 task_exit.go:204] [ 112( 105): 112( 105)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.503784 445017 usertrap_amd64.go:212] [ 115( 108): 115( 108)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.503895 445017 usertrap_amd64.go:122] [ 115( 108): 115( 108)] Allocate a new trap: 0xc000a68210 28 D0719 21:52:54.504374 445017 usertrap_amd64.go:225] [ 115( 108): 115( 108)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.508337 445017 usertrap_amd64.go:212] [ 115( 108): 115( 108)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.508455 445017 usertrap_amd64.go:122] [ 115( 108): 115( 108)] Allocate a new trap: 0xc000a68210 29 D0719 21:52:54.508569 445017 usertrap_amd64.go:225] [ 115( 108): 115( 108)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.509784 445017 usertrap_amd64.go:212] [ 115( 108): 115( 108)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.509884 445017 usertrap_amd64.go:122] [ 115( 108): 115( 108)] Allocate a new trap: 0xc000a68210 30 D0719 21:52:54.509958 445017 usertrap_amd64.go:225] [ 115( 108): 115( 108)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.513680 445017 usertrap_amd64.go:212] [ 115( 108): 115( 108)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.513757 445017 usertrap_amd64.go:122] [ 115( 108): 115( 108)] Allocate a new trap: 0xc000a68210 31 D0719 21:52:54.513826 445017 usertrap_amd64.go:225] [ 115( 108): 115( 108)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.514077 445017 usertrap_amd64.go:212] [ 115( 108): 115( 108)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.514147 445017 usertrap_amd64.go:122] [ 115( 108): 115( 108)] Allocate a new trap: 0xc000a68210 32 D0719 21:52:54.514206 445017 usertrap_amd64.go:225] [ 115( 108): 115( 108)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.514804 445017 usertrap_amd64.go:212] [ 115( 108): 115( 108)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.514859 445017 usertrap_amd64.go:122] [ 115( 108): 115( 108)] Allocate a new trap: 0xc000a68210 33 D0719 21:52:54.514921 445017 usertrap_amd64.go:225] [ 115( 108): 115( 108)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.515331 445017 usertrap_amd64.go:212] [ 115( 108): 116( 109)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.515428 445017 usertrap_amd64.go:122] [ 115( 108): 116( 109)] Allocate a new trap: 0xc000a68210 34 D0719 21:52:54.515495 445017 usertrap_amd64.go:225] [ 115( 108): 116( 109)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.522755 445017 usertrap_amd64.go:212] [ 115( 108): 115( 108)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.522949 445017 usertrap_amd64.go:122] [ 115( 108): 115( 108)] Allocate a new trap: 0xc000a68210 35 D0719 21:52:54.523080 445017 usertrap_amd64.go:225] [ 115( 108): 115( 108)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.529302 445017 usertrap_amd64.go:212] [ 115( 108): 115( 108)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.529382 445017 usertrap_amd64.go:122] [ 115( 108): 115( 108)] Allocate a new trap: 0xc000a68210 36 D0719 21:52:54.529548 445017 usertrap_amd64.go:225] [ 115( 108): 115( 108)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.530205 445017 task_exit.go:204] [ 115( 108): 115( 108)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.530517 445017 task_exit.go:204] [ 115( 108): 115( 108)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.530496 445017 task_signals.go:204] [ 115( 108): 116( 109)] Signal 115, PID: 116, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.530599 445017 task_signals.go:204] [ 115( 108): 117( 110)] Signal 115, PID: 117, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.530730 445017 task_exit.go:204] [ 115( 108): 116( 109)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.530814 445017 task_exit.go:204] [ 115( 108): 117( 110)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.531062 445017 task_exit.go:204] [ 115( 108): 116( 109)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.531119 445017 task_exit.go:204] [ 115( 108): 116( 109)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.533519 445017 task_exit.go:204] [ 115( 108): 117( 110)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.533608 445017 task_exit.go:204] [ 115( 108): 117( 110)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.533675 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.533921 445017 task_exit.go:204] [ 115( 108): 115( 108)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.558241 445017 usertrap_amd64.go:212] [ 118( 111): 118( 111)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.558364 445017 usertrap_amd64.go:122] [ 118( 111): 118( 111)] Allocate a new trap: 0xc000a68360 28 D0719 21:52:54.558834 445017 usertrap_amd64.go:225] [ 118( 111): 118( 111)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.563670 445017 usertrap_amd64.go:212] [ 118( 111): 118( 111)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.563792 445017 usertrap_amd64.go:122] [ 118( 111): 118( 111)] Allocate a new trap: 0xc000a68360 29 D0719 21:52:54.563882 445017 usertrap_amd64.go:225] [ 118( 111): 118( 111)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.566247 445017 usertrap_amd64.go:212] [ 118( 111): 118( 111)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.566321 445017 usertrap_amd64.go:122] [ 118( 111): 118( 111)] Allocate a new trap: 0xc000a68360 30 D0719 21:52:54.566395 445017 usertrap_amd64.go:225] [ 118( 111): 118( 111)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.574171 445017 usertrap_amd64.go:212] [ 118( 111): 118( 111)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.574400 445017 usertrap_amd64.go:122] [ 118( 111): 118( 111)] Allocate a new trap: 0xc000a68360 31 D0719 21:52:54.574513 445017 usertrap_amd64.go:225] [ 118( 111): 118( 111)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.574877 445017 usertrap_amd64.go:212] [ 118( 111): 118( 111)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.574960 445017 usertrap_amd64.go:122] [ 118( 111): 118( 111)] Allocate a new trap: 0xc000a68360 32 D0719 21:52:54.575040 445017 usertrap_amd64.go:225] [ 118( 111): 118( 111)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.575698 445017 usertrap_amd64.go:212] [ 118( 111): 118( 111)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.575760 445017 usertrap_amd64.go:122] [ 118( 111): 118( 111)] Allocate a new trap: 0xc000a68360 33 D0719 21:52:54.575857 445017 usertrap_amd64.go:225] [ 118( 111): 118( 111)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.577061 445017 usertrap_amd64.go:212] [ 118( 111): 119( 112)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.577139 445017 usertrap_amd64.go:122] [ 118( 111): 119( 112)] Allocate a new trap: 0xc000a68360 34 D0719 21:52:54.577224 445017 usertrap_amd64.go:225] [ 118( 111): 119( 112)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.587273 445017 usertrap_amd64.go:212] [ 118( 111): 118( 111)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.587358 445017 usertrap_amd64.go:122] [ 118( 111): 118( 111)] Allocate a new trap: 0xc000a68360 35 D0719 21:52:54.587416 445017 usertrap_amd64.go:225] [ 118( 111): 118( 111)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.590555 445017 usertrap_amd64.go:212] [ 118( 111): 118( 111)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.590636 445017 usertrap_amd64.go:122] [ 118( 111): 118( 111)] Allocate a new trap: 0xc000a68360 36 D0719 21:52:54.590721 445017 usertrap_amd64.go:225] [ 118( 111): 118( 111)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.591684 445017 task_exit.go:204] [ 118( 111): 118( 111)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.592012 445017 task_signals.go:204] [ 118( 111): 120( 113)] Signal 118, PID: 120, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.592065 445017 task_exit.go:204] [ 118( 111): 118( 111)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.592318 445017 task_exit.go:204] [ 118( 111): 120( 113)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.592465 445017 task_signals.go:204] [ 118( 111): 119( 112)] Signal 118, PID: 119, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.592655 445017 task_exit.go:204] [ 118( 111): 120( 113)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.592717 445017 task_exit.go:204] [ 118( 111): 120( 113)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.592824 445017 task_exit.go:204] [ 118( 111): 119( 112)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.596476 445017 task_exit.go:204] [ 118( 111): 119( 112)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.596536 445017 task_exit.go:204] [ 118( 111): 119( 112)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.596679 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.597212 445017 task_exit.go:204] [ 118( 111): 118( 111)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.603182 445017 usertrap_amd64.go:212] [ 121( 114): 121( 114)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.603280 445017 usertrap_amd64.go:122] [ 121( 114): 121( 114)] Allocate a new trap: 0xc000a68420 28 D0719 21:52:54.603777 445017 usertrap_amd64.go:225] [ 121( 114): 121( 114)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.608775 445017 usertrap_amd64.go:212] [ 121( 114): 121( 114)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.608856 445017 usertrap_amd64.go:122] [ 121( 114): 121( 114)] Allocate a new trap: 0xc000a68420 29 D0719 21:52:54.608932 445017 usertrap_amd64.go:225] [ 121( 114): 121( 114)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.609816 445017 usertrap_amd64.go:212] [ 121( 114): 121( 114)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.609869 445017 usertrap_amd64.go:122] [ 121( 114): 121( 114)] Allocate a new trap: 0xc000a68420 30 D0719 21:52:54.609933 445017 usertrap_amd64.go:225] [ 121( 114): 121( 114)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.614661 445017 usertrap_amd64.go:212] [ 121( 114): 121( 114)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.614732 445017 usertrap_amd64.go:122] [ 121( 114): 121( 114)] Allocate a new trap: 0xc000a68420 31 D0719 21:52:54.614791 445017 usertrap_amd64.go:225] [ 121( 114): 121( 114)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.615024 445017 usertrap_amd64.go:212] [ 121( 114): 121( 114)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.615073 445017 usertrap_amd64.go:122] [ 121( 114): 121( 114)] Allocate a new trap: 0xc000a68420 32 D0719 21:52:54.615171 445017 usertrap_amd64.go:225] [ 121( 114): 121( 114)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.615830 445017 usertrap_amd64.go:212] [ 121( 114): 121( 114)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.615883 445017 usertrap_amd64.go:122] [ 121( 114): 121( 114)] Allocate a new trap: 0xc000a68420 33 D0719 21:52:54.615967 445017 usertrap_amd64.go:225] [ 121( 114): 121( 114)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.616692 445017 usertrap_amd64.go:212] [ 121( 114): 122( 115)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.616759 445017 usertrap_amd64.go:122] [ 121( 114): 122( 115)] Allocate a new trap: 0xc000a68420 34 D0719 21:52:54.616852 445017 usertrap_amd64.go:225] [ 121( 114): 122( 115)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.623799 445017 usertrap_amd64.go:212] [ 121( 114): 121( 114)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.623872 445017 usertrap_amd64.go:122] [ 121( 114): 121( 114)] Allocate a new trap: 0xc000a68420 35 D0719 21:52:54.623916 445017 usertrap_amd64.go:225] [ 121( 114): 121( 114)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.628106 445017 usertrap_amd64.go:212] [ 121( 114): 121( 114)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.628172 445017 usertrap_amd64.go:122] [ 121( 114): 121( 114)] Allocate a new trap: 0xc000a68420 36 D0719 21:52:54.628259 445017 usertrap_amd64.go:225] [ 121( 114): 121( 114)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.628774 445017 task_exit.go:204] [ 121( 114): 121( 114)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.629002 445017 task_signals.go:204] [ 121( 114): 123( 116)] Signal 121, PID: 123, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.629021 445017 task_signals.go:204] [ 121( 114): 122( 115)] Signal 121, PID: 122, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.629099 445017 task_exit.go:204] [ 121( 114): 123( 116)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.629196 445017 task_exit.go:204] [ 121( 114): 122( 115)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.629399 445017 task_exit.go:204] [ 121( 114): 123( 116)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.629453 445017 task_exit.go:204] [ 121( 114): 123( 116)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.629542 445017 task_exit.go:204] [ 121( 114): 121( 114)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.632503 445017 task_exit.go:204] [ 121( 114): 122( 115)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.632554 445017 task_exit.go:204] [ 121( 114): 122( 115)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.632616 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.633291 445017 task_exit.go:204] [ 121( 114): 121( 114)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.641480 445017 usertrap_amd64.go:212] [ 124( 117): 124( 117)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.641566 445017 usertrap_amd64.go:122] [ 124( 117): 124( 117)] Allocate a new trap: 0xc000886240 28 D0719 21:52:54.642011 445017 usertrap_amd64.go:225] [ 124( 117): 124( 117)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.649799 445017 usertrap_amd64.go:212] [ 124( 117): 124( 117)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.649879 445017 usertrap_amd64.go:122] [ 124( 117): 124( 117)] Allocate a new trap: 0xc000886240 29 D0719 21:52:54.649965 445017 usertrap_amd64.go:225] [ 124( 117): 124( 117)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.650957 445017 usertrap_amd64.go:212] [ 124( 117): 124( 117)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.651034 445017 usertrap_amd64.go:122] [ 124( 117): 124( 117)] Allocate a new trap: 0xc000886240 30 D0719 21:52:54.651110 445017 usertrap_amd64.go:225] [ 124( 117): 124( 117)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.656458 445017 usertrap_amd64.go:212] [ 124( 117): 124( 117)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.656650 445017 usertrap_amd64.go:122] [ 124( 117): 124( 117)] Allocate a new trap: 0xc000886240 31 D0719 21:52:54.656762 445017 usertrap_amd64.go:225] [ 124( 117): 124( 117)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.657154 445017 usertrap_amd64.go:212] [ 124( 117): 124( 117)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.657265 445017 usertrap_amd64.go:122] [ 124( 117): 124( 117)] Allocate a new trap: 0xc000886240 32 D0719 21:52:54.657452 445017 usertrap_amd64.go:225] [ 124( 117): 124( 117)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.658169 445017 usertrap_amd64.go:212] [ 124( 117): 124( 117)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.658237 445017 usertrap_amd64.go:122] [ 124( 117): 124( 117)] Allocate a new trap: 0xc000886240 33 D0719 21:52:54.658302 445017 usertrap_amd64.go:225] [ 124( 117): 124( 117)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.658574 445017 usertrap_amd64.go:212] [ 124( 117): 125( 118)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.658664 445017 usertrap_amd64.go:122] [ 124( 117): 125( 118)] Allocate a new trap: 0xc000886240 34 D0719 21:52:54.658761 445017 usertrap_amd64.go:225] [ 124( 117): 125( 118)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.665562 445017 usertrap_amd64.go:212] [ 124( 117): 124( 117)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.665624 445017 usertrap_amd64.go:122] [ 124( 117): 124( 117)] Allocate a new trap: 0xc000886240 35 D0719 21:52:54.665681 445017 usertrap_amd64.go:225] [ 124( 117): 124( 117)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.669400 445017 usertrap_amd64.go:212] [ 124( 117): 124( 117)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.669470 445017 usertrap_amd64.go:122] [ 124( 117): 124( 117)] Allocate a new trap: 0xc000886240 36 D0719 21:52:54.669537 445017 usertrap_amd64.go:225] [ 124( 117): 124( 117)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.671302 445017 task_exit.go:204] [ 124( 117): 124( 117)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.671586 445017 task_exit.go:204] [ 124( 117): 124( 117)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.671781 445017 task_signals.go:204] [ 124( 117): 125( 118)] Signal 124, PID: 125, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.671865 445017 task_exit.go:204] [ 124( 117): 125( 118)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.672055 445017 task_exit.go:204] [ 124( 117): 125( 118)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.672102 445017 task_exit.go:204] [ 124( 117): 125( 118)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.672260 445017 task_signals.go:204] [ 124( 117): 126( 119)] Signal 124, PID: 126, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.672338 445017 task_exit.go:204] [ 124( 117): 126( 119)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.676850 445017 task_exit.go:204] [ 124( 117): 126( 119)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.676947 445017 task_exit.go:204] [ 124( 117): 126( 119)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.677561 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.677688 445017 task_exit.go:204] [ 124( 117): 124( 117)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.689253 445017 usertrap_amd64.go:212] [ 127( 120): 127( 120)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.689369 445017 usertrap_amd64.go:122] [ 127( 120): 127( 120)] Allocate a new trap: 0xc000a684b0 28 D0719 21:52:54.690523 445017 usertrap_amd64.go:225] [ 127( 120): 127( 120)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.696449 445017 usertrap_amd64.go:212] [ 127( 120): 127( 120)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.696579 445017 usertrap_amd64.go:122] [ 127( 120): 127( 120)] Allocate a new trap: 0xc000a684b0 29 D0719 21:52:54.696710 445017 usertrap_amd64.go:225] [ 127( 120): 127( 120)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.697740 445017 usertrap_amd64.go:212] [ 127( 120): 127( 120)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.697824 445017 usertrap_amd64.go:122] [ 127( 120): 127( 120)] Allocate a new trap: 0xc000a684b0 30 D0719 21:52:54.697961 445017 usertrap_amd64.go:225] [ 127( 120): 127( 120)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.701857 445017 usertrap_amd64.go:212] [ 127( 120): 127( 120)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.701917 445017 usertrap_amd64.go:122] [ 127( 120): 127( 120)] Allocate a new trap: 0xc000a684b0 31 D0719 21:52:54.702001 445017 usertrap_amd64.go:225] [ 127( 120): 127( 120)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.702254 445017 usertrap_amd64.go:212] [ 127( 120): 127( 120)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.702300 445017 usertrap_amd64.go:122] [ 127( 120): 127( 120)] Allocate a new trap: 0xc000a684b0 32 D0719 21:52:54.702472 445017 usertrap_amd64.go:225] [ 127( 120): 127( 120)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.703112 445017 usertrap_amd64.go:212] [ 127( 120): 127( 120)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.703180 445017 usertrap_amd64.go:122] [ 127( 120): 127( 120)] Allocate a new trap: 0xc000a684b0 33 D0719 21:52:54.703327 445017 usertrap_amd64.go:225] [ 127( 120): 127( 120)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.703724 445017 usertrap_amd64.go:212] [ 127( 120): 128( 121)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.703785 445017 usertrap_amd64.go:122] [ 127( 120): 128( 121)] Allocate a new trap: 0xc000a684b0 34 D0719 21:52:54.703892 445017 usertrap_amd64.go:225] [ 127( 120): 128( 121)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.713469 445017 usertrap_amd64.go:212] [ 127( 120): 127( 120)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.713606 445017 usertrap_amd64.go:122] [ 127( 120): 127( 120)] Allocate a new trap: 0xc000a684b0 35 D0719 21:52:54.713711 445017 usertrap_amd64.go:225] [ 127( 120): 127( 120)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.716052 445017 usertrap_amd64.go:212] [ 127( 120): 127( 120)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.716183 445017 usertrap_amd64.go:122] [ 127( 120): 127( 120)] Allocate a new trap: 0xc000a684b0 36 D0719 21:52:54.716371 445017 usertrap_amd64.go:225] [ 127( 120): 127( 120)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.717045 445017 task_exit.go:204] [ 127( 120): 127( 120)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.717411 445017 task_signals.go:204] [ 127( 120): 128( 121)] Signal 127, PID: 128, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.717549 445017 task_signals.go:204] [ 127( 120): 129( 122)] Signal 127, PID: 129, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.717622 445017 task_exit.go:204] [ 127( 120): 127( 120)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.717721 445017 task_exit.go:204] [ 127( 120): 129( 122)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.717843 445017 task_exit.go:204] [ 127( 120): 128( 121)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.718117 445017 task_exit.go:204] [ 127( 120): 128( 121)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.718169 445017 task_exit.go:204] [ 127( 120): 128( 121)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.721363 445017 task_exit.go:204] [ 127( 120): 129( 122)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.721492 445017 task_exit.go:204] [ 127( 120): 129( 122)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.721766 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.721947 445017 task_exit.go:204] [ 127( 120): 127( 120)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.743460 445017 usertrap_amd64.go:212] [ 130( 123): 130( 123)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.743556 445017 usertrap_amd64.go:122] [ 130( 123): 130( 123)] Allocate a new trap: 0xc00030f350 28 D0719 21:52:54.743978 445017 usertrap_amd64.go:225] [ 130( 123): 130( 123)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.746952 445017 usertrap_amd64.go:212] [ 130( 123): 130( 123)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.747016 445017 usertrap_amd64.go:122] [ 130( 123): 130( 123)] Allocate a new trap: 0xc00030f350 29 D0719 21:52:54.747065 445017 usertrap_amd64.go:225] [ 130( 123): 130( 123)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.747939 445017 usertrap_amd64.go:212] [ 130( 123): 130( 123)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.748000 445017 usertrap_amd64.go:122] [ 130( 123): 130( 123)] Allocate a new trap: 0xc00030f350 30 D0719 21:52:54.748044 445017 usertrap_amd64.go:225] [ 130( 123): 130( 123)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.751315 445017 usertrap_amd64.go:212] [ 130( 123): 130( 123)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.751413 445017 usertrap_amd64.go:122] [ 130( 123): 130( 123)] Allocate a new trap: 0xc00030f350 31 D0719 21:52:54.751487 445017 usertrap_amd64.go:225] [ 130( 123): 130( 123)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.751773 445017 usertrap_amd64.go:212] [ 130( 123): 130( 123)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.751828 445017 usertrap_amd64.go:122] [ 130( 123): 130( 123)] Allocate a new trap: 0xc00030f350 32 D0719 21:52:54.751882 445017 usertrap_amd64.go:225] [ 130( 123): 130( 123)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.752517 445017 usertrap_amd64.go:212] [ 130( 123): 130( 123)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.752571 445017 usertrap_amd64.go:122] [ 130( 123): 130( 123)] Allocate a new trap: 0xc00030f350 33 D0719 21:52:54.752661 445017 usertrap_amd64.go:225] [ 130( 123): 130( 123)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.752891 445017 usertrap_amd64.go:212] [ 130( 123): 131( 124)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.752978 445017 usertrap_amd64.go:122] [ 130( 123): 131( 124)] Allocate a new trap: 0xc00030f350 34 D0719 21:52:54.753075 445017 usertrap_amd64.go:225] [ 130( 123): 131( 124)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.759633 445017 usertrap_amd64.go:212] [ 130( 123): 130( 123)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.759721 445017 usertrap_amd64.go:122] [ 130( 123): 130( 123)] Allocate a new trap: 0xc00030f350 35 D0719 21:52:54.759791 445017 usertrap_amd64.go:225] [ 130( 123): 130( 123)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.761963 445017 usertrap_amd64.go:212] [ 130( 123): 130( 123)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.762026 445017 usertrap_amd64.go:122] [ 130( 123): 130( 123)] Allocate a new trap: 0xc00030f350 36 D0719 21:52:54.762108 445017 usertrap_amd64.go:225] [ 130( 123): 130( 123)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.762644 445017 task_exit.go:204] [ 130( 123): 130( 123)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.762826 445017 task_signals.go:204] [ 130( 123): 132( 125)] Signal 130, PID: 132, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.762959 445017 task_exit.go:204] [ 130( 123): 132( 125)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.763167 445017 task_signals.go:204] [ 130( 123): 131( 124)] Signal 130, PID: 131, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.763301 445017 task_exit.go:204] [ 130( 123): 132( 125)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.763365 445017 task_exit.go:204] [ 130( 123): 132( 125)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.763524 445017 task_exit.go:204] [ 130( 123): 130( 123)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.763694 445017 task_exit.go:204] [ 130( 123): 131( 124)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.766919 445017 task_exit.go:204] [ 130( 123): 131( 124)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.767099 445017 task_exit.go:204] [ 130( 123): 131( 124)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.767191 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.767313 445017 task_exit.go:204] [ 130( 123): 130( 123)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.776169 445017 usertrap_amd64.go:212] [ 133( 126): 133( 126)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.776258 445017 usertrap_amd64.go:122] [ 133( 126): 133( 126)] Allocate a new trap: 0xc000b12360 28 D0719 21:52:54.776686 445017 usertrap_amd64.go:225] [ 133( 126): 133( 126)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.780691 445017 usertrap_amd64.go:212] [ 133( 126): 133( 126)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.780784 445017 usertrap_amd64.go:122] [ 133( 126): 133( 126)] Allocate a new trap: 0xc000b12360 29 D0719 21:52:54.780924 445017 usertrap_amd64.go:225] [ 133( 126): 133( 126)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.782808 445017 usertrap_amd64.go:212] [ 133( 126): 133( 126)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.782970 445017 usertrap_amd64.go:122] [ 133( 126): 133( 126)] Allocate a new trap: 0xc000b12360 30 D0719 21:52:54.783191 445017 usertrap_amd64.go:225] [ 133( 126): 133( 126)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.789301 445017 usertrap_amd64.go:212] [ 133( 126): 133( 126)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.789385 445017 usertrap_amd64.go:122] [ 133( 126): 133( 126)] Allocate a new trap: 0xc000b12360 31 D0719 21:52:54.789489 445017 usertrap_amd64.go:225] [ 133( 126): 133( 126)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.789738 445017 usertrap_amd64.go:212] [ 133( 126): 133( 126)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.789819 445017 usertrap_amd64.go:122] [ 133( 126): 133( 126)] Allocate a new trap: 0xc000b12360 32 D0719 21:52:54.789911 445017 usertrap_amd64.go:225] [ 133( 126): 133( 126)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.790553 445017 usertrap_amd64.go:212] [ 133( 126): 133( 126)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.790612 445017 usertrap_amd64.go:122] [ 133( 126): 133( 126)] Allocate a new trap: 0xc000b12360 33 D0719 21:52:54.790695 445017 usertrap_amd64.go:225] [ 133( 126): 133( 126)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.792592 445017 usertrap_amd64.go:212] [ 133( 126): 134( 127)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.792693 445017 usertrap_amd64.go:122] [ 133( 126): 134( 127)] Allocate a new trap: 0xc000b12360 34 D0719 21:52:54.792785 445017 usertrap_amd64.go:225] [ 133( 126): 134( 127)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.799417 445017 usertrap_amd64.go:212] [ 133( 126): 133( 126)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.799491 445017 usertrap_amd64.go:122] [ 133( 126): 133( 126)] Allocate a new trap: 0xc000b12360 35 D0719 21:52:54.799557 445017 usertrap_amd64.go:225] [ 133( 126): 133( 126)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.801630 445017 usertrap_amd64.go:212] [ 133( 126): 133( 126)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.801710 445017 usertrap_amd64.go:122] [ 133( 126): 133( 126)] Allocate a new trap: 0xc000b12360 36 D0719 21:52:54.801786 445017 usertrap_amd64.go:225] [ 133( 126): 133( 126)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.802415 445017 task_exit.go:204] [ 133( 126): 133( 126)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.802732 445017 task_signals.go:204] [ 133( 126): 134( 127)] Signal 133, PID: 134, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.802754 445017 task_signals.go:204] [ 133( 126): 135( 128)] Signal 133, PID: 135, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.802899 445017 task_exit.go:204] [ 133( 126): 133( 126)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.803205 445017 task_exit.go:204] [ 133( 126): 134( 127)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.803461 445017 task_exit.go:204] [ 133( 126): 134( 127)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.803516 445017 task_exit.go:204] [ 133( 126): 134( 127)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.803699 445017 task_exit.go:204] [ 133( 126): 135( 128)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.806940 445017 task_exit.go:204] [ 133( 126): 135( 128)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.807009 445017 task_exit.go:204] [ 133( 126): 135( 128)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.807140 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.807467 445017 task_exit.go:204] [ 133( 126): 133( 126)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.815485 445017 usertrap_amd64.go:212] [ 136( 129): 136( 129)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.815554 445017 usertrap_amd64.go:122] [ 136( 129): 136( 129)] Allocate a new trap: 0xc00030f650 28 D0719 21:52:54.815943 445017 usertrap_amd64.go:225] [ 136( 129): 136( 129)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.819254 445017 usertrap_amd64.go:212] [ 136( 129): 136( 129)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.819303 445017 usertrap_amd64.go:122] [ 136( 129): 136( 129)] Allocate a new trap: 0xc00030f650 29 D0719 21:52:54.819352 445017 usertrap_amd64.go:225] [ 136( 129): 136( 129)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.820041 445017 usertrap_amd64.go:212] [ 136( 129): 136( 129)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.820081 445017 usertrap_amd64.go:122] [ 136( 129): 136( 129)] Allocate a new trap: 0xc00030f650 30 D0719 21:52:54.820148 445017 usertrap_amd64.go:225] [ 136( 129): 136( 129)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.824021 445017 usertrap_amd64.go:212] [ 136( 129): 136( 129)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.824102 445017 usertrap_amd64.go:122] [ 136( 129): 136( 129)] Allocate a new trap: 0xc00030f650 31 D0719 21:52:54.824171 445017 usertrap_amd64.go:225] [ 136( 129): 136( 129)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.824466 445017 usertrap_amd64.go:212] [ 136( 129): 136( 129)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.824524 445017 usertrap_amd64.go:122] [ 136( 129): 136( 129)] Allocate a new trap: 0xc00030f650 32 D0719 21:52:54.824606 445017 usertrap_amd64.go:225] [ 136( 129): 136( 129)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.825216 445017 usertrap_amd64.go:212] [ 136( 129): 136( 129)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.825277 445017 usertrap_amd64.go:122] [ 136( 129): 136( 129)] Allocate a new trap: 0xc00030f650 33 D0719 21:52:54.825359 445017 usertrap_amd64.go:225] [ 136( 129): 136( 129)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.825597 445017 usertrap_amd64.go:212] [ 136( 129): 137( 130)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.825662 445017 usertrap_amd64.go:122] [ 136( 129): 137( 130)] Allocate a new trap: 0xc00030f650 34 D0719 21:52:54.825757 445017 usertrap_amd64.go:225] [ 136( 129): 137( 130)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.833357 445017 usertrap_amd64.go:212] [ 136( 129): 136( 129)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.833439 445017 usertrap_amd64.go:122] [ 136( 129): 136( 129)] Allocate a new trap: 0xc00030f650 35 D0719 21:52:54.833530 445017 usertrap_amd64.go:225] [ 136( 129): 136( 129)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.836333 445017 usertrap_amd64.go:212] [ 136( 129): 136( 129)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.836405 445017 usertrap_amd64.go:122] [ 136( 129): 136( 129)] Allocate a new trap: 0xc00030f650 36 D0719 21:52:54.836469 445017 usertrap_amd64.go:225] [ 136( 129): 136( 129)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.837116 445017 task_exit.go:204] [ 136( 129): 136( 129)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.837337 445017 task_exit.go:204] [ 136( 129): 136( 129)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.837502 445017 task_signals.go:204] [ 136( 129): 137( 130)] Signal 136, PID: 137, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.837585 445017 task_exit.go:204] [ 136( 129): 137( 130)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.837796 445017 task_signals.go:204] [ 136( 129): 138( 131)] Signal 136, PID: 138, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.837915 445017 task_exit.go:204] [ 136( 129): 138( 131)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.838025 445017 task_exit.go:204] [ 136( 129): 137( 130)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.838149 445017 task_exit.go:204] [ 136( 129): 137( 130)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.841276 445017 task_exit.go:204] [ 136( 129): 138( 131)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.841339 445017 task_exit.go:204] [ 136( 129): 138( 131)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.841415 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.842347 445017 task_exit.go:204] [ 136( 129): 136( 129)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.850104 445017 usertrap_amd64.go:212] [ 139( 132): 139( 132)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.850216 445017 usertrap_amd64.go:122] [ 139( 132): 139( 132)] Allocate a new trap: 0xc00037eb10 28 D0719 21:52:54.850625 445017 usertrap_amd64.go:225] [ 139( 132): 139( 132)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.853983 445017 usertrap_amd64.go:212] [ 139( 132): 139( 132)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.854034 445017 usertrap_amd64.go:122] [ 139( 132): 139( 132)] Allocate a new trap: 0xc00037eb10 29 D0719 21:52:54.854187 445017 usertrap_amd64.go:225] [ 139( 132): 139( 132)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.855011 445017 usertrap_amd64.go:212] [ 139( 132): 139( 132)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.855076 445017 usertrap_amd64.go:122] [ 139( 132): 139( 132)] Allocate a new trap: 0xc00037eb10 30 D0719 21:52:54.855160 445017 usertrap_amd64.go:225] [ 139( 132): 139( 132)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.860427 445017 usertrap_amd64.go:212] [ 139( 132): 139( 132)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.860587 445017 usertrap_amd64.go:122] [ 139( 132): 139( 132)] Allocate a new trap: 0xc00037eb10 31 D0719 21:52:54.860719 445017 usertrap_amd64.go:225] [ 139( 132): 139( 132)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.861158 445017 usertrap_amd64.go:212] [ 139( 132): 139( 132)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.861228 445017 usertrap_amd64.go:122] [ 139( 132): 139( 132)] Allocate a new trap: 0xc00037eb10 32 D0719 21:52:54.861331 445017 usertrap_amd64.go:225] [ 139( 132): 139( 132)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.862079 445017 usertrap_amd64.go:212] [ 139( 132): 139( 132)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.862224 445017 usertrap_amd64.go:122] [ 139( 132): 139( 132)] Allocate a new trap: 0xc00037eb10 33 D0719 21:52:54.862386 445017 usertrap_amd64.go:225] [ 139( 132): 139( 132)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.863289 445017 usertrap_amd64.go:212] [ 139( 132): 140( 133)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.863391 445017 usertrap_amd64.go:122] [ 139( 132): 140( 133)] Allocate a new trap: 0xc00037eb10 34 D0719 21:52:54.863487 445017 usertrap_amd64.go:225] [ 139( 132): 140( 133)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.878306 445017 usertrap_amd64.go:212] [ 139( 132): 139( 132)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.878458 445017 usertrap_amd64.go:122] [ 139( 132): 139( 132)] Allocate a new trap: 0xc00037eb10 35 D0719 21:52:54.878631 445017 usertrap_amd64.go:225] [ 139( 132): 139( 132)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.881264 445017 usertrap_amd64.go:212] [ 139( 132): 139( 132)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.881364 445017 usertrap_amd64.go:122] [ 139( 132): 139( 132)] Allocate a new trap: 0xc00037eb10 36 D0719 21:52:54.881450 445017 usertrap_amd64.go:225] [ 139( 132): 139( 132)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.881941 445017 task_exit.go:204] [ 139( 132): 139( 132)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.882183 445017 task_exit.go:204] [ 139( 132): 139( 132)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.882392 445017 task_signals.go:204] [ 139( 132): 141( 134)] Signal 139, PID: 141, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.882495 445017 task_exit.go:204] [ 139( 132): 141( 134)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.882670 445017 task_exit.go:204] [ 139( 132): 141( 134)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.882732 445017 task_exit.go:204] [ 139( 132): 141( 134)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.882883 445017 task_signals.go:204] [ 139( 132): 140( 133)] Signal 139, PID: 140, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.882956 445017 task_exit.go:204] [ 139( 132): 140( 133)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.886185 445017 task_exit.go:204] [ 139( 132): 140( 133)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.886251 445017 task_exit.go:204] [ 139( 132): 140( 133)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.886814 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.886971 445017 task_exit.go:204] [ 139( 132): 139( 132)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.895772 445017 usertrap_amd64.go:212] [ 142( 135): 142( 135)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.895941 445017 usertrap_amd64.go:122] [ 142( 135): 142( 135)] Allocate a new trap: 0xc000a685d0 28 D0719 21:52:54.896546 445017 usertrap_amd64.go:225] [ 142( 135): 142( 135)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.900757 445017 usertrap_amd64.go:212] [ 142( 135): 142( 135)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.900874 445017 usertrap_amd64.go:122] [ 142( 135): 142( 135)] Allocate a new trap: 0xc000a685d0 29 D0719 21:52:54.901018 445017 usertrap_amd64.go:225] [ 142( 135): 142( 135)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.901989 445017 usertrap_amd64.go:212] [ 142( 135): 142( 135)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.902101 445017 usertrap_amd64.go:122] [ 142( 135): 142( 135)] Allocate a new trap: 0xc000a685d0 30 D0719 21:52:54.902219 445017 usertrap_amd64.go:225] [ 142( 135): 142( 135)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.915179 445017 usertrap_amd64.go:212] [ 142( 135): 142( 135)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.915341 445017 usertrap_amd64.go:122] [ 142( 135): 142( 135)] Allocate a new trap: 0xc000a685d0 31 D0719 21:52:54.915442 445017 usertrap_amd64.go:225] [ 142( 135): 142( 135)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.915819 445017 usertrap_amd64.go:212] [ 142( 135): 142( 135)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.915873 445017 usertrap_amd64.go:122] [ 142( 135): 142( 135)] Allocate a new trap: 0xc000a685d0 32 D0719 21:52:54.915937 445017 usertrap_amd64.go:225] [ 142( 135): 142( 135)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.916616 445017 usertrap_amd64.go:212] [ 142( 135): 142( 135)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.916695 445017 usertrap_amd64.go:122] [ 142( 135): 142( 135)] Allocate a new trap: 0xc000a685d0 33 D0719 21:52:54.916758 445017 usertrap_amd64.go:225] [ 142( 135): 142( 135)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.917458 445017 usertrap_amd64.go:212] [ 142( 135): 143( 136)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.917518 445017 usertrap_amd64.go:122] [ 142( 135): 143( 136)] Allocate a new trap: 0xc000a685d0 34 D0719 21:52:54.917622 445017 usertrap_amd64.go:225] [ 142( 135): 143( 136)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.926737 445017 usertrap_amd64.go:212] [ 142( 135): 142( 135)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.926847 445017 usertrap_amd64.go:122] [ 142( 135): 142( 135)] Allocate a new trap: 0xc000a685d0 35 D0719 21:52:54.926979 445017 usertrap_amd64.go:225] [ 142( 135): 142( 135)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.932709 445017 usertrap_amd64.go:212] [ 142( 135): 142( 135)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.932773 445017 usertrap_amd64.go:122] [ 142( 135): 142( 135)] Allocate a new trap: 0xc000a685d0 36 D0719 21:52:54.932860 445017 usertrap_amd64.go:225] [ 142( 135): 142( 135)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.933470 445017 task_exit.go:204] [ 142( 135): 142( 135)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.933699 445017 task_signals.go:204] [ 142( 135): 143( 136)] Signal 142, PID: 143, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.933837 445017 task_signals.go:204] [ 142( 135): 144( 137)] Signal 142, PID: 144, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.933909 445017 task_exit.go:204] [ 142( 135): 142( 135)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.934126 445017 task_exit.go:204] [ 142( 135): 143( 136)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.934351 445017 task_exit.go:204] [ 142( 135): 144( 137)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.934742 445017 task_exit.go:204] [ 142( 135): 144( 137)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.934802 445017 task_exit.go:204] [ 142( 135): 144( 137)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.939326 445017 task_exit.go:204] [ 142( 135): 143( 136)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.939425 445017 task_exit.go:204] [ 142( 135): 143( 136)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.939518 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.939862 445017 task_exit.go:204] [ 142( 135): 142( 135)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.946464 445017 usertrap_amd64.go:212] [ 145( 138): 145( 138)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.946608 445017 usertrap_amd64.go:122] [ 145( 138): 145( 138)] Allocate a new trap: 0xc00037e690 28 D0719 21:52:54.946997 445017 usertrap_amd64.go:225] [ 145( 138): 145( 138)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.950669 445017 usertrap_amd64.go:212] [ 145( 138): 145( 138)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.950740 445017 usertrap_amd64.go:122] [ 145( 138): 145( 138)] Allocate a new trap: 0xc00037e690 29 D0719 21:52:54.950830 445017 usertrap_amd64.go:225] [ 145( 138): 145( 138)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.951800 445017 usertrap_amd64.go:212] [ 145( 138): 145( 138)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.951856 445017 usertrap_amd64.go:122] [ 145( 138): 145( 138)] Allocate a new trap: 0xc00037e690 30 D0719 21:52:54.951917 445017 usertrap_amd64.go:225] [ 145( 138): 145( 138)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.955380 445017 usertrap_amd64.go:212] [ 145( 138): 145( 138)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.955451 445017 usertrap_amd64.go:122] [ 145( 138): 145( 138)] Allocate a new trap: 0xc00037e690 31 D0719 21:52:54.955530 445017 usertrap_amd64.go:225] [ 145( 138): 145( 138)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.955814 445017 usertrap_amd64.go:212] [ 145( 138): 145( 138)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.955862 445017 usertrap_amd64.go:122] [ 145( 138): 145( 138)] Allocate a new trap: 0xc00037e690 32 D0719 21:52:54.955921 445017 usertrap_amd64.go:225] [ 145( 138): 145( 138)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.956451 445017 usertrap_amd64.go:212] [ 145( 138): 145( 138)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.956497 445017 usertrap_amd64.go:122] [ 145( 138): 145( 138)] Allocate a new trap: 0xc00037e690 33 D0719 21:52:54.956586 445017 usertrap_amd64.go:225] [ 145( 138): 145( 138)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.957455 445017 usertrap_amd64.go:212] [ 145( 138): 146( 139)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.957563 445017 usertrap_amd64.go:122] [ 145( 138): 146( 139)] Allocate a new trap: 0xc00037e690 34 D0719 21:52:54.957700 445017 usertrap_amd64.go:225] [ 145( 138): 146( 139)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.964682 445017 usertrap_amd64.go:212] [ 145( 138): 145( 138)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.964872 445017 usertrap_amd64.go:122] [ 145( 138): 145( 138)] Allocate a new trap: 0xc00037e690 35 D0719 21:52:54.964986 445017 usertrap_amd64.go:225] [ 145( 138): 145( 138)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:54.967490 445017 usertrap_amd64.go:212] [ 145( 138): 145( 138)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:54.967672 445017 usertrap_amd64.go:122] [ 145( 138): 145( 138)] Allocate a new trap: 0xc00037e690 36 D0719 21:52:54.967785 445017 usertrap_amd64.go:225] [ 145( 138): 145( 138)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:54.968265 445017 task_exit.go:204] [ 145( 138): 145( 138)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.968465 445017 task_exit.go:204] [ 145( 138): 145( 138)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.968805 445017 task_signals.go:204] [ 145( 138): 146( 139)] Signal 145, PID: 146, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.968927 445017 task_exit.go:204] [ 145( 138): 146( 139)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.969085 445017 task_signals.go:204] [ 145( 138): 147( 140)] Signal 145, PID: 147, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:54.969251 445017 task_exit.go:204] [ 145( 138): 146( 139)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.969299 445017 task_exit.go:204] [ 145( 138): 146( 139)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.969552 445017 task_exit.go:204] [ 145( 138): 147( 140)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:54.972316 445017 task_exit.go:204] [ 145( 138): 147( 140)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:54.972433 445017 task_exit.go:204] [ 145( 138): 147( 140)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.972630 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:54.972761 445017 task_exit.go:204] [ 145( 138): 145( 138)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:54.979698 445017 usertrap_amd64.go:212] [ 148( 141): 148( 141)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:54.979805 445017 usertrap_amd64.go:122] [ 148( 141): 148( 141)] Allocate a new trap: 0xc000886150 28 D0719 21:52:54.980234 445017 usertrap_amd64.go:225] [ 148( 141): 148( 141)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:54.983817 445017 usertrap_amd64.go:212] [ 148( 141): 148( 141)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:54.983886 445017 usertrap_amd64.go:122] [ 148( 141): 148( 141)] Allocate a new trap: 0xc000886150 29 D0719 21:52:54.983954 445017 usertrap_amd64.go:225] [ 148( 141): 148( 141)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:54.984865 445017 usertrap_amd64.go:212] [ 148( 141): 148( 141)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:54.985053 445017 usertrap_amd64.go:122] [ 148( 141): 148( 141)] Allocate a new trap: 0xc000886150 30 D0719 21:52:54.985161 445017 usertrap_amd64.go:225] [ 148( 141): 148( 141)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:54.988614 445017 usertrap_amd64.go:212] [ 148( 141): 148( 141)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:54.988696 445017 usertrap_amd64.go:122] [ 148( 141): 148( 141)] Allocate a new trap: 0xc000886150 31 D0719 21:52:54.988810 445017 usertrap_amd64.go:225] [ 148( 141): 148( 141)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:54.989144 445017 usertrap_amd64.go:212] [ 148( 141): 148( 141)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:54.989214 445017 usertrap_amd64.go:122] [ 148( 141): 148( 141)] Allocate a new trap: 0xc000886150 32 D0719 21:52:54.989276 445017 usertrap_amd64.go:225] [ 148( 141): 148( 141)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:54.989918 445017 usertrap_amd64.go:212] [ 148( 141): 148( 141)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:54.990032 445017 usertrap_amd64.go:122] [ 148( 141): 148( 141)] Allocate a new trap: 0xc000886150 33 D0719 21:52:54.990210 445017 usertrap_amd64.go:225] [ 148( 141): 148( 141)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:54.991125 445017 usertrap_amd64.go:212] [ 148( 141): 149( 142)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:54.991257 445017 usertrap_amd64.go:122] [ 148( 141): 149( 142)] Allocate a new trap: 0xc000886150 34 D0719 21:52:54.991465 445017 usertrap_amd64.go:225] [ 148( 141): 149( 142)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:54.998474 445017 usertrap_amd64.go:212] [ 148( 141): 148( 141)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:54.998550 445017 usertrap_amd64.go:122] [ 148( 141): 148( 141)] Allocate a new trap: 0xc000886150 35 D0719 21:52:54.998604 445017 usertrap_amd64.go:225] [ 148( 141): 148( 141)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.001254 445017 usertrap_amd64.go:212] [ 148( 141): 148( 141)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.001344 445017 usertrap_amd64.go:122] [ 148( 141): 148( 141)] Allocate a new trap: 0xc000886150 36 D0719 21:52:55.001397 445017 usertrap_amd64.go:225] [ 148( 141): 148( 141)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.001905 445017 task_exit.go:204] [ 148( 141): 148( 141)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.002163 445017 task_exit.go:204] [ 148( 141): 148( 141)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.002291 445017 task_signals.go:204] [ 148( 141): 149( 142)] Signal 148, PID: 149, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.002304 445017 task_signals.go:204] [ 148( 141): 150( 143)] Signal 148, PID: 150, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.002386 445017 task_exit.go:204] [ 148( 141): 149( 142)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.002710 445017 task_exit.go:204] [ 148( 141): 150( 143)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.002955 445017 task_exit.go:204] [ 148( 141): 149( 142)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.003050 445017 task_exit.go:204] [ 148( 141): 149( 142)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.006242 445017 task_exit.go:204] [ 148( 141): 150( 143)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.006357 445017 task_exit.go:204] [ 148( 141): 150( 143)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.006502 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:55.007401 445017 task_exit.go:204] [ 148( 141): 148( 141)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.013785 445017 usertrap_amd64.go:212] [ 151( 144): 151( 144)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:55.013880 445017 usertrap_amd64.go:122] [ 151( 144): 151( 144)] Allocate a new trap: 0xc000a68120 28 D0719 21:52:55.014249 445017 usertrap_amd64.go:225] [ 151( 144): 151( 144)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:55.018500 445017 usertrap_amd64.go:212] [ 151( 144): 151( 144)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:55.018591 445017 usertrap_amd64.go:122] [ 151( 144): 151( 144)] Allocate a new trap: 0xc000a68120 29 D0719 21:52:55.018669 445017 usertrap_amd64.go:225] [ 151( 144): 151( 144)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:55.019563 445017 usertrap_amd64.go:212] [ 151( 144): 151( 144)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:55.019664 445017 usertrap_amd64.go:122] [ 151( 144): 151( 144)] Allocate a new trap: 0xc000a68120 30 D0719 21:52:55.019723 445017 usertrap_amd64.go:225] [ 151( 144): 151( 144)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:55.023316 445017 usertrap_amd64.go:212] [ 151( 144): 151( 144)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:55.023387 445017 usertrap_amd64.go:122] [ 151( 144): 151( 144)] Allocate a new trap: 0xc000a68120 31 D0719 21:52:55.023456 445017 usertrap_amd64.go:225] [ 151( 144): 151( 144)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:55.023761 445017 usertrap_amd64.go:212] [ 151( 144): 151( 144)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:55.023839 445017 usertrap_amd64.go:122] [ 151( 144): 151( 144)] Allocate a new trap: 0xc000a68120 32 D0719 21:52:55.023921 445017 usertrap_amd64.go:225] [ 151( 144): 151( 144)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:55.024553 445017 usertrap_amd64.go:212] [ 151( 144): 151( 144)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:55.024713 445017 usertrap_amd64.go:122] [ 151( 144): 151( 144)] Allocate a new trap: 0xc000a68120 33 D0719 21:52:55.024874 445017 usertrap_amd64.go:225] [ 151( 144): 151( 144)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:55.025066 445017 usertrap_amd64.go:212] [ 151( 144): 152( 145)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:55.025191 445017 usertrap_amd64.go:122] [ 151( 144): 152( 145)] Allocate a new trap: 0xc000a68120 34 D0719 21:52:55.025298 445017 usertrap_amd64.go:225] [ 151( 144): 152( 145)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:55.034795 445017 usertrap_amd64.go:212] [ 151( 144): 151( 144)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:55.034874 445017 usertrap_amd64.go:122] [ 151( 144): 151( 144)] Allocate a new trap: 0xc000a68120 35 D0719 21:52:55.034943 445017 usertrap_amd64.go:225] [ 151( 144): 151( 144)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.037201 445017 usertrap_amd64.go:212] [ 151( 144): 151( 144)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.037264 445017 usertrap_amd64.go:122] [ 151( 144): 151( 144)] Allocate a new trap: 0xc000a68120 36 D0719 21:52:55.037319 445017 usertrap_amd64.go:225] [ 151( 144): 151( 144)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.037769 445017 task_exit.go:204] [ 151( 144): 151( 144)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.037869 445017 task_signals.go:204] [ 151( 144): 153( 146)] Signal 151, PID: 153, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.037972 445017 task_exit.go:204] [ 151( 144): 153( 146)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.038084 445017 task_signals.go:204] [ 151( 144): 152( 145)] Signal 151, PID: 152, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.038235 445017 task_exit.go:204] [ 151( 144): 152( 145)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.038432 445017 task_exit.go:204] [ 151( 144): 151( 144)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.038573 445017 task_exit.go:204] [ 151( 144): 153( 146)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.038624 445017 task_exit.go:204] [ 151( 144): 153( 146)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.041648 445017 task_exit.go:204] [ 151( 144): 152( 145)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.041704 445017 task_exit.go:204] [ 151( 144): 152( 145)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.041794 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:55.042061 445017 task_exit.go:204] [ 151( 144): 151( 144)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.052045 445017 usertrap_amd64.go:212] [ 154( 147): 154( 147)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:55.052115 445017 usertrap_amd64.go:122] [ 154( 147): 154( 147)] Allocate a new trap: 0xc000886360 28 D0719 21:52:55.052518 445017 usertrap_amd64.go:225] [ 154( 147): 154( 147)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:55.056895 445017 usertrap_amd64.go:212] [ 154( 147): 154( 147)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:55.056960 445017 usertrap_amd64.go:122] [ 154( 147): 154( 147)] Allocate a new trap: 0xc000886360 29 D0719 21:52:55.057049 445017 usertrap_amd64.go:225] [ 154( 147): 154( 147)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:55.057965 445017 usertrap_amd64.go:212] [ 154( 147): 154( 147)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:55.058032 445017 usertrap_amd64.go:122] [ 154( 147): 154( 147)] Allocate a new trap: 0xc000886360 30 D0719 21:52:55.058128 445017 usertrap_amd64.go:225] [ 154( 147): 154( 147)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:55.061878 445017 usertrap_amd64.go:212] [ 154( 147): 154( 147)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:55.061956 445017 usertrap_amd64.go:122] [ 154( 147): 154( 147)] Allocate a new trap: 0xc000886360 31 D0719 21:52:55.062036 445017 usertrap_amd64.go:225] [ 154( 147): 154( 147)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:55.062301 445017 usertrap_amd64.go:212] [ 154( 147): 154( 147)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:55.062415 445017 usertrap_amd64.go:122] [ 154( 147): 154( 147)] Allocate a new trap: 0xc000886360 32 D0719 21:52:55.062507 445017 usertrap_amd64.go:225] [ 154( 147): 154( 147)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:55.063233 445017 usertrap_amd64.go:212] [ 154( 147): 154( 147)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:55.063293 445017 usertrap_amd64.go:122] [ 154( 147): 154( 147)] Allocate a new trap: 0xc000886360 33 D0719 21:52:55.063389 445017 usertrap_amd64.go:225] [ 154( 147): 154( 147)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:55.064527 445017 usertrap_amd64.go:212] [ 154( 147): 155( 148)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:55.064592 445017 usertrap_amd64.go:122] [ 154( 147): 155( 148)] Allocate a new trap: 0xc000886360 34 D0719 21:52:55.064655 445017 usertrap_amd64.go:225] [ 154( 147): 155( 148)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:55.072875 445017 usertrap_amd64.go:212] [ 154( 147): 154( 147)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:55.072970 445017 usertrap_amd64.go:122] [ 154( 147): 154( 147)] Allocate a new trap: 0xc000886360 35 D0719 21:52:55.073039 445017 usertrap_amd64.go:225] [ 154( 147): 154( 147)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.076483 445017 usertrap_amd64.go:212] [ 154( 147): 154( 147)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.076558 445017 usertrap_amd64.go:122] [ 154( 147): 154( 147)] Allocate a new trap: 0xc000886360 36 D0719 21:52:55.076642 445017 usertrap_amd64.go:225] [ 154( 147): 154( 147)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.077261 445017 task_exit.go:204] [ 154( 147): 154( 147)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.077449 445017 task_signals.go:204] [ 154( 147): 156( 149)] Signal 154, PID: 156, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.077556 445017 task_signals.go:204] [ 154( 147): 155( 148)] Signal 154, PID: 155, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.077595 445017 task_exit.go:204] [ 154( 147): 154( 147)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.077759 445017 task_exit.go:204] [ 154( 147): 155( 148)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.077956 445017 task_exit.go:204] [ 154( 147): 155( 148)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.078001 445017 task_exit.go:204] [ 154( 147): 155( 148)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.078148 445017 task_exit.go:204] [ 154( 147): 156( 149)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.081343 445017 task_exit.go:204] [ 154( 147): 156( 149)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.081463 445017 task_exit.go:204] [ 154( 147): 156( 149)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.081601 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:55.081720 445017 task_exit.go:204] [ 154( 147): 154( 147)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.092541 445017 usertrap_amd64.go:212] [ 157( 150): 157( 150)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:55.092641 445017 usertrap_amd64.go:122] [ 157( 150): 157( 150)] Allocate a new trap: 0xc0008864b0 28 D0719 21:52:55.093084 445017 usertrap_amd64.go:225] [ 157( 150): 157( 150)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:55.096738 445017 usertrap_amd64.go:212] [ 157( 150): 157( 150)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:55.096803 445017 usertrap_amd64.go:122] [ 157( 150): 157( 150)] Allocate a new trap: 0xc0008864b0 29 D0719 21:52:55.096887 445017 usertrap_amd64.go:225] [ 157( 150): 157( 150)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:55.097682 445017 usertrap_amd64.go:212] [ 157( 150): 157( 150)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:55.097739 445017 usertrap_amd64.go:122] [ 157( 150): 157( 150)] Allocate a new trap: 0xc0008864b0 30 D0719 21:52:55.097814 445017 usertrap_amd64.go:225] [ 157( 150): 157( 150)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:55.102305 445017 usertrap_amd64.go:212] [ 157( 150): 157( 150)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:55.102386 445017 usertrap_amd64.go:122] [ 157( 150): 157( 150)] Allocate a new trap: 0xc0008864b0 31 D0719 21:52:55.102461 445017 usertrap_amd64.go:225] [ 157( 150): 157( 150)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:55.102716 445017 usertrap_amd64.go:212] [ 157( 150): 157( 150)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:55.102763 445017 usertrap_amd64.go:122] [ 157( 150): 157( 150)] Allocate a new trap: 0xc0008864b0 32 D0719 21:52:55.102827 445017 usertrap_amd64.go:225] [ 157( 150): 157( 150)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:55.103479 445017 usertrap_amd64.go:212] [ 157( 150): 157( 150)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:55.103554 445017 usertrap_amd64.go:122] [ 157( 150): 157( 150)] Allocate a new trap: 0xc0008864b0 33 D0719 21:52:55.103681 445017 usertrap_amd64.go:225] [ 157( 150): 157( 150)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:55.103864 445017 usertrap_amd64.go:212] [ 157( 150): 158( 151)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:55.104009 445017 usertrap_amd64.go:122] [ 157( 150): 158( 151)] Allocate a new trap: 0xc0008864b0 34 D0719 21:52:55.104082 445017 usertrap_amd64.go:225] [ 157( 150): 158( 151)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:55.116527 445017 usertrap_amd64.go:212] [ 157( 150): 157( 150)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:55.116597 445017 usertrap_amd64.go:122] [ 157( 150): 157( 150)] Allocate a new trap: 0xc0008864b0 35 D0719 21:52:55.116658 445017 usertrap_amd64.go:225] [ 157( 150): 157( 150)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.118593 445017 usertrap_amd64.go:212] [ 157( 150): 157( 150)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.118656 445017 usertrap_amd64.go:122] [ 157( 150): 157( 150)] Allocate a new trap: 0xc0008864b0 36 D0719 21:52:55.118798 445017 usertrap_amd64.go:225] [ 157( 150): 157( 150)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.119424 445017 task_exit.go:204] [ 157( 150): 157( 150)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.119687 445017 task_exit.go:204] [ 157( 150): 157( 150)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.119791 445017 task_signals.go:204] [ 157( 150): 158( 151)] Signal 157, PID: 158, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.119858 445017 task_signals.go:204] [ 157( 150): 159( 152)] Signal 157, PID: 159, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.119884 445017 task_exit.go:204] [ 157( 150): 158( 151)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.120057 445017 task_exit.go:204] [ 157( 150): 159( 152)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.120309 445017 task_exit.go:204] [ 157( 150): 158( 151)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.120383 445017 task_exit.go:204] [ 157( 150): 158( 151)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.123271 445017 task_exit.go:204] [ 157( 150): 159( 152)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.123332 445017 task_exit.go:204] [ 157( 150): 159( 152)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.123416 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:55.124148 445017 task_exit.go:204] [ 157( 150): 157( 150)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.131911 445017 usertrap_amd64.go:212] [ 160( 153): 160( 153)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:55.132017 445017 usertrap_amd64.go:122] [ 160( 153): 160( 153)] Allocate a new trap: 0xc00030ea20 28 D0719 21:52:55.132518 445017 usertrap_amd64.go:225] [ 160( 153): 160( 153)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:55.135594 445017 usertrap_amd64.go:212] [ 160( 153): 160( 153)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:55.135709 445017 usertrap_amd64.go:122] [ 160( 153): 160( 153)] Allocate a new trap: 0xc00030ea20 29 D0719 21:52:55.135771 445017 usertrap_amd64.go:225] [ 160( 153): 160( 153)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:55.136533 445017 usertrap_amd64.go:212] [ 160( 153): 160( 153)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:55.136586 445017 usertrap_amd64.go:122] [ 160( 153): 160( 153)] Allocate a new trap: 0xc00030ea20 30 D0719 21:52:55.136646 445017 usertrap_amd64.go:225] [ 160( 153): 160( 153)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:55.140731 445017 usertrap_amd64.go:212] [ 160( 153): 160( 153)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:55.140786 445017 usertrap_amd64.go:122] [ 160( 153): 160( 153)] Allocate a new trap: 0xc00030ea20 31 D0719 21:52:55.140874 445017 usertrap_amd64.go:225] [ 160( 153): 160( 153)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:55.141560 445017 usertrap_amd64.go:212] [ 160( 153): 160( 153)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:55.141634 445017 usertrap_amd64.go:122] [ 160( 153): 160( 153)] Allocate a new trap: 0xc00030ea20 32 D0719 21:52:55.141708 445017 usertrap_amd64.go:225] [ 160( 153): 160( 153)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:55.142236 445017 usertrap_amd64.go:212] [ 160( 153): 160( 153)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:55.142301 445017 usertrap_amd64.go:122] [ 160( 153): 160( 153)] Allocate a new trap: 0xc00030ea20 33 D0719 21:52:55.142374 445017 usertrap_amd64.go:225] [ 160( 153): 160( 153)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:55.142883 445017 usertrap_amd64.go:212] [ 160( 153): 161( 154)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:55.143067 445017 usertrap_amd64.go:122] [ 160( 153): 161( 154)] Allocate a new trap: 0xc00030ea20 34 D0719 21:52:55.143223 445017 usertrap_amd64.go:225] [ 160( 153): 161( 154)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:55.151777 445017 usertrap_amd64.go:212] [ 160( 153): 160( 153)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:55.151854 445017 usertrap_amd64.go:122] [ 160( 153): 160( 153)] Allocate a new trap: 0xc00030ea20 35 D0719 21:52:55.151956 445017 usertrap_amd64.go:225] [ 160( 153): 160( 153)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.157177 445017 usertrap_amd64.go:212] [ 160( 153): 160( 153)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.157267 445017 usertrap_amd64.go:122] [ 160( 153): 160( 153)] Allocate a new trap: 0xc00030ea20 36 D0719 21:52:55.157340 445017 usertrap_amd64.go:225] [ 160( 153): 160( 153)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.157901 445017 task_exit.go:204] [ 160( 153): 160( 153)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.158146 445017 task_signals.go:204] [ 160( 153): 162( 155)] Signal 160, PID: 162, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.158255 445017 task_exit.go:204] [ 160( 153): 160( 153)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.158427 445017 task_exit.go:204] [ 160( 153): 162( 155)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.158579 445017 task_signals.go:204] [ 160( 153): 161( 154)] Signal 160, PID: 161, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.158886 445017 task_exit.go:204] [ 160( 153): 162( 155)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.158978 445017 task_exit.go:204] [ 160( 153): 162( 155)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.159223 445017 task_exit.go:204] [ 160( 153): 161( 154)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.163302 445017 task_exit.go:204] [ 160( 153): 161( 154)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.163364 445017 task_exit.go:204] [ 160( 153): 161( 154)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.163480 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:55.164017 445017 task_exit.go:204] [ 160( 153): 160( 153)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.170486 445017 usertrap_amd64.go:212] [ 163( 156): 163( 156)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:55.170550 445017 usertrap_amd64.go:122] [ 163( 156): 163( 156)] Allocate a new trap: 0xc0008865d0 28 D0719 21:52:55.170974 445017 usertrap_amd64.go:225] [ 163( 156): 163( 156)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:55.175109 445017 usertrap_amd64.go:212] [ 163( 156): 163( 156)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:55.175193 445017 usertrap_amd64.go:122] [ 163( 156): 163( 156)] Allocate a new trap: 0xc0008865d0 29 D0719 21:52:55.175256 445017 usertrap_amd64.go:225] [ 163( 156): 163( 156)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:55.176316 445017 usertrap_amd64.go:212] [ 163( 156): 163( 156)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:55.176464 445017 usertrap_amd64.go:122] [ 163( 156): 163( 156)] Allocate a new trap: 0xc0008865d0 30 D0719 21:52:55.176526 445017 usertrap_amd64.go:225] [ 163( 156): 163( 156)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:55.181178 445017 usertrap_amd64.go:212] [ 163( 156): 163( 156)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:55.181277 445017 usertrap_amd64.go:122] [ 163( 156): 163( 156)] Allocate a new trap: 0xc0008865d0 31 D0719 21:52:55.181349 445017 usertrap_amd64.go:225] [ 163( 156): 163( 156)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:55.181597 445017 usertrap_amd64.go:212] [ 163( 156): 163( 156)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:55.181638 445017 usertrap_amd64.go:122] [ 163( 156): 163( 156)] Allocate a new trap: 0xc0008865d0 32 D0719 21:52:55.181696 445017 usertrap_amd64.go:225] [ 163( 156): 163( 156)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:55.182508 445017 usertrap_amd64.go:212] [ 163( 156): 163( 156)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:55.182610 445017 usertrap_amd64.go:122] [ 163( 156): 163( 156)] Allocate a new trap: 0xc0008865d0 33 D0719 21:52:55.182749 445017 usertrap_amd64.go:225] [ 163( 156): 163( 156)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:55.182982 445017 usertrap_amd64.go:212] [ 163( 156): 164( 157)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:55.183073 445017 usertrap_amd64.go:122] [ 163( 156): 164( 157)] Allocate a new trap: 0xc0008865d0 34 D0719 21:52:55.183350 445017 usertrap_amd64.go:225] [ 163( 156): 164( 157)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:55.190477 445017 usertrap_amd64.go:212] [ 163( 156): 163( 156)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:55.190643 445017 usertrap_amd64.go:122] [ 163( 156): 163( 156)] Allocate a new trap: 0xc0008865d0 35 D0719 21:52:55.190764 445017 usertrap_amd64.go:225] [ 163( 156): 163( 156)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.193612 445017 usertrap_amd64.go:212] [ 163( 156): 163( 156)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.193721 445017 usertrap_amd64.go:122] [ 163( 156): 163( 156)] Allocate a new trap: 0xc0008865d0 36 D0719 21:52:55.193795 445017 usertrap_amd64.go:225] [ 163( 156): 163( 156)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.195996 445017 task_exit.go:204] [ 163( 156): 163( 156)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.196149 445017 task_signals.go:204] [ 163( 156): 165( 158)] Signal 163, PID: 165, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.196260 445017 task_exit.go:204] [ 163( 156): 165( 158)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.196460 445017 task_signals.go:204] [ 163( 156): 164( 157)] Signal 163, PID: 164, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.196648 445017 task_exit.go:204] [ 163( 156): 165( 158)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.196722 445017 task_exit.go:204] [ 163( 156): 165( 158)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.196830 445017 task_exit.go:204] [ 163( 156): 164( 157)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.197082 445017 task_exit.go:204] [ 163( 156): 163( 156)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.200491 445017 task_exit.go:204] [ 163( 156): 164( 157)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.200619 445017 task_exit.go:204] [ 163( 156): 164( 157)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.200719 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:55.201351 445017 task_exit.go:204] [ 163( 156): 163( 156)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.217120 445017 usertrap_amd64.go:212] [ 166( 159): 166( 159)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:55.217247 445017 usertrap_amd64.go:122] [ 166( 159): 166( 159)] Allocate a new trap: 0xc00030ef00 28 D0719 21:52:55.217689 445017 usertrap_amd64.go:225] [ 166( 159): 166( 159)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:55.221204 445017 usertrap_amd64.go:212] [ 166( 159): 166( 159)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:55.221277 445017 usertrap_amd64.go:122] [ 166( 159): 166( 159)] Allocate a new trap: 0xc00030ef00 29 D0719 21:52:55.221355 445017 usertrap_amd64.go:225] [ 166( 159): 166( 159)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:55.222565 445017 usertrap_amd64.go:212] [ 166( 159): 166( 159)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:55.222754 445017 usertrap_amd64.go:122] [ 166( 159): 166( 159)] Allocate a new trap: 0xc00030ef00 30 D0719 21:52:55.222839 445017 usertrap_amd64.go:225] [ 166( 159): 166( 159)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:55.226527 445017 usertrap_amd64.go:212] [ 166( 159): 166( 159)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:55.226590 445017 usertrap_amd64.go:122] [ 166( 159): 166( 159)] Allocate a new trap: 0xc00030ef00 31 D0719 21:52:55.226727 445017 usertrap_amd64.go:225] [ 166( 159): 166( 159)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:55.227105 445017 usertrap_amd64.go:212] [ 166( 159): 166( 159)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:55.227171 445017 usertrap_amd64.go:122] [ 166( 159): 166( 159)] Allocate a new trap: 0xc00030ef00 32 D0719 21:52:55.227256 445017 usertrap_amd64.go:225] [ 166( 159): 166( 159)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:55.228128 445017 usertrap_amd64.go:212] [ 166( 159): 166( 159)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:55.228182 445017 usertrap_amd64.go:122] [ 166( 159): 166( 159)] Allocate a new trap: 0xc00030ef00 33 D0719 21:52:55.228253 445017 usertrap_amd64.go:225] [ 166( 159): 166( 159)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:55.228647 445017 usertrap_amd64.go:212] [ 166( 159): 167( 160)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:55.228733 445017 usertrap_amd64.go:122] [ 166( 159): 167( 160)] Allocate a new trap: 0xc00030ef00 34 D0719 21:52:55.228824 445017 usertrap_amd64.go:225] [ 166( 159): 167( 160)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:55.235742 445017 usertrap_amd64.go:212] [ 166( 159): 166( 159)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:55.235820 445017 usertrap_amd64.go:122] [ 166( 159): 166( 159)] Allocate a new trap: 0xc00030ef00 35 D0719 21:52:55.235892 445017 usertrap_amd64.go:225] [ 166( 159): 166( 159)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.239590 445017 usertrap_amd64.go:212] [ 166( 159): 166( 159)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.239712 445017 usertrap_amd64.go:122] [ 166( 159): 166( 159)] Allocate a new trap: 0xc00030ef00 36 D0719 21:52:55.239792 445017 usertrap_amd64.go:225] [ 166( 159): 166( 159)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.240313 445017 task_exit.go:204] [ 166( 159): 166( 159)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.240605 445017 task_exit.go:204] [ 166( 159): 166( 159)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.240593 445017 task_signals.go:204] [ 166( 159): 167( 160)] Signal 166, PID: 167, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.240612 445017 task_signals.go:204] [ 166( 159): 168( 161)] Signal 166, PID: 168, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.240887 445017 task_exit.go:204] [ 166( 159): 167( 160)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.241100 445017 task_exit.go:204] [ 166( 159): 168( 161)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.241442 445017 task_exit.go:204] [ 166( 159): 167( 160)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.241533 445017 task_exit.go:204] [ 166( 159): 167( 160)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.244696 445017 task_exit.go:204] [ 166( 159): 168( 161)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.244754 445017 task_exit.go:204] [ 166( 159): 168( 161)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.244836 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:55.244930 445017 task_exit.go:204] [ 166( 159): 166( 159)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.253170 445017 usertrap_amd64.go:212] [ 169( 162): 169( 162)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:55.253276 445017 usertrap_amd64.go:122] [ 169( 162): 169( 162)] Allocate a new trap: 0xc000886690 28 D0719 21:52:55.253727 445017 usertrap_amd64.go:225] [ 169( 162): 169( 162)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:55.274987 445017 usertrap_amd64.go:212] [ 169( 162): 169( 162)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:55.275147 445017 usertrap_amd64.go:122] [ 169( 162): 169( 162)] Allocate a new trap: 0xc000886690 29 D0719 21:52:55.275307 445017 usertrap_amd64.go:225] [ 169( 162): 169( 162)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:55.277437 445017 usertrap_amd64.go:212] [ 169( 162): 169( 162)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:55.277528 445017 usertrap_amd64.go:122] [ 169( 162): 169( 162)] Allocate a new trap: 0xc000886690 30 D0719 21:52:55.277627 445017 usertrap_amd64.go:225] [ 169( 162): 169( 162)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:55.284374 445017 usertrap_amd64.go:212] [ 169( 162): 169( 162)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:55.284454 445017 usertrap_amd64.go:122] [ 169( 162): 169( 162)] Allocate a new trap: 0xc000886690 31 D0719 21:52:55.284536 445017 usertrap_amd64.go:225] [ 169( 162): 169( 162)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:55.284830 445017 usertrap_amd64.go:212] [ 169( 162): 169( 162)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:55.285016 445017 usertrap_amd64.go:122] [ 169( 162): 169( 162)] Allocate a new trap: 0xc000886690 32 D0719 21:52:55.285133 445017 usertrap_amd64.go:225] [ 169( 162): 169( 162)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:55.285852 445017 usertrap_amd64.go:212] [ 169( 162): 169( 162)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:55.285933 445017 usertrap_amd64.go:122] [ 169( 162): 169( 162)] Allocate a new trap: 0xc000886690 33 D0719 21:52:55.285995 445017 usertrap_amd64.go:225] [ 169( 162): 169( 162)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:55.286532 445017 usertrap_amd64.go:212] [ 169( 162): 170( 163)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:55.286598 445017 usertrap_amd64.go:122] [ 169( 162): 170( 163)] Allocate a new trap: 0xc000886690 34 D0719 21:52:55.286725 445017 usertrap_amd64.go:225] [ 169( 162): 170( 163)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:55.309936 445017 usertrap_amd64.go:212] [ 169( 162): 169( 162)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:55.310040 445017 usertrap_amd64.go:122] [ 169( 162): 169( 162)] Allocate a new trap: 0xc000886690 35 D0719 21:52:55.310114 445017 usertrap_amd64.go:225] [ 169( 162): 169( 162)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.314319 445017 usertrap_amd64.go:212] [ 169( 162): 169( 162)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.314408 445017 usertrap_amd64.go:122] [ 169( 162): 169( 162)] Allocate a new trap: 0xc000886690 36 D0719 21:52:55.314500 445017 usertrap_amd64.go:225] [ 169( 162): 169( 162)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0719 21:52:55.315157 445017 task_exit.go:204] [ 169( 162): 169( 162)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.315383 445017 task_exit.go:204] [ 169( 162): 169( 162)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.315545 445017 task_signals.go:204] [ 169( 162): 170( 163)] Signal 169, PID: 170, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.315663 445017 task_exit.go:204] [ 169( 162): 170( 163)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.315853 445017 task_exit.go:204] [ 169( 162): 170( 163)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.315894 445017 task_exit.go:204] [ 169( 162): 170( 163)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.316051 445017 task_signals.go:204] [ 169( 162): 171( 164)] Signal 169, PID: 171, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.316145 445017 task_exit.go:204] [ 169( 162): 171( 164)] Transitioning from exit state TaskExitNone to TaskExitInitiated write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.320074 445017 task_exit.go:204] [ 169( 162): 171( 164)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.320199 445017 task_exit.go:204] [ 169( 162): 171( 164)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.320318 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:55.320555 445017 task_exit.go:204] [ 169( 162): 169( 162)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.340835 445017 usertrap_amd64.go:212] [ 172( 165): 172( 165)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:55.340947 445017 usertrap_amd64.go:122] [ 172( 165): 172( 165)] Allocate a new trap: 0xc000886780 28 D0719 21:52:55.341441 445017 usertrap_amd64.go:225] [ 172( 165): 172( 165)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:55.346010 445017 usertrap_amd64.go:212] [ 172( 165): 172( 165)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:55.346097 445017 usertrap_amd64.go:122] [ 172( 165): 172( 165)] Allocate a new trap: 0xc000886780 29 D0719 21:52:55.346167 445017 usertrap_amd64.go:225] [ 172( 165): 172( 165)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:55.347328 445017 usertrap_amd64.go:212] [ 172( 165): 172( 165)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:55.347383 445017 usertrap_amd64.go:122] [ 172( 165): 172( 165)] Allocate a new trap: 0xc000886780 30 D0719 21:52:55.347449 445017 usertrap_amd64.go:225] [ 172( 165): 172( 165)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:55.354707 445017 usertrap_amd64.go:212] [ 172( 165): 172( 165)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:55.355333 445017 usertrap_amd64.go:122] [ 172( 165): 172( 165)] Allocate a new trap: 0xc000886780 31 D0719 21:52:55.355489 445017 usertrap_amd64.go:225] [ 172( 165): 172( 165)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:55.355912 445017 usertrap_amd64.go:212] [ 172( 165): 172( 165)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:55.355973 445017 usertrap_amd64.go:122] [ 172( 165): 172( 165)] Allocate a new trap: 0xc000886780 32 D0719 21:52:55.356079 445017 usertrap_amd64.go:225] [ 172( 165): 172( 165)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:55.356989 445017 usertrap_amd64.go:212] [ 172( 165): 172( 165)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:55.357062 445017 usertrap_amd64.go:122] [ 172( 165): 172( 165)] Allocate a new trap: 0xc000886780 33 D0719 21:52:55.357127 445017 usertrap_amd64.go:225] [ 172( 165): 172( 165)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:55.357527 445017 usertrap_amd64.go:212] [ 172( 165): 173( 166)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:55.357590 445017 usertrap_amd64.go:122] [ 172( 165): 173( 166)] Allocate a new trap: 0xc000886780 34 D0719 21:52:55.357662 445017 usertrap_amd64.go:225] [ 172( 165): 173( 166)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:55.367052 445017 usertrap_amd64.go:212] [ 172( 165): 172( 165)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:55.367167 445017 usertrap_amd64.go:122] [ 172( 165): 172( 165)] Allocate a new trap: 0xc000886780 35 D0719 21:52:55.367291 445017 usertrap_amd64.go:225] [ 172( 165): 172( 165)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.369803 445017 usertrap_amd64.go:212] [ 172( 165): 172( 165)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.369892 445017 usertrap_amd64.go:122] [ 172( 165): 172( 165)] Allocate a new trap: 0xc000886780 36 D0719 21:52:55.369974 445017 usertrap_amd64.go:225] [ 172( 165): 172( 165)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.370530 445017 task_exit.go:204] [ 172( 165): 172( 165)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.370750 445017 task_signals.go:204] [ 172( 165): 173( 166)] Signal 172, PID: 173, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.370926 445017 task_exit.go:204] [ 172( 165): 173( 166)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.371151 445017 task_signals.go:204] [ 172( 165): 174( 167)] Signal 172, PID: 174, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.371287 445017 task_exit.go:204] [ 172( 165): 174( 167)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.371745 445017 task_exit.go:204] [ 172( 165): 172( 165)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.371928 445017 task_exit.go:204] [ 172( 165): 173( 166)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.371986 445017 task_exit.go:204] [ 172( 165): 173( 166)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.374845 445017 task_exit.go:204] [ 172( 165): 174( 167)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.374939 445017 task_exit.go:204] [ 172( 165): 174( 167)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.375036 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:55.375438 445017 task_exit.go:204] [ 172( 165): 172( 165)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.391854 445017 usertrap_amd64.go:212] [ 175( 168): 175( 168)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:55.391981 445017 usertrap_amd64.go:122] [ 175( 168): 175( 168)] Allocate a new trap: 0xc00030f140 28 D0719 21:52:55.392353 445017 usertrap_amd64.go:225] [ 175( 168): 175( 168)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:55.395420 445017 usertrap_amd64.go:212] [ 175( 168): 175( 168)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:55.395480 445017 usertrap_amd64.go:122] [ 175( 168): 175( 168)] Allocate a new trap: 0xc00030f140 29 D0719 21:52:55.395553 445017 usertrap_amd64.go:225] [ 175( 168): 175( 168)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:55.396328 445017 usertrap_amd64.go:212] [ 175( 168): 175( 168)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:55.396417 445017 usertrap_amd64.go:122] [ 175( 168): 175( 168)] Allocate a new trap: 0xc00030f140 30 D0719 21:52:55.396526 445017 usertrap_amd64.go:225] [ 175( 168): 175( 168)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:55.400685 445017 usertrap_amd64.go:212] [ 175( 168): 175( 168)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:55.400776 445017 usertrap_amd64.go:122] [ 175( 168): 175( 168)] Allocate a new trap: 0xc00030f140 31 D0719 21:52:55.400833 445017 usertrap_amd64.go:225] [ 175( 168): 175( 168)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:55.401073 445017 usertrap_amd64.go:212] [ 175( 168): 175( 168)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:55.401149 445017 usertrap_amd64.go:122] [ 175( 168): 175( 168)] Allocate a new trap: 0xc00030f140 32 D0719 21:52:55.401196 445017 usertrap_amd64.go:225] [ 175( 168): 175( 168)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:55.401824 445017 usertrap_amd64.go:212] [ 175( 168): 175( 168)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:55.401942 445017 usertrap_amd64.go:122] [ 175( 168): 175( 168)] Allocate a new trap: 0xc00030f140 33 D0719 21:52:55.402059 445017 usertrap_amd64.go:225] [ 175( 168): 175( 168)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:55.402346 445017 usertrap_amd64.go:212] [ 175( 168): 176( 169)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:55.402405 445017 usertrap_amd64.go:122] [ 175( 168): 176( 169)] Allocate a new trap: 0xc00030f140 34 D0719 21:52:55.402619 445017 usertrap_amd64.go:225] [ 175( 168): 176( 169)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:55.409507 445017 usertrap_amd64.go:212] [ 175( 168): 175( 168)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:55.409607 445017 usertrap_amd64.go:122] [ 175( 168): 175( 168)] Allocate a new trap: 0xc00030f140 35 D0719 21:52:55.409675 445017 usertrap_amd64.go:225] [ 175( 168): 175( 168)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.412258 445017 usertrap_amd64.go:212] [ 175( 168): 175( 168)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.412359 445017 usertrap_amd64.go:122] [ 175( 168): 175( 168)] Allocate a new trap: 0xc00030f140 36 D0719 21:52:55.412420 445017 usertrap_amd64.go:225] [ 175( 168): 175( 168)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.412938 445017 task_exit.go:204] [ 175( 168): 175( 168)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.413182 445017 task_signals.go:204] [ 175( 168): 176( 169)] Signal 175, PID: 176, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.413224 445017 task_signals.go:204] [ 175( 168): 177( 170)] Signal 175, PID: 177, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.413290 445017 task_exit.go:204] [ 175( 168): 176( 169)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.413495 445017 task_exit.go:204] [ 175( 168): 177( 170)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.413605 445017 task_exit.go:204] [ 175( 168): 175( 168)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.414056 445017 task_exit.go:204] [ 175( 168): 177( 170)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.414128 445017 task_exit.go:204] [ 175( 168): 177( 170)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.417260 445017 task_exit.go:204] [ 175( 168): 176( 169)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.417363 445017 task_exit.go:204] [ 175( 168): 176( 169)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.417460 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:55.417944 445017 task_exit.go:204] [ 175( 168): 175( 168)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.430119 445017 usertrap_amd64.go:212] [ 178( 171): 178( 171)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:55.430234 445017 usertrap_amd64.go:122] [ 178( 171): 178( 171)] Allocate a new trap: 0xc000b12210 28 D0719 21:52:55.430729 445017 usertrap_amd64.go:225] [ 178( 171): 178( 171)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:55.437484 445017 usertrap_amd64.go:212] [ 178( 171): 178( 171)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:55.437581 445017 usertrap_amd64.go:122] [ 178( 171): 178( 171)] Allocate a new trap: 0xc000b12210 29 D0719 21:52:55.437645 445017 usertrap_amd64.go:225] [ 178( 171): 178( 171)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:55.438967 445017 usertrap_amd64.go:212] [ 178( 171): 178( 171)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:55.439048 445017 usertrap_amd64.go:122] [ 178( 171): 178( 171)] Allocate a new trap: 0xc000b12210 30 D0719 21:52:55.439966 445017 usertrap_amd64.go:225] [ 178( 171): 178( 171)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:55.445260 445017 usertrap_amd64.go:212] [ 178( 171): 178( 171)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:55.445355 445017 usertrap_amd64.go:122] [ 178( 171): 178( 171)] Allocate a new trap: 0xc000b12210 31 D0719 21:52:55.445420 445017 usertrap_amd64.go:225] [ 178( 171): 178( 171)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:55.445956 445017 usertrap_amd64.go:212] [ 178( 171): 178( 171)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:55.446012 445017 usertrap_amd64.go:122] [ 178( 171): 178( 171)] Allocate a new trap: 0xc000b12210 32 D0719 21:52:55.446082 445017 usertrap_amd64.go:225] [ 178( 171): 178( 171)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:55.446713 445017 usertrap_amd64.go:212] [ 178( 171): 178( 171)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:55.446752 445017 usertrap_amd64.go:122] [ 178( 171): 178( 171)] Allocate a new trap: 0xc000b12210 33 D0719 21:52:55.446834 445017 usertrap_amd64.go:225] [ 178( 171): 178( 171)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:55.447417 445017 usertrap_amd64.go:212] [ 178( 171): 179( 172)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:55.447493 445017 usertrap_amd64.go:122] [ 178( 171): 179( 172)] Allocate a new trap: 0xc000b12210 34 D0719 21:52:55.447980 445017 usertrap_amd64.go:225] [ 178( 171): 179( 172)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:55.456089 445017 usertrap_amd64.go:212] [ 178( 171): 178( 171)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:55.456179 445017 usertrap_amd64.go:122] [ 178( 171): 178( 171)] Allocate a new trap: 0xc000b12210 35 D0719 21:52:55.456278 445017 usertrap_amd64.go:225] [ 178( 171): 178( 171)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.459709 445017 usertrap_amd64.go:212] [ 178( 171): 178( 171)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.459791 445017 usertrap_amd64.go:122] [ 178( 171): 178( 171)] Allocate a new trap: 0xc000b12210 36 D0719 21:52:55.459850 445017 usertrap_amd64.go:225] [ 178( 171): 178( 171)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.460358 445017 task_exit.go:204] [ 178( 171): 178( 171)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.460554 445017 task_exit.go:204] [ 178( 171): 178( 171)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.460577 445017 task_signals.go:204] [ 178( 171): 179( 172)] Signal 178, PID: 179, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.460836 445017 task_exit.go:204] [ 178( 171): 179( 172)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.461064 445017 task_exit.go:204] [ 178( 171): 179( 172)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.461116 445017 task_exit.go:204] [ 178( 171): 179( 172)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.461318 445017 task_signals.go:204] [ 178( 171): 180( 173)] Signal 178, PID: 180, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.461427 445017 task_exit.go:204] [ 178( 171): 180( 173)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.465055 445017 task_exit.go:204] [ 178( 171): 180( 173)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.465288 445017 task_exit.go:204] [ 178( 171): 180( 173)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.465448 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:55.465701 445017 task_exit.go:204] [ 178( 171): 178( 171)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.478110 445017 usertrap_amd64.go:212] [ 181( 174): 181( 174)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:55.478301 445017 usertrap_amd64.go:122] [ 181( 174): 181( 174)] Allocate a new trap: 0xc000bfa0f0 28 D0719 21:52:55.478745 445017 usertrap_amd64.go:225] [ 181( 174): 181( 174)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:55.491160 445017 usertrap_amd64.go:212] [ 181( 174): 181( 174)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:55.491275 445017 usertrap_amd64.go:122] [ 181( 174): 181( 174)] Allocate a new trap: 0xc000bfa0f0 29 D0719 21:52:55.491371 445017 usertrap_amd64.go:225] [ 181( 174): 181( 174)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:55.492385 445017 usertrap_amd64.go:212] [ 181( 174): 181( 174)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:55.492552 445017 usertrap_amd64.go:122] [ 181( 174): 181( 174)] Allocate a new trap: 0xc000bfa0f0 30 D0719 21:52:55.492703 445017 usertrap_amd64.go:225] [ 181( 174): 181( 174)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:55.501732 445017 usertrap_amd64.go:212] [ 181( 174): 181( 174)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:55.501823 445017 usertrap_amd64.go:122] [ 181( 174): 181( 174)] Allocate a new trap: 0xc000bfa0f0 31 D0719 21:52:55.501964 445017 usertrap_amd64.go:225] [ 181( 174): 181( 174)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:55.502291 445017 usertrap_amd64.go:212] [ 181( 174): 181( 174)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:55.502365 445017 usertrap_amd64.go:122] [ 181( 174): 181( 174)] Allocate a new trap: 0xc000bfa0f0 32 D0719 21:52:55.502495 445017 usertrap_amd64.go:225] [ 181( 174): 181( 174)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:55.503164 445017 usertrap_amd64.go:212] [ 181( 174): 181( 174)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:55.503241 445017 usertrap_amd64.go:122] [ 181( 174): 181( 174)] Allocate a new trap: 0xc000bfa0f0 33 D0719 21:52:55.503348 445017 usertrap_amd64.go:225] [ 181( 174): 181( 174)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:55.503847 445017 usertrap_amd64.go:212] [ 181( 174): 182( 175)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:55.503988 445017 usertrap_amd64.go:122] [ 181( 174): 182( 175)] Allocate a new trap: 0xc000bfa0f0 34 D0719 21:52:55.504088 445017 usertrap_amd64.go:225] [ 181( 174): 182( 175)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:55.512572 445017 usertrap_amd64.go:212] [ 181( 174): 181( 174)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:55.512672 445017 usertrap_amd64.go:122] [ 181( 174): 181( 174)] Allocate a new trap: 0xc000bfa0f0 35 D0719 21:52:55.512740 445017 usertrap_amd64.go:225] [ 181( 174): 181( 174)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.514761 445017 usertrap_amd64.go:212] [ 181( 174): 181( 174)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.514840 445017 usertrap_amd64.go:122] [ 181( 174): 181( 174)] Allocate a new trap: 0xc000bfa0f0 36 D0719 21:52:55.514959 445017 usertrap_amd64.go:225] [ 181( 174): 181( 174)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.515422 445017 task_exit.go:204] [ 181( 174): 181( 174)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.515547 445017 task_signals.go:204] [ 181( 174): 182( 175)] Signal 181, PID: 182, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.515572 445017 task_signals.go:204] [ 181( 174): 183( 176)] Signal 181, PID: 183, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.515721 445017 task_exit.go:204] [ 181( 174): 182( 175)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.515854 445017 task_exit.go:204] [ 181( 174): 183( 176)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.516078 445017 task_exit.go:204] [ 181( 174): 183( 176)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.516125 445017 task_exit.go:204] [ 181( 174): 183( 176)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.516257 445017 task_exit.go:204] [ 181( 174): 181( 174)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.519701 445017 task_exit.go:204] [ 181( 174): 182( 175)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.520056 445017 task_exit.go:204] [ 181( 174): 182( 175)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.520188 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:55.520318 445017 task_exit.go:204] [ 181( 174): 181( 174)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.543177 445017 usertrap_amd64.go:212] [ 184( 177): 184( 177)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:55.543304 445017 usertrap_amd64.go:122] [ 184( 177): 184( 177)] Allocate a new trap: 0xc000a68360 28 D0719 21:52:55.543987 445017 usertrap_amd64.go:225] [ 184( 177): 184( 177)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:55.549396 445017 usertrap_amd64.go:212] [ 184( 177): 184( 177)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:55.549480 445017 usertrap_amd64.go:122] [ 184( 177): 184( 177)] Allocate a new trap: 0xc000a68360 29 D0719 21:52:55.549540 445017 usertrap_amd64.go:225] [ 184( 177): 184( 177)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:55.555361 445017 usertrap_amd64.go:212] [ 184( 177): 184( 177)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:55.555445 445017 usertrap_amd64.go:122] [ 184( 177): 184( 177)] Allocate a new trap: 0xc000a68360 30 D0719 21:52:55.555522 445017 usertrap_amd64.go:225] [ 184( 177): 184( 177)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:55.566372 445017 usertrap_amd64.go:212] [ 184( 177): 184( 177)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:55.566463 445017 usertrap_amd64.go:122] [ 184( 177): 184( 177)] Allocate a new trap: 0xc000a68360 31 D0719 21:52:55.566566 445017 usertrap_amd64.go:225] [ 184( 177): 184( 177)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:55.567156 445017 usertrap_amd64.go:212] [ 184( 177): 184( 177)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:55.567226 445017 usertrap_amd64.go:122] [ 184( 177): 184( 177)] Allocate a new trap: 0xc000a68360 32 D0719 21:52:55.567280 445017 usertrap_amd64.go:225] [ 184( 177): 184( 177)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:55.567963 445017 usertrap_amd64.go:212] [ 184( 177): 184( 177)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:55.568040 445017 usertrap_amd64.go:122] [ 184( 177): 184( 177)] Allocate a new trap: 0xc000a68360 33 D0719 21:52:55.568107 445017 usertrap_amd64.go:225] [ 184( 177): 184( 177)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:55.568367 445017 usertrap_amd64.go:212] [ 184( 177): 185( 178)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:55.568447 445017 usertrap_amd64.go:122] [ 184( 177): 185( 178)] Allocate a new trap: 0xc000a68360 34 D0719 21:52:55.568651 445017 usertrap_amd64.go:225] [ 184( 177): 185( 178)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:55.578003 445017 usertrap_amd64.go:212] [ 184( 177): 184( 177)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:55.578093 445017 usertrap_amd64.go:122] [ 184( 177): 184( 177)] Allocate a new trap: 0xc000a68360 35 D0719 21:52:55.578192 445017 usertrap_amd64.go:225] [ 184( 177): 184( 177)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.582283 445017 usertrap_amd64.go:212] [ 184( 177): 184( 177)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.582350 445017 usertrap_amd64.go:122] [ 184( 177): 184( 177)] Allocate a new trap: 0xc000a68360 36 D0719 21:52:55.582505 445017 usertrap_amd64.go:225] [ 184( 177): 184( 177)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.583175 445017 task_exit.go:204] [ 184( 177): 184( 177)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.583569 445017 task_exit.go:204] [ 184( 177): 184( 177)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.583562 445017 task_signals.go:204] [ 184( 177): 185( 178)] Signal 184, PID: 185, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.583702 445017 task_signals.go:204] [ 184( 177): 186( 179)] Signal 184, PID: 186, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.583824 445017 task_exit.go:204] [ 184( 177): 186( 179)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.584104 445017 task_exit.go:204] [ 184( 177): 185( 178)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.584545 445017 task_exit.go:204] [ 184( 177): 185( 178)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.584620 445017 task_exit.go:204] [ 184( 177): 185( 178)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.587860 445017 task_exit.go:204] [ 184( 177): 186( 179)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.587934 445017 task_exit.go:204] [ 184( 177): 186( 179)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.588014 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:55.588685 445017 task_exit.go:204] [ 184( 177): 184( 177)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.595161 445017 usertrap_amd64.go:212] [ 187( 180): 187( 180)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:55.595275 445017 usertrap_amd64.go:122] [ 187( 180): 187( 180)] Allocate a new trap: 0xc00037eb10 28 D0719 21:52:55.595859 445017 usertrap_amd64.go:225] [ 187( 180): 187( 180)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:55.608473 445017 usertrap_amd64.go:212] [ 187( 180): 187( 180)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:55.608586 445017 usertrap_amd64.go:122] [ 187( 180): 187( 180)] Allocate a new trap: 0xc00037eb10 29 D0719 21:52:55.608688 445017 usertrap_amd64.go:225] [ 187( 180): 187( 180)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:55.609916 445017 usertrap_amd64.go:212] [ 187( 180): 187( 180)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:55.610022 445017 usertrap_amd64.go:122] [ 187( 180): 187( 180)] Allocate a new trap: 0xc00037eb10 30 D0719 21:52:55.610146 445017 usertrap_amd64.go:225] [ 187( 180): 187( 180)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:55.614919 445017 usertrap_amd64.go:212] [ 187( 180): 187( 180)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:55.615001 445017 usertrap_amd64.go:122] [ 187( 180): 187( 180)] Allocate a new trap: 0xc00037eb10 31 D0719 21:52:55.615078 445017 usertrap_amd64.go:225] [ 187( 180): 187( 180)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:55.615385 445017 usertrap_amd64.go:212] [ 187( 180): 187( 180)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:55.615452 445017 usertrap_amd64.go:122] [ 187( 180): 187( 180)] Allocate a new trap: 0xc00037eb10 32 D0719 21:52:55.615506 445017 usertrap_amd64.go:225] [ 187( 180): 187( 180)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:55.616187 445017 usertrap_amd64.go:212] [ 187( 180): 187( 180)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:55.616251 445017 usertrap_amd64.go:122] [ 187( 180): 187( 180)] Allocate a new trap: 0xc00037eb10 33 D0719 21:52:55.616316 445017 usertrap_amd64.go:225] [ 187( 180): 187( 180)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:55.616637 445017 usertrap_amd64.go:212] [ 187( 180): 188( 181)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:55.616728 445017 usertrap_amd64.go:122] [ 187( 180): 188( 181)] Allocate a new trap: 0xc00037eb10 34 D0719 21:52:55.616830 445017 usertrap_amd64.go:225] [ 187( 180): 188( 181)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:55.628503 445017 usertrap_amd64.go:212] [ 187( 180): 187( 180)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:55.628593 445017 usertrap_amd64.go:122] [ 187( 180): 187( 180)] Allocate a new trap: 0xc00037eb10 35 D0719 21:52:55.628669 445017 usertrap_amd64.go:225] [ 187( 180): 187( 180)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.631162 445017 usertrap_amd64.go:212] [ 187( 180): 187( 180)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.631249 445017 usertrap_amd64.go:122] [ 187( 180): 187( 180)] Allocate a new trap: 0xc00037eb10 36 D0719 21:52:55.631334 445017 usertrap_amd64.go:225] [ 187( 180): 187( 180)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.631840 445017 task_exit.go:204] [ 187( 180): 187( 180)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.632025 445017 task_signals.go:204] [ 187( 180): 189( 182)] Signal 187, PID: 189, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.632085 445017 task_exit.go:204] [ 187( 180): 187( 180)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.632228 445017 task_exit.go:204] [ 187( 180): 189( 182)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.632407 445017 task_signals.go:204] [ 187( 180): 188( 181)] Signal 187, PID: 188, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.632529 445017 task_exit.go:204] [ 187( 180): 189( 182)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.632576 445017 task_exit.go:204] [ 187( 180): 189( 182)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.632682 445017 task_exit.go:204] [ 187( 180): 188( 181)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.636430 445017 task_exit.go:204] [ 187( 180): 188( 181)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.636520 445017 task_exit.go:204] [ 187( 180): 188( 181)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.636644 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:55.636991 445017 task_exit.go:204] [ 187( 180): 187( 180)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.644782 445017 usertrap_amd64.go:212] [ 190( 183): 190( 183)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:55.644905 445017 usertrap_amd64.go:122] [ 190( 183): 190( 183)] Allocate a new trap: 0xc0008867e0 28 D0719 21:52:55.645436 445017 usertrap_amd64.go:225] [ 190( 183): 190( 183)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:55.649940 445017 usertrap_amd64.go:212] [ 190( 183): 190( 183)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:55.650045 445017 usertrap_amd64.go:122] [ 190( 183): 190( 183)] Allocate a new trap: 0xc0008867e0 29 D0719 21:52:55.650113 445017 usertrap_amd64.go:225] [ 190( 183): 190( 183)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:55.651461 445017 usertrap_amd64.go:212] [ 190( 183): 190( 183)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:55.651566 445017 usertrap_amd64.go:122] [ 190( 183): 190( 183)] Allocate a new trap: 0xc0008867e0 30 D0719 21:52:55.651711 445017 usertrap_amd64.go:225] [ 190( 183): 190( 183)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:55.657078 445017 usertrap_amd64.go:212] [ 190( 183): 190( 183)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:55.657166 445017 usertrap_amd64.go:122] [ 190( 183): 190( 183)] Allocate a new trap: 0xc0008867e0 31 D0719 21:52:55.657271 445017 usertrap_amd64.go:225] [ 190( 183): 190( 183)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:55.657606 445017 usertrap_amd64.go:212] [ 190( 183): 190( 183)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:55.657678 445017 usertrap_amd64.go:122] [ 190( 183): 190( 183)] Allocate a new trap: 0xc0008867e0 32 D0719 21:52:55.657840 445017 usertrap_amd64.go:225] [ 190( 183): 190( 183)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:55.658576 445017 usertrap_amd64.go:212] [ 190( 183): 190( 183)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:55.658707 445017 usertrap_amd64.go:122] [ 190( 183): 190( 183)] Allocate a new trap: 0xc0008867e0 33 D0719 21:52:55.658858 445017 usertrap_amd64.go:225] [ 190( 183): 190( 183)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:55.659147 445017 usertrap_amd64.go:212] [ 190( 183): 191( 184)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:55.659228 445017 usertrap_amd64.go:122] [ 190( 183): 191( 184)] Allocate a new trap: 0xc0008867e0 34 D0719 21:52:55.659354 445017 usertrap_amd64.go:225] [ 190( 183): 191( 184)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:55.668618 445017 usertrap_amd64.go:212] [ 190( 183): 190( 183)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:55.668744 445017 usertrap_amd64.go:122] [ 190( 183): 190( 183)] Allocate a new trap: 0xc0008867e0 35 D0719 21:52:55.668828 445017 usertrap_amd64.go:225] [ 190( 183): 190( 183)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.671981 445017 usertrap_amd64.go:212] [ 190( 183): 190( 183)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.672081 445017 usertrap_amd64.go:122] [ 190( 183): 190( 183)] Allocate a new trap: 0xc0008867e0 36 D0719 21:52:55.672143 445017 usertrap_amd64.go:225] [ 190( 183): 190( 183)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.677971 445017 task_exit.go:204] [ 190( 183): 190( 183)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.678312 445017 task_signals.go:204] [ 190( 183): 191( 184)] Signal 190, PID: 191, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.678499 445017 task_signals.go:204] [ 190( 183): 192( 185)] Signal 190, PID: 192, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.678716 445017 task_exit.go:204] [ 190( 183): 190( 183)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.678853 445017 task_exit.go:204] [ 190( 183): 191( 184)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.679096 445017 task_exit.go:204] [ 190( 183): 191( 184)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.679206 445017 task_exit.go:204] [ 190( 183): 191( 184)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.679507 445017 task_exit.go:204] [ 190( 183): 192( 185)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.683161 445017 task_exit.go:204] [ 190( 183): 192( 185)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.683392 445017 task_exit.go:204] [ 190( 183): 192( 185)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.683526 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:55.683813 445017 task_exit.go:204] [ 190( 183): 190( 183)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.698234 445017 usertrap_amd64.go:212] [ 193( 186): 193( 186)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:55.698345 445017 usertrap_amd64.go:122] [ 193( 186): 193( 186)] Allocate a new trap: 0xc000886000 28 D0719 21:52:55.698784 445017 usertrap_amd64.go:225] [ 193( 186): 193( 186)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:55.704377 445017 usertrap_amd64.go:212] [ 193( 186): 193( 186)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:55.704445 445017 usertrap_amd64.go:122] [ 193( 186): 193( 186)] Allocate a new trap: 0xc000886000 29 D0719 21:52:55.704492 445017 usertrap_amd64.go:225] [ 193( 186): 193( 186)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:55.705454 445017 usertrap_amd64.go:212] [ 193( 186): 193( 186)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:55.705514 445017 usertrap_amd64.go:122] [ 193( 186): 193( 186)] Allocate a new trap: 0xc000886000 30 D0719 21:52:55.705577 445017 usertrap_amd64.go:225] [ 193( 186): 193( 186)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:55.709122 445017 usertrap_amd64.go:212] [ 193( 186): 193( 186)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:55.709190 445017 usertrap_amd64.go:122] [ 193( 186): 193( 186)] Allocate a new trap: 0xc000886000 31 D0719 21:52:55.709272 445017 usertrap_amd64.go:225] [ 193( 186): 193( 186)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:55.709667 445017 usertrap_amd64.go:212] [ 193( 186): 193( 186)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:55.709721 445017 usertrap_amd64.go:122] [ 193( 186): 193( 186)] Allocate a new trap: 0xc000886000 32 D0719 21:52:55.709804 445017 usertrap_amd64.go:225] [ 193( 186): 193( 186)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:55.710348 445017 usertrap_amd64.go:212] [ 193( 186): 193( 186)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:55.710402 445017 usertrap_amd64.go:122] [ 193( 186): 193( 186)] Allocate a new trap: 0xc000886000 33 D0719 21:52:55.710475 445017 usertrap_amd64.go:225] [ 193( 186): 193( 186)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:55.710846 445017 usertrap_amd64.go:212] [ 193( 186): 194( 187)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:55.710923 445017 usertrap_amd64.go:122] [ 193( 186): 194( 187)] Allocate a new trap: 0xc000886000 34 D0719 21:52:55.711016 445017 usertrap_amd64.go:225] [ 193( 186): 194( 187)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:55.718535 445017 usertrap_amd64.go:212] [ 193( 186): 193( 186)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:55.718608 445017 usertrap_amd64.go:122] [ 193( 186): 193( 186)] Allocate a new trap: 0xc000886000 35 D0719 21:52:55.718700 445017 usertrap_amd64.go:225] [ 193( 186): 193( 186)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.721028 445017 usertrap_amd64.go:212] [ 193( 186): 193( 186)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.721083 445017 usertrap_amd64.go:122] [ 193( 186): 193( 186)] Allocate a new trap: 0xc000886000 36 D0719 21:52:55.721169 445017 usertrap_amd64.go:225] [ 193( 186): 193( 186)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.721668 445017 task_exit.go:204] [ 193( 186): 193( 186)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.721828 445017 task_signals.go:204] [ 193( 186): 194( 187)] Signal 193, PID: 194, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.721899 445017 task_exit.go:204] [ 193( 186): 193( 186)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.721882 445017 task_signals.go:204] [ 193( 186): 195( 188)] Signal 193, PID: 195, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.721995 445017 task_exit.go:204] [ 193( 186): 194( 187)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.722100 445017 task_signals.go:204] [ 193( 186): 196( 189)] Signal 193, PID: 196, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.722212 445017 task_exit.go:204] [ 193( 186): 195( 188)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.722433 445017 task_exit.go:204] [ 193( 186): 196( 189)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.722628 445017 task_exit.go:204] [ 193( 186): 194( 187)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.722742 445017 task_exit.go:204] [ 193( 186): 194( 187)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.722883 445017 task_exit.go:204] [ 193( 186): 195( 188)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.722932 445017 task_exit.go:204] [ 193( 186): 195( 188)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.725518 445017 task_exit.go:204] [ 193( 186): 196( 189)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.725598 445017 task_exit.go:204] [ 193( 186): 196( 189)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.725684 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:55.725788 445017 task_exit.go:204] [ 193( 186): 193( 186)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.732325 445017 usertrap_amd64.go:212] [ 197( 190): 197( 190)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:55.732423 445017 usertrap_amd64.go:122] [ 197( 190): 197( 190)] Allocate a new trap: 0xc00030e870 28 D0719 21:52:55.732875 445017 usertrap_amd64.go:225] [ 197( 190): 197( 190)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:55.736177 445017 usertrap_amd64.go:212] [ 197( 190): 197( 190)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:55.736244 445017 usertrap_amd64.go:122] [ 197( 190): 197( 190)] Allocate a new trap: 0xc00030e870 29 D0719 21:52:55.736335 445017 usertrap_amd64.go:225] [ 197( 190): 197( 190)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:55.737112 445017 usertrap_amd64.go:212] [ 197( 190): 197( 190)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:55.737162 445017 usertrap_amd64.go:122] [ 197( 190): 197( 190)] Allocate a new trap: 0xc00030e870 30 D0719 21:52:55.737235 445017 usertrap_amd64.go:225] [ 197( 190): 197( 190)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:55.740253 445017 usertrap_amd64.go:212] [ 197( 190): 197( 190)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:55.740307 445017 usertrap_amd64.go:122] [ 197( 190): 197( 190)] Allocate a new trap: 0xc00030e870 31 D0719 21:52:55.740360 445017 usertrap_amd64.go:225] [ 197( 190): 197( 190)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:55.740547 445017 usertrap_amd64.go:212] [ 197( 190): 197( 190)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:55.740590 445017 usertrap_amd64.go:122] [ 197( 190): 197( 190)] Allocate a new trap: 0xc00030e870 32 D0719 21:52:55.740651 445017 usertrap_amd64.go:225] [ 197( 190): 197( 190)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:55.741164 445017 usertrap_amd64.go:212] [ 197( 190): 197( 190)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:55.741224 445017 usertrap_amd64.go:122] [ 197( 190): 197( 190)] Allocate a new trap: 0xc00030e870 33 D0719 21:52:55.741289 445017 usertrap_amd64.go:225] [ 197( 190): 197( 190)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:55.741568 445017 usertrap_amd64.go:212] [ 197( 190): 198( 191)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:55.741653 445017 usertrap_amd64.go:122] [ 197( 190): 198( 191)] Allocate a new trap: 0xc00030e870 34 D0719 21:52:55.741955 445017 usertrap_amd64.go:225] [ 197( 190): 198( 191)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:55.749479 445017 usertrap_amd64.go:212] [ 197( 190): 197( 190)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:55.749618 445017 usertrap_amd64.go:122] [ 197( 190): 197( 190)] Allocate a new trap: 0xc00030e870 35 D0719 21:52:55.749692 445017 usertrap_amd64.go:225] [ 197( 190): 197( 190)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.752265 445017 usertrap_amd64.go:212] [ 197( 190): 197( 190)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.752355 445017 usertrap_amd64.go:122] [ 197( 190): 197( 190)] Allocate a new trap: 0xc00030e870 36 D0719 21:52:55.752428 445017 usertrap_amd64.go:225] [ 197( 190): 197( 190)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.753042 445017 task_exit.go:204] [ 197( 190): 197( 190)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.753332 445017 task_signals.go:204] [ 197( 190): 199( 192)] Signal 197, PID: 199, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.753328 445017 task_signals.go:204] [ 197( 190): 198( 191)] Signal 197, PID: 198, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.753366 445017 task_exit.go:204] [ 197( 190): 197( 190)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.753442 445017 task_exit.go:204] [ 197( 190): 199( 192)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.753590 445017 task_exit.go:204] [ 197( 190): 198( 191)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.754082 445017 task_exit.go:204] [ 197( 190): 198( 191)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.754173 445017 task_exit.go:204] [ 197( 190): 198( 191)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.757538 445017 task_exit.go:204] [ 197( 190): 199( 192)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.757621 445017 task_exit.go:204] [ 197( 190): 199( 192)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.757709 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:55.757989 445017 task_exit.go:204] [ 197( 190): 197( 190)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.764162 445017 usertrap_amd64.go:212] [ 200( 193): 200( 193)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:55.764245 445017 usertrap_amd64.go:122] [ 200( 193): 200( 193)] Allocate a new trap: 0xc000b12030 28 D0719 21:52:55.764575 445017 usertrap_amd64.go:225] [ 200( 193): 200( 193)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:55.767547 445017 usertrap_amd64.go:212] [ 200( 193): 200( 193)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:55.767642 445017 usertrap_amd64.go:122] [ 200( 193): 200( 193)] Allocate a new trap: 0xc000b12030 29 D0719 21:52:55.767752 445017 usertrap_amd64.go:225] [ 200( 193): 200( 193)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:55.768589 445017 usertrap_amd64.go:212] [ 200( 193): 200( 193)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:55.768676 445017 usertrap_amd64.go:122] [ 200( 193): 200( 193)] Allocate a new trap: 0xc000b12030 30 D0719 21:52:55.768768 445017 usertrap_amd64.go:225] [ 200( 193): 200( 193)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:55.775788 445017 usertrap_amd64.go:212] [ 200( 193): 200( 193)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:55.775985 445017 usertrap_amd64.go:122] [ 200( 193): 200( 193)] Allocate a new trap: 0xc000b12030 31 D0719 21:52:55.776124 445017 usertrap_amd64.go:225] [ 200( 193): 200( 193)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:55.776506 445017 usertrap_amd64.go:212] [ 200( 193): 200( 193)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:55.776568 445017 usertrap_amd64.go:122] [ 200( 193): 200( 193)] Allocate a new trap: 0xc000b12030 32 D0719 21:52:55.776735 445017 usertrap_amd64.go:225] [ 200( 193): 200( 193)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:55.777491 445017 usertrap_amd64.go:212] [ 200( 193): 200( 193)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:55.777622 445017 usertrap_amd64.go:122] [ 200( 193): 200( 193)] Allocate a new trap: 0xc000b12030 33 D0719 21:52:55.777813 445017 usertrap_amd64.go:225] [ 200( 193): 200( 193)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:55.778032 445017 usertrap_amd64.go:212] [ 200( 193): 201( 194)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:55.778102 445017 usertrap_amd64.go:122] [ 200( 193): 201( 194)] Allocate a new trap: 0xc000b12030 34 D0719 21:52:55.778197 445017 usertrap_amd64.go:225] [ 200( 193): 201( 194)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:55.784846 445017 usertrap_amd64.go:212] [ 200( 193): 200( 193)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:55.784922 445017 usertrap_amd64.go:122] [ 200( 193): 200( 193)] Allocate a new trap: 0xc000b12030 35 D0719 21:52:55.784987 445017 usertrap_amd64.go:225] [ 200( 193): 200( 193)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.787379 445017 usertrap_amd64.go:212] [ 200( 193): 200( 193)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.787466 445017 usertrap_amd64.go:122] [ 200( 193): 200( 193)] Allocate a new trap: 0xc000b12030 36 D0719 21:52:55.787552 445017 usertrap_amd64.go:225] [ 200( 193): 200( 193)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.788041 445017 task_exit.go:204] [ 200( 193): 200( 193)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.788305 445017 task_signals.go:204] [ 200( 193): 201( 194)] Signal 200, PID: 201, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.788426 445017 task_signals.go:204] [ 200( 193): 202( 195)] Signal 200, PID: 202, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.788436 445017 task_exit.go:204] [ 200( 193): 200( 193)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.788740 445017 task_exit.go:204] [ 200( 193): 201( 194)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.788870 445017 task_exit.go:204] [ 200( 193): 202( 195)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.789073 445017 task_exit.go:204] [ 200( 193): 201( 194)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.789123 445017 task_exit.go:204] [ 200( 193): 201( 194)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.791649 445017 task_exit.go:204] [ 200( 193): 202( 195)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.791710 445017 task_exit.go:204] [ 200( 193): 202( 195)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.791794 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:55.792826 445017 task_exit.go:204] [ 200( 193): 200( 193)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.799021 445017 usertrap_amd64.go:212] [ 203( 196): 203( 196)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:55.799085 445017 usertrap_amd64.go:122] [ 203( 196): 203( 196)] Allocate a new trap: 0xc000886300 28 D0719 21:52:55.799459 445017 usertrap_amd64.go:225] [ 203( 196): 203( 196)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:55.802651 445017 usertrap_amd64.go:212] [ 203( 196): 203( 196)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:55.802739 445017 usertrap_amd64.go:122] [ 203( 196): 203( 196)] Allocate a new trap: 0xc000886300 29 D0719 21:52:55.802802 445017 usertrap_amd64.go:225] [ 203( 196): 203( 196)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:55.803669 445017 usertrap_amd64.go:212] [ 203( 196): 203( 196)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:55.803748 445017 usertrap_amd64.go:122] [ 203( 196): 203( 196)] Allocate a new trap: 0xc000886300 30 D0719 21:52:55.803873 445017 usertrap_amd64.go:225] [ 203( 196): 203( 196)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:55.807998 445017 usertrap_amd64.go:212] [ 203( 196): 203( 196)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:55.808059 445017 usertrap_amd64.go:122] [ 203( 196): 203( 196)] Allocate a new trap: 0xc000886300 31 D0719 21:52:55.808156 445017 usertrap_amd64.go:225] [ 203( 196): 203( 196)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:55.808396 445017 usertrap_amd64.go:212] [ 203( 196): 203( 196)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:55.808480 445017 usertrap_amd64.go:122] [ 203( 196): 203( 196)] Allocate a new trap: 0xc000886300 32 D0719 21:52:55.808564 445017 usertrap_amd64.go:225] [ 203( 196): 203( 196)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:55.809168 445017 usertrap_amd64.go:212] [ 203( 196): 203( 196)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:55.809225 445017 usertrap_amd64.go:122] [ 203( 196): 203( 196)] Allocate a new trap: 0xc000886300 33 D0719 21:52:55.809311 445017 usertrap_amd64.go:225] [ 203( 196): 203( 196)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:55.809607 445017 usertrap_amd64.go:212] [ 203( 196): 204( 197)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:55.809685 445017 usertrap_amd64.go:122] [ 203( 196): 204( 197)] Allocate a new trap: 0xc000886300 34 D0719 21:52:55.809773 445017 usertrap_amd64.go:225] [ 203( 196): 204( 197)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:55.816909 445017 usertrap_amd64.go:212] [ 203( 196): 203( 196)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:55.816979 445017 usertrap_amd64.go:122] [ 203( 196): 203( 196)] Allocate a new trap: 0xc000886300 35 D0719 21:52:55.817047 445017 usertrap_amd64.go:225] [ 203( 196): 203( 196)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.819103 445017 usertrap_amd64.go:212] [ 203( 196): 203( 196)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.819164 445017 usertrap_amd64.go:122] [ 203( 196): 203( 196)] Allocate a new trap: 0xc000886300 36 D0719 21:52:55.819232 445017 usertrap_amd64.go:225] [ 203( 196): 203( 196)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.819916 445017 task_exit.go:204] [ 203( 196): 203( 196)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.820066 445017 task_signals.go:204] [ 203( 196): 205( 198)] Signal 203, PID: 205, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.820134 445017 task_signals.go:204] [ 203( 196): 204( 197)] Signal 203, PID: 204, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.820152 445017 task_exit.go:204] [ 203( 196): 203( 196)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.820299 445017 task_exit.go:204] [ 203( 196): 205( 198)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.820480 445017 task_exit.go:204] [ 203( 196): 205( 198)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.820529 445017 task_exit.go:204] [ 203( 196): 205( 198)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.820629 445017 task_exit.go:204] [ 203( 196): 204( 197)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.823815 445017 task_exit.go:204] [ 203( 196): 204( 197)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.823924 445017 task_exit.go:204] [ 203( 196): 204( 197)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.824013 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:55.824747 445017 task_exit.go:204] [ 203( 196): 203( 196)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.833794 445017 usertrap_amd64.go:212] [ 206( 199): 206( 199)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:55.833907 445017 usertrap_amd64.go:122] [ 206( 199): 206( 199)] Allocate a new trap: 0xc00037ea50 28 D0719 21:52:55.834446 445017 usertrap_amd64.go:225] [ 206( 199): 206( 199)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:55.838492 445017 usertrap_amd64.go:212] [ 206( 199): 206( 199)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:55.838578 445017 usertrap_amd64.go:122] [ 206( 199): 206( 199)] Allocate a new trap: 0xc00037ea50 29 D0719 21:52:55.838638 445017 usertrap_amd64.go:225] [ 206( 199): 206( 199)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:55.839826 445017 usertrap_amd64.go:212] [ 206( 199): 206( 199)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:55.839906 445017 usertrap_amd64.go:122] [ 206( 199): 206( 199)] Allocate a new trap: 0xc00037ea50 30 D0719 21:52:55.839992 445017 usertrap_amd64.go:225] [ 206( 199): 206( 199)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:55.843538 445017 usertrap_amd64.go:212] [ 206( 199): 206( 199)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:55.843595 445017 usertrap_amd64.go:122] [ 206( 199): 206( 199)] Allocate a new trap: 0xc00037ea50 31 D0719 21:52:55.843715 445017 usertrap_amd64.go:225] [ 206( 199): 206( 199)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:55.843939 445017 usertrap_amd64.go:212] [ 206( 199): 206( 199)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:55.843977 445017 usertrap_amd64.go:122] [ 206( 199): 206( 199)] Allocate a new trap: 0xc00037ea50 32 D0719 21:52:55.844020 445017 usertrap_amd64.go:225] [ 206( 199): 206( 199)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:55.844718 445017 usertrap_amd64.go:212] [ 206( 199): 206( 199)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:55.844794 445017 usertrap_amd64.go:122] [ 206( 199): 206( 199)] Allocate a new trap: 0xc00037ea50 33 D0719 21:52:55.844876 445017 usertrap_amd64.go:225] [ 206( 199): 206( 199)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:55.845016 445017 usertrap_amd64.go:212] [ 206( 199): 207( 200)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:55.845082 445017 usertrap_amd64.go:122] [ 206( 199): 207( 200)] Allocate a new trap: 0xc00037ea50 34 D0719 21:52:55.845151 445017 usertrap_amd64.go:225] [ 206( 199): 207( 200)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:55.851675 445017 usertrap_amd64.go:212] [ 206( 199): 206( 199)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:55.851736 445017 usertrap_amd64.go:122] [ 206( 199): 206( 199)] Allocate a new trap: 0xc00037ea50 35 D0719 21:52:55.851814 445017 usertrap_amd64.go:225] [ 206( 199): 206( 199)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.853603 445017 usertrap_amd64.go:212] [ 206( 199): 206( 199)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.853650 445017 usertrap_amd64.go:122] [ 206( 199): 206( 199)] Allocate a new trap: 0xc00037ea50 36 D0719 21:52:55.853712 445017 usertrap_amd64.go:225] [ 206( 199): 206( 199)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.854089 445017 task_exit.go:204] [ 206( 199): 206( 199)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.854299 445017 task_signals.go:204] [ 206( 199): 207( 200)] Signal 206, PID: 207, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.854299 445017 task_signals.go:204] [ 206( 199): 208( 201)] Signal 206, PID: 208, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.854347 445017 task_exit.go:204] [ 206( 199): 206( 199)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.854564 445017 task_exit.go:204] [ 206( 199): 207( 200)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.854683 445017 task_exit.go:204] [ 206( 199): 208( 201)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.855041 445017 task_exit.go:204] [ 206( 199): 208( 201)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.855089 445017 task_exit.go:204] [ 206( 199): 208( 201)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.858441 445017 task_exit.go:204] [ 206( 199): 207( 200)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.858500 445017 task_exit.go:204] [ 206( 199): 207( 200)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.858579 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:55.858721 445017 task_exit.go:204] [ 206( 199): 206( 199)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.867023 445017 usertrap_amd64.go:212] [ 209( 202): 209( 202)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:55.867110 445017 usertrap_amd64.go:122] [ 209( 202): 209( 202)] Allocate a new trap: 0xc00037eb10 28 D0719 21:52:55.867487 445017 usertrap_amd64.go:225] [ 209( 202): 209( 202)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:55.870596 445017 usertrap_amd64.go:212] [ 209( 202): 209( 202)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:55.870672 445017 usertrap_amd64.go:122] [ 209( 202): 209( 202)] Allocate a new trap: 0xc00037eb10 29 D0719 21:52:55.870750 445017 usertrap_amd64.go:225] [ 209( 202): 209( 202)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:55.871483 445017 usertrap_amd64.go:212] [ 209( 202): 209( 202)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:55.871529 445017 usertrap_amd64.go:122] [ 209( 202): 209( 202)] Allocate a new trap: 0xc00037eb10 30 D0719 21:52:55.871653 445017 usertrap_amd64.go:225] [ 209( 202): 209( 202)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:55.875495 445017 usertrap_amd64.go:212] [ 209( 202): 209( 202)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:55.875560 445017 usertrap_amd64.go:122] [ 209( 202): 209( 202)] Allocate a new trap: 0xc00037eb10 31 D0719 21:52:55.875669 445017 usertrap_amd64.go:225] [ 209( 202): 209( 202)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:55.875918 445017 usertrap_amd64.go:212] [ 209( 202): 209( 202)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:55.875963 445017 usertrap_amd64.go:122] [ 209( 202): 209( 202)] Allocate a new trap: 0xc00037eb10 32 D0719 21:52:55.876015 445017 usertrap_amd64.go:225] [ 209( 202): 209( 202)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:55.876511 445017 usertrap_amd64.go:212] [ 209( 202): 209( 202)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:55.876563 445017 usertrap_amd64.go:122] [ 209( 202): 209( 202)] Allocate a new trap: 0xc00037eb10 33 D0719 21:52:55.876624 445017 usertrap_amd64.go:225] [ 209( 202): 209( 202)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:55.877070 445017 usertrap_amd64.go:212] [ 209( 202): 210( 203)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:55.877129 445017 usertrap_amd64.go:122] [ 209( 202): 210( 203)] Allocate a new trap: 0xc00037eb10 34 D0719 21:52:55.877242 445017 usertrap_amd64.go:225] [ 209( 202): 210( 203)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:55.883491 445017 usertrap_amd64.go:212] [ 209( 202): 209( 202)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:55.883561 445017 usertrap_amd64.go:122] [ 209( 202): 209( 202)] Allocate a new trap: 0xc00037eb10 35 D0719 21:52:55.883650 445017 usertrap_amd64.go:225] [ 209( 202): 209( 202)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.885546 445017 usertrap_amd64.go:212] [ 209( 202): 209( 202)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.885628 445017 usertrap_amd64.go:122] [ 209( 202): 209( 202)] Allocate a new trap: 0xc00037eb10 36 D0719 21:52:55.885711 445017 usertrap_amd64.go:225] [ 209( 202): 209( 202)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.886212 445017 task_exit.go:204] [ 209( 202): 209( 202)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.886378 445017 task_signals.go:204] [ 209( 202): 210( 203)] Signal 209, PID: 210, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.886474 445017 task_signals.go:204] [ 209( 202): 211( 204)] Signal 209, PID: 211, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.886560 445017 task_exit.go:204] [ 209( 202): 211( 204)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.886687 445017 task_exit.go:204] [ 209( 202): 210( 203)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.886946 445017 task_exit.go:204] [ 209( 202): 209( 202)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.887262 445017 task_exit.go:204] [ 209( 202): 210( 203)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.887316 445017 task_exit.go:204] [ 209( 202): 210( 203)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.906163 445017 task_exit.go:204] [ 209( 202): 211( 204)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.906310 445017 task_exit.go:204] [ 209( 202): 211( 204)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.906404 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:55.907835 445017 task_exit.go:204] [ 209( 202): 209( 202)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.919793 445017 usertrap_amd64.go:212] [ 212( 205): 212( 205)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:55.919898 445017 usertrap_amd64.go:122] [ 212( 205): 212( 205)] Allocate a new trap: 0xc000bfa090 28 D0719 21:52:55.920461 445017 usertrap_amd64.go:225] [ 212( 205): 212( 205)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:55.924625 445017 usertrap_amd64.go:212] [ 212( 205): 212( 205)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:55.924690 445017 usertrap_amd64.go:122] [ 212( 205): 212( 205)] Allocate a new trap: 0xc000bfa090 29 D0719 21:52:55.924799 445017 usertrap_amd64.go:225] [ 212( 205): 212( 205)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:55.925811 445017 usertrap_amd64.go:212] [ 212( 205): 212( 205)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:55.925894 445017 usertrap_amd64.go:122] [ 212( 205): 212( 205)] Allocate a new trap: 0xc000bfa090 30 D0719 21:52:55.925995 445017 usertrap_amd64.go:225] [ 212( 205): 212( 205)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:55.931986 445017 usertrap_amd64.go:212] [ 212( 205): 212( 205)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:55.932099 445017 usertrap_amd64.go:122] [ 212( 205): 212( 205)] Allocate a new trap: 0xc000bfa090 31 D0719 21:52:55.932176 445017 usertrap_amd64.go:225] [ 212( 205): 212( 205)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:55.932898 445017 usertrap_amd64.go:212] [ 212( 205): 212( 205)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:55.932961 445017 usertrap_amd64.go:122] [ 212( 205): 212( 205)] Allocate a new trap: 0xc000bfa090 32 D0719 21:52:55.933062 445017 usertrap_amd64.go:225] [ 212( 205): 212( 205)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:55.933743 445017 usertrap_amd64.go:212] [ 212( 205): 212( 205)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:55.933815 445017 usertrap_amd64.go:122] [ 212( 205): 212( 205)] Allocate a new trap: 0xc000bfa090 33 D0719 21:52:55.933881 445017 usertrap_amd64.go:225] [ 212( 205): 212( 205)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:55.934055 445017 usertrap_amd64.go:212] [ 212( 205): 213( 206)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:55.934121 445017 usertrap_amd64.go:122] [ 212( 205): 213( 206)] Allocate a new trap: 0xc000bfa090 34 D0719 21:52:55.934184 445017 usertrap_amd64.go:225] [ 212( 205): 213( 206)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:55.947526 445017 usertrap_amd64.go:212] [ 212( 205): 212( 205)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:55.947596 445017 usertrap_amd64.go:122] [ 212( 205): 212( 205)] Allocate a new trap: 0xc000bfa090 35 D0719 21:52:55.947728 445017 usertrap_amd64.go:225] [ 212( 205): 212( 205)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.950671 445017 usertrap_amd64.go:212] [ 212( 205): 212( 205)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.950772 445017 usertrap_amd64.go:122] [ 212( 205): 212( 205)] Allocate a new trap: 0xc000bfa090 36 D0719 21:52:55.950886 445017 usertrap_amd64.go:225] [ 212( 205): 212( 205)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.951410 445017 task_exit.go:204] [ 212( 205): 212( 205)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.951574 445017 task_signals.go:204] [ 212( 205): 214( 207)] Signal 212, PID: 214, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.951732 445017 task_exit.go:204] [ 212( 205): 214( 207)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.951747 445017 task_signals.go:204] [ 212( 205): 213( 206)] Signal 212, PID: 213, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:55.951963 445017 task_exit.go:204] [ 212( 205): 213( 206)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:55.952233 445017 task_exit.go:204] [ 212( 205): 212( 205)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.952421 445017 task_exit.go:204] [ 212( 205): 214( 207)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.952531 445017 task_exit.go:204] [ 212( 205): 214( 207)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.955173 445017 task_exit.go:204] [ 212( 205): 213( 206)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:55.955233 445017 task_exit.go:204] [ 212( 205): 213( 206)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.955318 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:55.955592 445017 task_exit.go:204] [ 212( 205): 212( 205)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:55.969185 445017 usertrap_amd64.go:212] [ 215( 208): 215( 208)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:55.969318 445017 usertrap_amd64.go:122] [ 215( 208): 215( 208)] Allocate a new trap: 0xc000bfa120 28 D0719 21:52:55.969966 445017 usertrap_amd64.go:225] [ 215( 208): 215( 208)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:55.973603 445017 usertrap_amd64.go:212] [ 215( 208): 215( 208)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:55.973696 445017 usertrap_amd64.go:122] [ 215( 208): 215( 208)] Allocate a new trap: 0xc000bfa120 29 D0719 21:52:55.973784 445017 usertrap_amd64.go:225] [ 215( 208): 215( 208)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:55.974830 445017 usertrap_amd64.go:212] [ 215( 208): 215( 208)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:55.974895 445017 usertrap_amd64.go:122] [ 215( 208): 215( 208)] Allocate a new trap: 0xc000bfa120 30 D0719 21:52:55.974985 445017 usertrap_amd64.go:225] [ 215( 208): 215( 208)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:55.978955 445017 usertrap_amd64.go:212] [ 215( 208): 215( 208)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:55.979032 445017 usertrap_amd64.go:122] [ 215( 208): 215( 208)] Allocate a new trap: 0xc000bfa120 31 D0719 21:52:55.979128 445017 usertrap_amd64.go:225] [ 215( 208): 215( 208)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:55.979407 445017 usertrap_amd64.go:212] [ 215( 208): 215( 208)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:55.979462 445017 usertrap_amd64.go:122] [ 215( 208): 215( 208)] Allocate a new trap: 0xc000bfa120 32 D0719 21:52:55.979516 445017 usertrap_amd64.go:225] [ 215( 208): 215( 208)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:55.980239 445017 usertrap_amd64.go:212] [ 215( 208): 215( 208)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:55.980298 445017 usertrap_amd64.go:122] [ 215( 208): 215( 208)] Allocate a new trap: 0xc000bfa120 33 D0719 21:52:55.980371 445017 usertrap_amd64.go:225] [ 215( 208): 215( 208)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:55.983456 445017 usertrap_amd64.go:212] [ 215( 208): 216( 209)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:55.983577 445017 usertrap_amd64.go:122] [ 215( 208): 216( 209)] Allocate a new trap: 0xc000bfa120 34 D0719 21:52:55.983843 445017 usertrap_amd64.go:225] [ 215( 208): 216( 209)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:55.996164 445017 usertrap_amd64.go:212] [ 215( 208): 215( 208)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:55.996289 445017 usertrap_amd64.go:122] [ 215( 208): 215( 208)] Allocate a new trap: 0xc000bfa120 35 D0719 21:52:55.996375 445017 usertrap_amd64.go:225] [ 215( 208): 215( 208)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:55.999363 445017 usertrap_amd64.go:212] [ 215( 208): 215( 208)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:55.999444 445017 usertrap_amd64.go:122] [ 215( 208): 215( 208)] Allocate a new trap: 0xc000bfa120 36 D0719 21:52:55.999508 445017 usertrap_amd64.go:225] [ 215( 208): 215( 208)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:55.999995 445017 task_exit.go:204] [ 215( 208): 215( 208)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.000225 445017 task_exit.go:204] [ 215( 208): 215( 208)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.000394 445017 task_signals.go:204] [ 215( 208): 217( 210)] Signal 215, PID: 217, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.000492 445017 task_exit.go:204] [ 215( 208): 217( 210)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.000697 445017 task_exit.go:204] [ 215( 208): 217( 210)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.000696 445017 task_signals.go:204] [ 215( 208): 216( 209)] Signal 215, PID: 216, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.000750 445017 task_exit.go:204] [ 215( 208): 217( 210)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.001005 445017 task_exit.go:204] [ 215( 208): 216( 209)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.004577 445017 task_exit.go:204] [ 215( 208): 216( 209)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.004656 445017 task_exit.go:204] [ 215( 208): 216( 209)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.004742 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.004851 445017 task_exit.go:204] [ 215( 208): 215( 208)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.011791 445017 usertrap_amd64.go:212] [ 218( 211): 218( 211)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.011892 445017 usertrap_amd64.go:122] [ 218( 211): 218( 211)] Allocate a new trap: 0xc000a682d0 28 D0719 21:52:56.012287 445017 usertrap_amd64.go:225] [ 218( 211): 218( 211)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.015973 445017 usertrap_amd64.go:212] [ 218( 211): 218( 211)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.016055 445017 usertrap_amd64.go:122] [ 218( 211): 218( 211)] Allocate a new trap: 0xc000a682d0 29 D0719 21:52:56.016122 445017 usertrap_amd64.go:225] [ 218( 211): 218( 211)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.018045 445017 usertrap_amd64.go:212] [ 218( 211): 218( 211)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.018128 445017 usertrap_amd64.go:122] [ 218( 211): 218( 211)] Allocate a new trap: 0xc000a682d0 30 D0719 21:52:56.018196 445017 usertrap_amd64.go:225] [ 218( 211): 218( 211)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.023082 445017 usertrap_amd64.go:212] [ 218( 211): 218( 211)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.023146 445017 usertrap_amd64.go:122] [ 218( 211): 218( 211)] Allocate a new trap: 0xc000a682d0 31 D0719 21:52:56.023194 445017 usertrap_amd64.go:225] [ 218( 211): 218( 211)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.023522 445017 usertrap_amd64.go:212] [ 218( 211): 218( 211)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.023675 445017 usertrap_amd64.go:122] [ 218( 211): 218( 211)] Allocate a new trap: 0xc000a682d0 32 D0719 21:52:56.023787 445017 usertrap_amd64.go:225] [ 218( 211): 218( 211)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.024425 445017 usertrap_amd64.go:212] [ 218( 211): 218( 211)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.024477 445017 usertrap_amd64.go:122] [ 218( 211): 218( 211)] Allocate a new trap: 0xc000a682d0 33 D0719 21:52:56.024596 445017 usertrap_amd64.go:225] [ 218( 211): 218( 211)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.025074 445017 usertrap_amd64.go:212] [ 218( 211): 219( 212)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:56.025128 445017 usertrap_amd64.go:122] [ 218( 211): 219( 212)] Allocate a new trap: 0xc000a682d0 34 D0719 21:52:56.025345 445017 usertrap_amd64.go:225] [ 218( 211): 219( 212)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:56.031837 445017 usertrap_amd64.go:212] [ 218( 211): 218( 211)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:56.031910 445017 usertrap_amd64.go:122] [ 218( 211): 218( 211)] Allocate a new trap: 0xc000a682d0 35 D0719 21:52:56.031996 445017 usertrap_amd64.go:225] [ 218( 211): 218( 211)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:56.035923 445017 usertrap_amd64.go:212] [ 218( 211): 218( 211)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:56.035992 445017 usertrap_amd64.go:122] [ 218( 211): 218( 211)] Allocate a new trap: 0xc000a682d0 36 D0719 21:52:56.036055 445017 usertrap_amd64.go:225] [ 218( 211): 218( 211)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:56.038019 445017 task_exit.go:204] [ 218( 211): 218( 211)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.038213 445017 task_signals.go:204] [ 218( 211): 220( 213)] Signal 218, PID: 220, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.038341 445017 task_exit.go:204] [ 218( 211): 218( 211)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.038432 445017 task_exit.go:204] [ 218( 211): 220( 213)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.038590 445017 task_signals.go:204] [ 218( 211): 219( 212)] Signal 218, PID: 219, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.038744 445017 task_exit.go:204] [ 218( 211): 219( 212)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.038830 445017 task_exit.go:204] [ 218( 211): 220( 213)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.038895 445017 task_exit.go:204] [ 218( 211): 220( 213)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.042296 445017 task_exit.go:204] [ 218( 211): 219( 212)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.042375 445017 task_exit.go:204] [ 218( 211): 219( 212)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.042456 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.042957 445017 task_exit.go:204] [ 218( 211): 218( 211)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.050787 445017 usertrap_amd64.go:212] [ 221( 214): 221( 214)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.050880 445017 usertrap_amd64.go:122] [ 221( 214): 221( 214)] Allocate a new trap: 0xc00037ec00 28 D0719 21:52:56.051321 445017 usertrap_amd64.go:225] [ 221( 214): 221( 214)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.056002 445017 usertrap_amd64.go:212] [ 221( 214): 221( 214)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.056066 445017 usertrap_amd64.go:122] [ 221( 214): 221( 214)] Allocate a new trap: 0xc00037ec00 29 D0719 21:52:56.056134 445017 usertrap_amd64.go:225] [ 221( 214): 221( 214)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.057256 445017 usertrap_amd64.go:212] [ 221( 214): 221( 214)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.057309 445017 usertrap_amd64.go:122] [ 221( 214): 221( 214)] Allocate a new trap: 0xc00037ec00 30 D0719 21:52:56.057394 445017 usertrap_amd64.go:225] [ 221( 214): 221( 214)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.061325 445017 usertrap_amd64.go:212] [ 221( 214): 221( 214)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.061391 445017 usertrap_amd64.go:122] [ 221( 214): 221( 214)] Allocate a new trap: 0xc00037ec00 31 D0719 21:52:56.061454 445017 usertrap_amd64.go:225] [ 221( 214): 221( 214)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.062492 445017 usertrap_amd64.go:212] [ 221( 214): 221( 214)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.062547 445017 usertrap_amd64.go:122] [ 221( 214): 221( 214)] Allocate a new trap: 0xc00037ec00 32 D0719 21:52:56.062632 445017 usertrap_amd64.go:225] [ 221( 214): 221( 214)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.063146 445017 usertrap_amd64.go:212] [ 221( 214): 221( 214)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.063200 445017 usertrap_amd64.go:122] [ 221( 214): 221( 214)] Allocate a new trap: 0xc00037ec00 33 D0719 21:52:56.063265 445017 usertrap_amd64.go:225] [ 221( 214): 221( 214)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.063452 445017 usertrap_amd64.go:212] [ 221( 214): 222( 215)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:56.063517 445017 usertrap_amd64.go:122] [ 221( 214): 222( 215)] Allocate a new trap: 0xc00037ec00 34 D0719 21:52:56.063598 445017 usertrap_amd64.go:225] [ 221( 214): 222( 215)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:56.070085 445017 usertrap_amd64.go:212] [ 221( 214): 221( 214)] Found the pattern at ip 558eff7e0efe:sysno 230 D0719 21:52:56.070145 445017 usertrap_amd64.go:122] [ 221( 214): 221( 214)] Allocate a new trap: 0xc00037ec00 35 D0719 21:52:56.070213 445017 usertrap_amd64.go:225] [ 221( 214): 221( 214)] Apply the binary patch addr 558eff7e0efe trap addr 62af0 ([184 230 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:56.073948 445017 usertrap_amd64.go:212] [ 221( 214): 221( 214)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:56.074005 445017 usertrap_amd64.go:122] [ 221( 214): 221( 214)] Allocate a new trap: 0xc00037ec00 36 D0719 21:52:56.074104 445017 usertrap_amd64.go:225] [ 221( 214): 221( 214)] Apply the binary patch addr 558eff7a58a3 trap addr 62b40 ([184 3 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0719 21:52:56.077656 445017 usertrap_amd64.go:212] [ 221( 214): 221( 214)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:56.077751 445017 usertrap_amd64.go:122] [ 221( 214): 221( 214)] Allocate a new trap: 0xc00037ec00 37 D0719 21:52:56.077878 445017 usertrap_amd64.go:225] [ 221( 214): 221( 214)] Apply the binary patch addr 558eff7a57e8 trap addr 62b90 ([184 1 0 0 0 15 5] -> [255 36 37 144 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:56.078689 445017 task_exit.go:204] [ 221( 214): 221( 214)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.078941 445017 task_signals.go:204] [ 221( 214): 222( 215)] Signal 221, PID: 222, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.079004 445017 task_signals.go:204] [ 221( 214): 223( 216)] Signal 221, PID: 223, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.078997 445017 task_exit.go:204] [ 221( 214): 221( 214)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.079253 445017 task_exit.go:204] [ 221( 214): 223( 216)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.079455 445017 task_exit.go:204] [ 221( 214): 223( 216)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.079502 445017 task_exit.go:204] [ 221( 214): 223( 216)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.079741 445017 task_exit.go:204] [ 221( 214): 222( 215)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.083143 445017 task_exit.go:204] [ 221( 214): 222( 215)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.083197 445017 task_exit.go:204] [ 221( 214): 222( 215)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.083442 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.083599 445017 task_exit.go:204] [ 221( 214): 221( 214)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.091336 445017 usertrap_amd64.go:212] [ 224( 217): 224( 217)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.091440 445017 usertrap_amd64.go:122] [ 224( 217): 224( 217)] Allocate a new trap: 0xc000886570 28 D0719 21:52:56.091936 445017 usertrap_amd64.go:225] [ 224( 217): 224( 217)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.097157 445017 usertrap_amd64.go:212] [ 224( 217): 224( 217)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.097234 445017 usertrap_amd64.go:122] [ 224( 217): 224( 217)] Allocate a new trap: 0xc000886570 29 D0719 21:52:56.097304 445017 usertrap_amd64.go:225] [ 224( 217): 224( 217)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.099002 445017 usertrap_amd64.go:212] [ 224( 217): 224( 217)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.099094 445017 usertrap_amd64.go:122] [ 224( 217): 224( 217)] Allocate a new trap: 0xc000886570 30 D0719 21:52:56.099165 445017 usertrap_amd64.go:225] [ 224( 217): 224( 217)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.104583 445017 usertrap_amd64.go:212] [ 224( 217): 224( 217)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.104660 445017 usertrap_amd64.go:122] [ 224( 217): 224( 217)] Allocate a new trap: 0xc000886570 31 D0719 21:52:56.104839 445017 usertrap_amd64.go:225] [ 224( 217): 224( 217)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.105333 445017 usertrap_amd64.go:212] [ 224( 217): 224( 217)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.105411 445017 usertrap_amd64.go:122] [ 224( 217): 224( 217)] Allocate a new trap: 0xc000886570 32 D0719 21:52:56.105602 445017 usertrap_amd64.go:225] [ 224( 217): 224( 217)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.106326 445017 usertrap_amd64.go:212] [ 224( 217): 224( 217)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.106472 445017 usertrap_amd64.go:122] [ 224( 217): 224( 217)] Allocate a new trap: 0xc000886570 33 D0719 21:52:56.106584 445017 usertrap_amd64.go:225] [ 224( 217): 224( 217)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.106865 445017 usertrap_amd64.go:212] [ 224( 217): 225( 218)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:56.106953 445017 usertrap_amd64.go:122] [ 224( 217): 225( 218)] Allocate a new trap: 0xc000886570 34 D0719 21:52:56.107072 445017 usertrap_amd64.go:225] [ 224( 217): 225( 218)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:56.114333 445017 usertrap_amd64.go:212] [ 224( 217): 224( 217)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:56.114419 445017 usertrap_amd64.go:122] [ 224( 217): 224( 217)] Allocate a new trap: 0xc000886570 35 D0719 21:52:56.114513 445017 usertrap_amd64.go:225] [ 224( 217): 224( 217)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:56.121076 445017 usertrap_amd64.go:212] [ 224( 217): 224( 217)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:56.121154 445017 usertrap_amd64.go:122] [ 224( 217): 224( 217)] Allocate a new trap: 0xc000886570 36 D0719 21:52:56.121260 445017 usertrap_amd64.go:225] [ 224( 217): 224( 217)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:56.121872 445017 task_exit.go:204] [ 224( 217): 224( 217)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.122082 445017 task_signals.go:204] [ 224( 217): 225( 218)] Signal 224, PID: 225, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.122071 445017 task_signals.go:204] [ 224( 217): 226( 219)] Signal 224, PID: 226, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.122188 445017 task_exit.go:204] [ 224( 217): 226( 219)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.122459 445017 task_exit.go:204] [ 224( 217): 225( 218)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.122662 445017 task_exit.go:204] [ 224( 217): 224( 217)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.122785 445017 task_exit.go:204] [ 224( 217): 226( 219)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.122852 445017 task_exit.go:204] [ 224( 217): 226( 219)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.125794 445017 task_exit.go:204] [ 224( 217): 225( 218)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.125870 445017 task_exit.go:204] [ 224( 217): 225( 218)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.125975 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.126899 445017 task_exit.go:204] [ 224( 217): 224( 217)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.133870 445017 usertrap_amd64.go:212] [ 227( 220): 227( 220)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.133964 445017 usertrap_amd64.go:122] [ 227( 220): 227( 220)] Allocate a new trap: 0xc000886690 28 D0719 21:52:56.134475 445017 usertrap_amd64.go:225] [ 227( 220): 227( 220)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.138598 445017 usertrap_amd64.go:212] [ 227( 220): 227( 220)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.138681 445017 usertrap_amd64.go:122] [ 227( 220): 227( 220)] Allocate a new trap: 0xc000886690 29 D0719 21:52:56.138745 445017 usertrap_amd64.go:225] [ 227( 220): 227( 220)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.140154 445017 usertrap_amd64.go:212] [ 227( 220): 227( 220)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.140280 445017 usertrap_amd64.go:122] [ 227( 220): 227( 220)] Allocate a new trap: 0xc000886690 30 D0719 21:52:56.140393 445017 usertrap_amd64.go:225] [ 227( 220): 227( 220)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.144864 445017 usertrap_amd64.go:212] [ 227( 220): 227( 220)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.144917 445017 usertrap_amd64.go:122] [ 227( 220): 227( 220)] Allocate a new trap: 0xc000886690 31 D0719 21:52:56.144985 445017 usertrap_amd64.go:225] [ 227( 220): 227( 220)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.145254 445017 usertrap_amd64.go:212] [ 227( 220): 227( 220)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.145371 445017 usertrap_amd64.go:122] [ 227( 220): 227( 220)] Allocate a new trap: 0xc000886690 32 D0719 21:52:56.145507 445017 usertrap_amd64.go:225] [ 227( 220): 227( 220)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.146017 445017 usertrap_amd64.go:212] [ 227( 220): 227( 220)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.146072 445017 usertrap_amd64.go:122] [ 227( 220): 227( 220)] Allocate a new trap: 0xc000886690 33 D0719 21:52:56.146138 445017 usertrap_amd64.go:225] [ 227( 220): 227( 220)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.147465 445017 usertrap_amd64.go:212] [ 227( 220): 228( 221)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:56.147549 445017 usertrap_amd64.go:122] [ 227( 220): 228( 221)] Allocate a new trap: 0xc000886690 34 D0719 21:52:56.147655 445017 usertrap_amd64.go:225] [ 227( 220): 228( 221)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:56.154340 445017 usertrap_amd64.go:212] [ 227( 220): 227( 220)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:56.154469 445017 usertrap_amd64.go:122] [ 227( 220): 227( 220)] Allocate a new trap: 0xc000886690 35 D0719 21:52:56.154554 445017 usertrap_amd64.go:225] [ 227( 220): 227( 220)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:56.156797 445017 usertrap_amd64.go:212] [ 227( 220): 227( 220)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:56.156868 445017 usertrap_amd64.go:122] [ 227( 220): 227( 220)] Allocate a new trap: 0xc000886690 36 D0719 21:52:56.156942 445017 usertrap_amd64.go:225] [ 227( 220): 227( 220)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:56.157796 445017 task_exit.go:204] [ 227( 220): 227( 220)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.158061 445017 task_signals.go:204] [ 227( 220): 229( 222)] Signal 227, PID: 229, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.158028 445017 task_signals.go:204] [ 227( 220): 228( 221)] Signal 227, PID: 228, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.158172 445017 task_exit.go:204] [ 227( 220): 228( 221)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.158407 445017 task_exit.go:204] [ 227( 220): 228( 221)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.158478 445017 task_exit.go:204] [ 227( 220): 228( 221)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.158617 445017 task_exit.go:204] [ 227( 220): 227( 220)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.158745 445017 task_exit.go:204] [ 227( 220): 229( 222)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.161885 445017 task_exit.go:204] [ 227( 220): 229( 222)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.161958 445017 task_exit.go:204] [ 227( 220): 229( 222)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.162060 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.162577 445017 task_exit.go:204] [ 227( 220): 227( 220)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.170043 445017 usertrap_amd64.go:212] [ 230( 223): 230( 223)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.170158 445017 usertrap_amd64.go:122] [ 230( 223): 230( 223)] Allocate a new trap: 0xc000a68420 28 D0719 21:52:56.170653 445017 usertrap_amd64.go:225] [ 230( 223): 230( 223)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.177310 445017 usertrap_amd64.go:212] [ 230( 223): 230( 223)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.177406 445017 usertrap_amd64.go:122] [ 230( 223): 230( 223)] Allocate a new trap: 0xc000a68420 29 D0719 21:52:56.177479 445017 usertrap_amd64.go:225] [ 230( 223): 230( 223)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.184401 445017 usertrap_amd64.go:212] [ 230( 223): 230( 223)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.184472 445017 usertrap_amd64.go:122] [ 230( 223): 230( 223)] Allocate a new trap: 0xc000a68420 30 D0719 21:52:56.184546 445017 usertrap_amd64.go:225] [ 230( 223): 230( 223)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.190937 445017 usertrap_amd64.go:212] [ 230( 223): 230( 223)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.191029 445017 usertrap_amd64.go:122] [ 230( 223): 230( 223)] Allocate a new trap: 0xc000a68420 31 D0719 21:52:56.191117 445017 usertrap_amd64.go:225] [ 230( 223): 230( 223)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.191379 445017 usertrap_amd64.go:212] [ 230( 223): 230( 223)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.191431 445017 usertrap_amd64.go:122] [ 230( 223): 230( 223)] Allocate a new trap: 0xc000a68420 32 D0719 21:52:56.191488 445017 usertrap_amd64.go:225] [ 230( 223): 230( 223)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.192898 445017 usertrap_amd64.go:212] [ 230( 223): 230( 223)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.192997 445017 usertrap_amd64.go:122] [ 230( 223): 230( 223)] Allocate a new trap: 0xc000a68420 33 D0719 21:52:56.193089 445017 usertrap_amd64.go:225] [ 230( 223): 230( 223)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.193682 445017 usertrap_amd64.go:212] [ 230( 223): 231( 224)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:56.193770 445017 usertrap_amd64.go:122] [ 230( 223): 231( 224)] Allocate a new trap: 0xc000a68420 34 D0719 21:52:56.193930 445017 usertrap_amd64.go:225] [ 230( 223): 231( 224)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:56.203848 445017 usertrap_amd64.go:212] [ 230( 223): 230( 223)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:56.203909 445017 usertrap_amd64.go:122] [ 230( 223): 230( 223)] Allocate a new trap: 0xc000a68420 35 D0719 21:52:56.203962 445017 usertrap_amd64.go:225] [ 230( 223): 230( 223)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:56.208629 445017 usertrap_amd64.go:212] [ 230( 223): 230( 223)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:56.208778 445017 usertrap_amd64.go:122] [ 230( 223): 230( 223)] Allocate a new trap: 0xc000a68420 36 D0719 21:52:56.208878 445017 usertrap_amd64.go:225] [ 230( 223): 230( 223)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:56.214102 445017 task_exit.go:204] [ 230( 223): 230( 223)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.214476 445017 task_exit.go:204] [ 230( 223): 230( 223)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.214761 445017 task_signals.go:204] [ 230( 223): 231( 224)] Signal 230, PID: 231, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.214871 445017 task_exit.go:204] [ 230( 223): 231( 224)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.214766 445017 task_signals.go:204] [ 230( 223): 232( 225)] Signal 230, PID: 232, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.215078 445017 task_exit.go:204] [ 230( 223): 232( 225)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.215289 445017 task_exit.go:204] [ 230( 223): 231( 224)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.215353 445017 task_exit.go:204] [ 230( 223): 231( 224)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.218648 445017 task_exit.go:204] [ 230( 223): 232( 225)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.218877 445017 task_exit.go:204] [ 230( 223): 232( 225)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.218987 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.219123 445017 task_exit.go:204] [ 230( 223): 230( 223)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.227109 445017 usertrap_amd64.go:212] [ 233( 226): 233( 226)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.227220 445017 usertrap_amd64.go:122] [ 233( 226): 233( 226)] Allocate a new trap: 0xc000a684b0 28 D0719 21:52:56.227840 445017 usertrap_amd64.go:225] [ 233( 226): 233( 226)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.237426 445017 usertrap_amd64.go:212] [ 233( 226): 233( 226)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.237632 445017 usertrap_amd64.go:122] [ 233( 226): 233( 226)] Allocate a new trap: 0xc000a684b0 29 D0719 21:52:56.237732 445017 usertrap_amd64.go:225] [ 233( 226): 233( 226)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.239300 445017 usertrap_amd64.go:212] [ 233( 226): 233( 226)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.239385 445017 usertrap_amd64.go:122] [ 233( 226): 233( 226)] Allocate a new trap: 0xc000a684b0 30 D0719 21:52:56.239461 445017 usertrap_amd64.go:225] [ 233( 226): 233( 226)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.243720 445017 usertrap_amd64.go:212] [ 233( 226): 233( 226)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.244050 445017 usertrap_amd64.go:122] [ 233( 226): 233( 226)] Allocate a new trap: 0xc000a684b0 31 D0719 21:52:56.244160 445017 usertrap_amd64.go:225] [ 233( 226): 233( 226)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.244420 445017 usertrap_amd64.go:212] [ 233( 226): 233( 226)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.244473 445017 usertrap_amd64.go:122] [ 233( 226): 233( 226)] Allocate a new trap: 0xc000a684b0 32 D0719 21:52:56.244548 445017 usertrap_amd64.go:225] [ 233( 226): 233( 226)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.245443 445017 usertrap_amd64.go:212] [ 233( 226): 233( 226)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.245498 445017 usertrap_amd64.go:122] [ 233( 226): 233( 226)] Allocate a new trap: 0xc000a684b0 33 D0719 21:52:56.245592 445017 usertrap_amd64.go:225] [ 233( 226): 233( 226)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.246036 445017 usertrap_amd64.go:212] [ 233( 226): 234( 227)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:56.246111 445017 usertrap_amd64.go:122] [ 233( 226): 234( 227)] Allocate a new trap: 0xc000a684b0 34 D0719 21:52:56.246463 445017 usertrap_amd64.go:225] [ 233( 226): 234( 227)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:56.255565 445017 usertrap_amd64.go:212] [ 233( 226): 233( 226)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:56.255705 445017 usertrap_amd64.go:122] [ 233( 226): 233( 226)] Allocate a new trap: 0xc000a684b0 35 D0719 21:52:56.255776 445017 usertrap_amd64.go:225] [ 233( 226): 233( 226)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:56.258006 445017 usertrap_amd64.go:212] [ 233( 226): 233( 226)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:56.258076 445017 usertrap_amd64.go:122] [ 233( 226): 233( 226)] Allocate a new trap: 0xc000a684b0 36 D0719 21:52:56.258159 445017 usertrap_amd64.go:225] [ 233( 226): 233( 226)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:56.258690 445017 task_exit.go:204] [ 233( 226): 233( 226)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.258866 445017 task_signals.go:204] [ 233( 226): 234( 227)] Signal 233, PID: 234, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.258923 445017 task_exit.go:204] [ 233( 226): 233( 226)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.258894 445017 task_signals.go:204] [ 233( 226): 235( 228)] Signal 233, PID: 235, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.258984 445017 task_exit.go:204] [ 233( 226): 234( 227)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.259166 445017 task_exit.go:204] [ 233( 226): 234( 227)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.259219 445017 task_exit.go:204] [ 233( 226): 234( 227)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.259357 445017 task_exit.go:204] [ 233( 226): 235( 228)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.262546 445017 task_exit.go:204] [ 233( 226): 235( 228)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.262636 445017 task_exit.go:204] [ 233( 226): 235( 228)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.262719 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.263877 445017 task_exit.go:204] [ 233( 226): 233( 226)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.272092 445017 usertrap_amd64.go:212] [ 236( 229): 236( 229)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.272219 445017 usertrap_amd64.go:122] [ 236( 229): 236( 229)] Allocate a new trap: 0xc000bfa2a0 28 D0719 21:52:56.272676 445017 usertrap_amd64.go:225] [ 236( 229): 236( 229)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.278405 445017 usertrap_amd64.go:212] [ 236( 229): 236( 229)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.278481 445017 usertrap_amd64.go:122] [ 236( 229): 236( 229)] Allocate a new trap: 0xc000bfa2a0 29 D0719 21:52:56.278551 445017 usertrap_amd64.go:225] [ 236( 229): 236( 229)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.279572 445017 usertrap_amd64.go:212] [ 236( 229): 236( 229)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.279669 445017 usertrap_amd64.go:122] [ 236( 229): 236( 229)] Allocate a new trap: 0xc000bfa2a0 30 D0719 21:52:56.279732 445017 usertrap_amd64.go:225] [ 236( 229): 236( 229)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.286009 445017 usertrap_amd64.go:212] [ 236( 229): 236( 229)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.286111 445017 usertrap_amd64.go:122] [ 236( 229): 236( 229)] Allocate a new trap: 0xc000bfa2a0 31 D0719 21:52:56.286201 445017 usertrap_amd64.go:225] [ 236( 229): 236( 229)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.286567 445017 usertrap_amd64.go:212] [ 236( 229): 236( 229)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.286688 445017 usertrap_amd64.go:122] [ 236( 229): 236( 229)] Allocate a new trap: 0xc000bfa2a0 32 D0719 21:52:56.286838 445017 usertrap_amd64.go:225] [ 236( 229): 236( 229)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.287995 445017 usertrap_amd64.go:212] [ 236( 229): 236( 229)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.288097 445017 usertrap_amd64.go:122] [ 236( 229): 236( 229)] Allocate a new trap: 0xc000bfa2a0 33 D0719 21:52:56.288265 445017 usertrap_amd64.go:225] [ 236( 229): 236( 229)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.290101 445017 usertrap_amd64.go:212] [ 236( 229): 237( 230)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:56.290236 445017 usertrap_amd64.go:122] [ 236( 229): 237( 230)] Allocate a new trap: 0xc000bfa2a0 34 D0719 21:52:56.290293 445017 usertrap_amd64.go:225] [ 236( 229): 237( 230)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:56.298832 445017 usertrap_amd64.go:212] [ 236( 229): 236( 229)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:56.298998 445017 usertrap_amd64.go:122] [ 236( 229): 236( 229)] Allocate a new trap: 0xc000bfa2a0 35 D0719 21:52:56.299108 445017 usertrap_amd64.go:225] [ 236( 229): 236( 229)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:56.301770 445017 usertrap_amd64.go:212] [ 236( 229): 236( 229)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:56.301831 445017 usertrap_amd64.go:122] [ 236( 229): 236( 229)] Allocate a new trap: 0xc000bfa2a0 36 D0719 21:52:56.301909 445017 usertrap_amd64.go:225] [ 236( 229): 236( 229)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:56.302572 445017 task_exit.go:204] [ 236( 229): 236( 229)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.302715 445017 task_signals.go:204] [ 236( 229): 238( 231)] Signal 236, PID: 238, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.302826 445017 task_exit.go:204] [ 236( 229): 238( 231)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.302701 445017 task_signals.go:204] [ 236( 229): 237( 230)] Signal 236, PID: 237, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.303080 445017 task_exit.go:204] [ 236( 229): 236( 229)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.303242 445017 task_exit.go:204] [ 236( 229): 238( 231)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.303300 445017 task_exit.go:204] [ 236( 229): 238( 231)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.303437 445017 task_exit.go:204] [ 236( 229): 237( 230)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.306782 445017 task_exit.go:204] [ 236( 229): 237( 230)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.306864 445017 task_exit.go:204] [ 236( 229): 237( 230)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.306972 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.308421 445017 task_exit.go:204] [ 236( 229): 236( 229)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.316661 445017 usertrap_amd64.go:212] [ 239( 232): 239( 232)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.316779 445017 usertrap_amd64.go:122] [ 239( 232): 239( 232)] Allocate a new trap: 0xc000b12570 28 D0719 21:52:56.317184 445017 usertrap_amd64.go:225] [ 239( 232): 239( 232)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.328208 445017 usertrap_amd64.go:212] [ 239( 232): 239( 232)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.328294 445017 usertrap_amd64.go:122] [ 239( 232): 239( 232)] Allocate a new trap: 0xc000b12570 29 D0719 21:52:56.328374 445017 usertrap_amd64.go:225] [ 239( 232): 239( 232)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.329216 445017 usertrap_amd64.go:212] [ 239( 232): 239( 232)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.329278 445017 usertrap_amd64.go:122] [ 239( 232): 239( 232)] Allocate a new trap: 0xc000b12570 30 D0719 21:52:56.329351 445017 usertrap_amd64.go:225] [ 239( 232): 239( 232)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.340922 445017 usertrap_amd64.go:212] [ 239( 232): 239( 232)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.341006 445017 usertrap_amd64.go:122] [ 239( 232): 239( 232)] Allocate a new trap: 0xc000b12570 31 D0719 21:52:56.341070 445017 usertrap_amd64.go:225] [ 239( 232): 239( 232)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.341324 445017 usertrap_amd64.go:212] [ 239( 232): 239( 232)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.341371 445017 usertrap_amd64.go:122] [ 239( 232): 239( 232)] Allocate a new trap: 0xc000b12570 32 D0719 21:52:56.341427 445017 usertrap_amd64.go:225] [ 239( 232): 239( 232)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.342207 445017 usertrap_amd64.go:212] [ 239( 232): 239( 232)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.342285 445017 usertrap_amd64.go:122] [ 239( 232): 239( 232)] Allocate a new trap: 0xc000b12570 33 D0719 21:52:56.342355 445017 usertrap_amd64.go:225] [ 239( 232): 239( 232)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.342572 445017 usertrap_amd64.go:212] [ 239( 232): 240( 233)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:56.342692 445017 usertrap_amd64.go:122] [ 239( 232): 240( 233)] Allocate a new trap: 0xc000b12570 34 D0719 21:52:56.342763 445017 usertrap_amd64.go:225] [ 239( 232): 240( 233)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:56.352729 445017 usertrap_amd64.go:212] [ 239( 232): 239( 232)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:56.352808 445017 usertrap_amd64.go:122] [ 239( 232): 239( 232)] Allocate a new trap: 0xc000b12570 35 D0719 21:52:56.352875 445017 usertrap_amd64.go:225] [ 239( 232): 239( 232)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:56.368838 445017 usertrap_amd64.go:212] [ 239( 232): 239( 232)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:56.368941 445017 usertrap_amd64.go:122] [ 239( 232): 239( 232)] Allocate a new trap: 0xc000b12570 36 D0719 21:52:56.369012 445017 usertrap_amd64.go:225] [ 239( 232): 239( 232)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:56.369630 445017 task_exit.go:204] [ 239( 232): 239( 232)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.369812 445017 task_signals.go:204] [ 239( 232): 241( 234)] Signal 239, PID: 241, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.369879 445017 task_exit.go:204] [ 239( 232): 239( 232)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.369992 445017 task_exit.go:204] [ 239( 232): 241( 234)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.370141 445017 task_signals.go:204] [ 239( 232): 240( 233)] Signal 239, PID: 240, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.370276 445017 task_exit.go:204] [ 239( 232): 240( 233)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.370560 445017 task_exit.go:204] [ 239( 232): 241( 234)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.370675 445017 task_exit.go:204] [ 239( 232): 241( 234)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.373922 445017 task_exit.go:204] [ 239( 232): 240( 233)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.374013 445017 task_exit.go:204] [ 239( 232): 240( 233)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.374094 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.374371 445017 task_exit.go:204] [ 239( 232): 239( 232)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.381441 445017 usertrap_amd64.go:212] [ 242( 235): 242( 235)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.381527 445017 usertrap_amd64.go:122] [ 242( 235): 242( 235)] Allocate a new trap: 0xc000bfa420 28 D0719 21:52:56.381991 445017 usertrap_amd64.go:225] [ 242( 235): 242( 235)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.386163 445017 usertrap_amd64.go:212] [ 242( 235): 242( 235)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.386236 445017 usertrap_amd64.go:122] [ 242( 235): 242( 235)] Allocate a new trap: 0xc000bfa420 29 D0719 21:52:56.386330 445017 usertrap_amd64.go:225] [ 242( 235): 242( 235)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.387262 445017 usertrap_amd64.go:212] [ 242( 235): 242( 235)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.387314 445017 usertrap_amd64.go:122] [ 242( 235): 242( 235)] Allocate a new trap: 0xc000bfa420 30 D0719 21:52:56.387388 445017 usertrap_amd64.go:225] [ 242( 235): 242( 235)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.391555 445017 usertrap_amd64.go:212] [ 242( 235): 242( 235)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.391656 445017 usertrap_amd64.go:122] [ 242( 235): 242( 235)] Allocate a new trap: 0xc000bfa420 31 D0719 21:52:56.391724 445017 usertrap_amd64.go:225] [ 242( 235): 242( 235)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.394477 445017 usertrap_amd64.go:212] [ 242( 235): 242( 235)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.394593 445017 usertrap_amd64.go:122] [ 242( 235): 242( 235)] Allocate a new trap: 0xc000bfa420 32 D0719 21:52:56.394652 445017 usertrap_amd64.go:225] [ 242( 235): 242( 235)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.395568 445017 usertrap_amd64.go:212] [ 242( 235): 242( 235)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.395858 445017 usertrap_amd64.go:122] [ 242( 235): 242( 235)] Allocate a new trap: 0xc000bfa420 33 D0719 21:52:56.395985 445017 usertrap_amd64.go:225] [ 242( 235): 242( 235)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.396172 445017 usertrap_amd64.go:212] [ 242( 235): 243( 236)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:56.396244 445017 usertrap_amd64.go:122] [ 242( 235): 243( 236)] Allocate a new trap: 0xc000bfa420 34 D0719 21:52:56.396313 445017 usertrap_amd64.go:225] [ 242( 235): 243( 236)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:56.404379 445017 usertrap_amd64.go:212] [ 242( 235): 242( 235)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:56.404451 445017 usertrap_amd64.go:122] [ 242( 235): 242( 235)] Allocate a new trap: 0xc000bfa420 35 D0719 21:52:56.404506 445017 usertrap_amd64.go:225] [ 242( 235): 242( 235)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:56.406638 445017 usertrap_amd64.go:212] [ 242( 235): 242( 235)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:56.406709 445017 usertrap_amd64.go:122] [ 242( 235): 242( 235)] Allocate a new trap: 0xc000bfa420 36 D0719 21:52:56.406764 445017 usertrap_amd64.go:225] [ 242( 235): 242( 235)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:56.407334 445017 task_exit.go:204] [ 242( 235): 242( 235)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.407556 445017 task_exit.go:204] [ 242( 235): 242( 235)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.407758 445017 task_signals.go:204] [ 242( 235): 244( 237)] Signal 242, PID: 244, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.407855 445017 task_exit.go:204] [ 242( 235): 244( 237)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.407992 445017 task_exit.go:204] [ 242( 235): 244( 237)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.408041 445017 task_exit.go:204] [ 242( 235): 244( 237)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.408166 445017 task_signals.go:204] [ 242( 235): 243( 236)] Signal 242, PID: 243, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.408252 445017 task_exit.go:204] [ 242( 235): 243( 236)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.411590 445017 task_exit.go:204] [ 242( 235): 243( 236)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.411744 445017 task_exit.go:204] [ 242( 235): 243( 236)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.411847 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.412156 445017 task_exit.go:204] [ 242( 235): 242( 235)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.420969 445017 usertrap_amd64.go:212] [ 245( 238): 245( 238)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.421062 445017 usertrap_amd64.go:122] [ 245( 238): 245( 238)] Allocate a new trap: 0xc000bfa570 28 D0719 21:52:56.421422 445017 usertrap_amd64.go:225] [ 245( 238): 245( 238)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.426603 445017 usertrap_amd64.go:212] [ 245( 238): 245( 238)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.426671 445017 usertrap_amd64.go:122] [ 245( 238): 245( 238)] Allocate a new trap: 0xc000bfa570 29 D0719 21:52:56.426738 445017 usertrap_amd64.go:225] [ 245( 238): 245( 238)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.427680 445017 usertrap_amd64.go:212] [ 245( 238): 245( 238)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.427760 445017 usertrap_amd64.go:122] [ 245( 238): 245( 238)] Allocate a new trap: 0xc000bfa570 30 D0719 21:52:56.427817 445017 usertrap_amd64.go:225] [ 245( 238): 245( 238)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.436919 445017 usertrap_amd64.go:212] [ 245( 238): 245( 238)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.437009 445017 usertrap_amd64.go:122] [ 245( 238): 245( 238)] Allocate a new trap: 0xc000bfa570 31 D0719 21:52:56.437100 445017 usertrap_amd64.go:225] [ 245( 238): 245( 238)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.438355 445017 usertrap_amd64.go:212] [ 245( 238): 245( 238)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.438417 445017 usertrap_amd64.go:122] [ 245( 238): 245( 238)] Allocate a new trap: 0xc000bfa570 32 D0719 21:52:56.438497 445017 usertrap_amd64.go:225] [ 245( 238): 245( 238)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.439166 445017 usertrap_amd64.go:212] [ 245( 238): 245( 238)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.439220 445017 usertrap_amd64.go:122] [ 245( 238): 245( 238)] Allocate a new trap: 0xc000bfa570 33 D0719 21:52:56.439324 445017 usertrap_amd64.go:225] [ 245( 238): 245( 238)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.439837 445017 usertrap_amd64.go:212] [ 245( 238): 246( 239)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:56.439924 445017 usertrap_amd64.go:122] [ 245( 238): 246( 239)] Allocate a new trap: 0xc000bfa570 34 D0719 21:52:56.440000 445017 usertrap_amd64.go:225] [ 245( 238): 246( 239)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:56.453152 445017 usertrap_amd64.go:212] [ 245( 238): 245( 238)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:56.453215 445017 usertrap_amd64.go:122] [ 245( 238): 245( 238)] Allocate a new trap: 0xc000bfa570 35 D0719 21:52:56.453330 445017 usertrap_amd64.go:225] [ 245( 238): 245( 238)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:56.456438 445017 usertrap_amd64.go:212] [ 245( 238): 245( 238)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:56.456521 445017 usertrap_amd64.go:122] [ 245( 238): 245( 238)] Allocate a new trap: 0xc000bfa570 36 D0719 21:52:56.456583 445017 usertrap_amd64.go:225] [ 245( 238): 245( 238)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:56.457018 445017 task_exit.go:204] [ 245( 238): 245( 238)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.457163 445017 task_signals.go:204] [ 245( 238): 246( 239)] Signal 245, PID: 246, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.457232 445017 task_exit.go:204] [ 245( 238): 245( 238)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.457364 445017 task_exit.go:204] [ 245( 238): 246( 239)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.457524 445017 task_signals.go:204] [ 245( 238): 247( 240)] Signal 245, PID: 247, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.457756 445017 task_exit.go:204] [ 245( 238): 246( 239)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.457819 445017 task_exit.go:204] [ 245( 238): 246( 239)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.457968 445017 task_exit.go:204] [ 245( 238): 247( 240)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.461647 445017 task_exit.go:204] [ 245( 238): 247( 240)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.461762 445017 task_exit.go:204] [ 245( 238): 247( 240)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.461865 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.463057 445017 task_exit.go:204] [ 245( 238): 245( 238)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.470503 445017 usertrap_amd64.go:212] [ 248( 241): 248( 241)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.470624 445017 usertrap_amd64.go:122] [ 248( 241): 248( 241)] Allocate a new trap: 0xc000b12660 28 D0719 21:52:56.471904 445017 usertrap_amd64.go:225] [ 248( 241): 248( 241)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.475662 445017 usertrap_amd64.go:212] [ 248( 241): 248( 241)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.475743 445017 usertrap_amd64.go:122] [ 248( 241): 248( 241)] Allocate a new trap: 0xc000b12660 29 D0719 21:52:56.475822 445017 usertrap_amd64.go:225] [ 248( 241): 248( 241)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.476835 445017 usertrap_amd64.go:212] [ 248( 241): 248( 241)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.476907 445017 usertrap_amd64.go:122] [ 248( 241): 248( 241)] Allocate a new trap: 0xc000b12660 30 D0719 21:52:56.476967 445017 usertrap_amd64.go:225] [ 248( 241): 248( 241)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.480939 445017 usertrap_amd64.go:212] [ 248( 241): 248( 241)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.481010 445017 usertrap_amd64.go:122] [ 248( 241): 248( 241)] Allocate a new trap: 0xc000b12660 31 D0719 21:52:56.481072 445017 usertrap_amd64.go:225] [ 248( 241): 248( 241)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.481298 445017 usertrap_amd64.go:212] [ 248( 241): 248( 241)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.481339 445017 usertrap_amd64.go:122] [ 248( 241): 248( 241)] Allocate a new trap: 0xc000b12660 32 D0719 21:52:56.481380 445017 usertrap_amd64.go:225] [ 248( 241): 248( 241)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.481924 445017 usertrap_amd64.go:212] [ 248( 241): 248( 241)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.481986 445017 usertrap_amd64.go:122] [ 248( 241): 248( 241)] Allocate a new trap: 0xc000b12660 33 D0719 21:52:56.482082 445017 usertrap_amd64.go:225] [ 248( 241): 248( 241)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.482729 445017 usertrap_amd64.go:212] [ 248( 241): 249( 242)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:56.482790 445017 usertrap_amd64.go:122] [ 248( 241): 249( 242)] Allocate a new trap: 0xc000b12660 34 D0719 21:52:56.483066 445017 usertrap_amd64.go:225] [ 248( 241): 249( 242)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:56.493462 445017 usertrap_amd64.go:212] [ 248( 241): 248( 241)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:56.495465 445017 usertrap_amd64.go:122] [ 248( 241): 248( 241)] Allocate a new trap: 0xc000b12660 35 D0719 21:52:56.495570 445017 usertrap_amd64.go:225] [ 248( 241): 248( 241)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:56.497841 445017 usertrap_amd64.go:212] [ 248( 241): 248( 241)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:56.497903 445017 usertrap_amd64.go:122] [ 248( 241): 248( 241)] Allocate a new trap: 0xc000b12660 36 D0719 21:52:56.497950 445017 usertrap_amd64.go:225] [ 248( 241): 248( 241)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:56.498346 445017 task_exit.go:204] [ 248( 241): 248( 241)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.498638 445017 task_signals.go:204] [ 248( 241): 250( 243)] Signal 248, PID: 250, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.498679 445017 task_exit.go:204] [ 248( 241): 248( 241)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.498844 445017 task_exit.go:204] [ 248( 241): 250( 243)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.498993 445017 task_signals.go:204] [ 248( 241): 249( 242)] Signal 248, PID: 249, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.499192 445017 task_exit.go:204] [ 248( 241): 250( 243)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.499254 445017 task_exit.go:204] [ 248( 241): 250( 243)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.499416 445017 task_exit.go:204] [ 248( 241): 249( 242)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.502476 445017 task_exit.go:204] [ 248( 241): 249( 242)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.502563 445017 task_exit.go:204] [ 248( 241): 249( 242)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.502650 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.502761 445017 task_exit.go:204] [ 248( 241): 248( 241)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.510041 445017 usertrap_amd64.go:212] [ 251( 244): 251( 244)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.510143 445017 usertrap_amd64.go:122] [ 251( 244): 251( 244)] Allocate a new trap: 0xc000886840 28 D0719 21:52:56.510625 445017 usertrap_amd64.go:225] [ 251( 244): 251( 244)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.514311 445017 usertrap_amd64.go:212] [ 251( 244): 251( 244)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.514371 445017 usertrap_amd64.go:122] [ 251( 244): 251( 244)] Allocate a new trap: 0xc000886840 29 D0719 21:52:56.514432 445017 usertrap_amd64.go:225] [ 251( 244): 251( 244)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.515505 445017 usertrap_amd64.go:212] [ 251( 244): 251( 244)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.515575 445017 usertrap_amd64.go:122] [ 251( 244): 251( 244)] Allocate a new trap: 0xc000886840 30 D0719 21:52:56.515689 445017 usertrap_amd64.go:225] [ 251( 244): 251( 244)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.518841 445017 usertrap_amd64.go:212] [ 251( 244): 251( 244)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.518911 445017 usertrap_amd64.go:122] [ 251( 244): 251( 244)] Allocate a new trap: 0xc000886840 31 D0719 21:52:56.518974 445017 usertrap_amd64.go:225] [ 251( 244): 251( 244)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.519237 445017 usertrap_amd64.go:212] [ 251( 244): 251( 244)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.519306 445017 usertrap_amd64.go:122] [ 251( 244): 251( 244)] Allocate a new trap: 0xc000886840 32 D0719 21:52:56.519363 445017 usertrap_amd64.go:225] [ 251( 244): 251( 244)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.520543 445017 usertrap_amd64.go:212] [ 251( 244): 251( 244)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.520653 445017 usertrap_amd64.go:122] [ 251( 244): 251( 244)] Allocate a new trap: 0xc000886840 33 D0719 21:52:56.520738 445017 usertrap_amd64.go:225] [ 251( 244): 251( 244)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.523349 445017 usertrap_amd64.go:212] [ 251( 244): 252( 245)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:56.523418 445017 usertrap_amd64.go:122] [ 251( 244): 252( 245)] Allocate a new trap: 0xc000886840 34 D0719 21:52:56.523498 445017 usertrap_amd64.go:225] [ 251( 244): 252( 245)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:56.530576 445017 usertrap_amd64.go:212] [ 251( 244): 251( 244)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:56.530667 445017 usertrap_amd64.go:122] [ 251( 244): 251( 244)] Allocate a new trap: 0xc000886840 35 D0719 21:52:56.530751 445017 usertrap_amd64.go:225] [ 251( 244): 251( 244)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:56.535202 445017 usertrap_amd64.go:212] [ 251( 244): 251( 244)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:56.535291 445017 usertrap_amd64.go:122] [ 251( 244): 251( 244)] Allocate a new trap: 0xc000886840 36 D0719 21:52:56.535403 445017 usertrap_amd64.go:225] [ 251( 244): 251( 244)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:56.536083 445017 task_exit.go:204] [ 251( 244): 251( 244)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.536403 445017 task_signals.go:204] [ 251( 244): 253( 246)] Signal 251, PID: 253, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.536414 445017 task_signals.go:204] [ 251( 244): 252( 245)] Signal 251, PID: 252, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.536520 445017 task_exit.go:204] [ 251( 244): 253( 246)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.536686 445017 task_exit.go:204] [ 251( 244): 252( 245)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.536824 445017 task_exit.go:204] [ 251( 244): 251( 244)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.537284 445017 task_exit.go:204] [ 251( 244): 253( 246)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.537345 445017 task_exit.go:204] [ 251( 244): 253( 246)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.540392 445017 task_exit.go:204] [ 251( 244): 252( 245)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.540521 445017 task_exit.go:204] [ 251( 244): 252( 245)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.540615 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.540872 445017 task_exit.go:204] [ 251( 244): 251( 244)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.547639 445017 usertrap_amd64.go:212] [ 254( 247): 254( 247)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.547773 445017 usertrap_amd64.go:122] [ 254( 247): 254( 247)] Allocate a new trap: 0xc000a68000 28 D0719 21:52:56.548161 445017 usertrap_amd64.go:225] [ 254( 247): 254( 247)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.552833 445017 usertrap_amd64.go:212] [ 254( 247): 254( 247)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.552898 445017 usertrap_amd64.go:122] [ 254( 247): 254( 247)] Allocate a new trap: 0xc000a68000 29 D0719 21:52:56.552976 445017 usertrap_amd64.go:225] [ 254( 247): 254( 247)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.571829 445017 usertrap_amd64.go:212] [ 254( 247): 254( 247)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.571916 445017 usertrap_amd64.go:122] [ 254( 247): 254( 247)] Allocate a new trap: 0xc000a68000 30 D0719 21:52:56.572020 445017 usertrap_amd64.go:225] [ 254( 247): 254( 247)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.577326 445017 usertrap_amd64.go:212] [ 254( 247): 254( 247)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.577421 445017 usertrap_amd64.go:122] [ 254( 247): 254( 247)] Allocate a new trap: 0xc000a68000 31 D0719 21:52:56.577489 445017 usertrap_amd64.go:225] [ 254( 247): 254( 247)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.577745 445017 usertrap_amd64.go:212] [ 254( 247): 254( 247)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.577795 445017 usertrap_amd64.go:122] [ 254( 247): 254( 247)] Allocate a new trap: 0xc000a68000 32 D0719 21:52:56.577847 445017 usertrap_amd64.go:225] [ 254( 247): 254( 247)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.578456 445017 usertrap_amd64.go:212] [ 254( 247): 254( 247)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.578897 445017 usertrap_amd64.go:122] [ 254( 247): 254( 247)] Allocate a new trap: 0xc000a68000 33 D0719 21:52:56.578988 445017 usertrap_amd64.go:225] [ 254( 247): 254( 247)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.579270 445017 usertrap_amd64.go:212] [ 254( 247): 255( 248)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:56.579416 445017 usertrap_amd64.go:122] [ 254( 247): 255( 248)] Allocate a new trap: 0xc000a68000 34 D0719 21:52:56.579532 445017 usertrap_amd64.go:225] [ 254( 247): 255( 248)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:56.591092 445017 usertrap_amd64.go:212] [ 254( 247): 254( 247)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:56.591161 445017 usertrap_amd64.go:122] [ 254( 247): 254( 247)] Allocate a new trap: 0xc000a68000 35 D0719 21:52:56.591218 445017 usertrap_amd64.go:225] [ 254( 247): 254( 247)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:56.594111 445017 usertrap_amd64.go:212] [ 254( 247): 254( 247)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:56.594168 445017 usertrap_amd64.go:122] [ 254( 247): 254( 247)] Allocate a new trap: 0xc000a68000 36 D0719 21:52:56.594227 445017 usertrap_amd64.go:225] [ 254( 247): 254( 247)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:56.594851 445017 task_exit.go:204] [ 254( 247): 254( 247)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.595097 445017 task_exit.go:204] [ 254( 247): 254( 247)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.595094 445017 task_signals.go:204] [ 254( 247): 255( 248)] Signal 254, PID: 255, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.595234 445017 task_exit.go:204] [ 254( 247): 255( 248)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.595386 445017 task_signals.go:204] [ 254( 247): 256( 249)] Signal 254, PID: 256, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.595578 445017 task_exit.go:204] [ 254( 247): 255( 248)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.595656 445017 task_exit.go:204] [ 254( 247): 255( 248)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.595781 445017 task_exit.go:204] [ 254( 247): 256( 249)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.599371 445017 task_exit.go:204] [ 254( 247): 256( 249)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.599426 445017 task_exit.go:204] [ 254( 247): 256( 249)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.599516 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.599999 445017 task_exit.go:204] [ 254( 247): 254( 247)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.609544 445017 usertrap_amd64.go:212] [ 257( 250): 257( 250)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.609666 445017 usertrap_amd64.go:122] [ 257( 250): 257( 250)] Allocate a new trap: 0xc000a68240 28 D0719 21:52:56.610158 445017 usertrap_amd64.go:225] [ 257( 250): 257( 250)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.616682 445017 usertrap_amd64.go:212] [ 257( 250): 257( 250)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.616778 445017 usertrap_amd64.go:122] [ 257( 250): 257( 250)] Allocate a new trap: 0xc000a68240 29 D0719 21:52:56.616847 445017 usertrap_amd64.go:225] [ 257( 250): 257( 250)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.618553 445017 usertrap_amd64.go:212] [ 257( 250): 257( 250)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.618643 445017 usertrap_amd64.go:122] [ 257( 250): 257( 250)] Allocate a new trap: 0xc000a68240 30 D0719 21:52:56.618824 445017 usertrap_amd64.go:225] [ 257( 250): 257( 250)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.622769 445017 usertrap_amd64.go:212] [ 257( 250): 257( 250)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.622837 445017 usertrap_amd64.go:122] [ 257( 250): 257( 250)] Allocate a new trap: 0xc000a68240 31 D0719 21:52:56.622922 445017 usertrap_amd64.go:225] [ 257( 250): 257( 250)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.623332 445017 usertrap_amd64.go:212] [ 257( 250): 257( 250)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.623394 445017 usertrap_amd64.go:122] [ 257( 250): 257( 250)] Allocate a new trap: 0xc000a68240 32 D0719 21:52:56.623473 445017 usertrap_amd64.go:225] [ 257( 250): 257( 250)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.624130 445017 usertrap_amd64.go:212] [ 257( 250): 257( 250)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.624223 445017 usertrap_amd64.go:122] [ 257( 250): 257( 250)] Allocate a new trap: 0xc000a68240 33 D0719 21:52:56.624300 445017 usertrap_amd64.go:225] [ 257( 250): 257( 250)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.625167 445017 usertrap_amd64.go:212] [ 257( 250): 258( 251)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:56.625275 445017 usertrap_amd64.go:122] [ 257( 250): 258( 251)] Allocate a new trap: 0xc000a68240 34 D0719 21:52:56.625354 445017 usertrap_amd64.go:225] [ 257( 250): 258( 251)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:56.642109 445017 usertrap_amd64.go:212] [ 257( 250): 257( 250)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:56.642272 445017 usertrap_amd64.go:122] [ 257( 250): 257( 250)] Allocate a new trap: 0xc000a68240 35 D0719 21:52:56.642362 445017 usertrap_amd64.go:225] [ 257( 250): 257( 250)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:56.647422 445017 usertrap_amd64.go:212] [ 257( 250): 257( 250)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:56.647517 445017 usertrap_amd64.go:122] [ 257( 250): 257( 250)] Allocate a new trap: 0xc000a68240 36 D0719 21:52:56.647591 445017 usertrap_amd64.go:225] [ 257( 250): 257( 250)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:56.648177 445017 task_exit.go:204] [ 257( 250): 257( 250)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.648566 445017 task_exit.go:204] [ 257( 250): 257( 250)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.648744 445017 task_signals.go:204] [ 257( 250): 258( 251)] Signal 257, PID: 258, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.648848 445017 task_signals.go:204] [ 257( 250): 259( 252)] Signal 257, PID: 259, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.648994 445017 task_exit.go:204] [ 257( 250): 258( 251)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.649199 445017 task_exit.go:204] [ 257( 250): 258( 251)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.649302 445017 task_exit.go:204] [ 257( 250): 258( 251)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.649443 445017 task_exit.go:204] [ 257( 250): 259( 252)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.652928 445017 task_exit.go:204] [ 257( 250): 259( 252)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.653088 445017 task_exit.go:204] [ 257( 250): 259( 252)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.653227 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.653402 445017 task_exit.go:204] [ 257( 250): 257( 250)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.663572 445017 usertrap_amd64.go:212] [ 260( 253): 260( 253)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.663821 445017 usertrap_amd64.go:122] [ 260( 253): 260( 253)] Allocate a new trap: 0xc000bfa030 28 D0719 21:52:56.664360 445017 usertrap_amd64.go:225] [ 260( 253): 260( 253)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.668111 445017 usertrap_amd64.go:212] [ 260( 253): 260( 253)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.668194 445017 usertrap_amd64.go:122] [ 260( 253): 260( 253)] Allocate a new trap: 0xc000bfa030 29 D0719 21:52:56.668303 445017 usertrap_amd64.go:225] [ 260( 253): 260( 253)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.673049 445017 usertrap_amd64.go:212] [ 260( 253): 260( 253)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.673100 445017 usertrap_amd64.go:122] [ 260( 253): 260( 253)] Allocate a new trap: 0xc000bfa030 30 D0719 21:52:56.673166 445017 usertrap_amd64.go:225] [ 260( 253): 260( 253)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.678176 445017 usertrap_amd64.go:212] [ 260( 253): 260( 253)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.678312 445017 usertrap_amd64.go:122] [ 260( 253): 260( 253)] Allocate a new trap: 0xc000bfa030 31 D0719 21:52:56.678397 445017 usertrap_amd64.go:225] [ 260( 253): 260( 253)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.678648 445017 usertrap_amd64.go:212] [ 260( 253): 260( 253)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.678700 445017 usertrap_amd64.go:122] [ 260( 253): 260( 253)] Allocate a new trap: 0xc000bfa030 32 D0719 21:52:56.678776 445017 usertrap_amd64.go:225] [ 260( 253): 260( 253)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.679466 445017 usertrap_amd64.go:212] [ 260( 253): 260( 253)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.679597 445017 usertrap_amd64.go:122] [ 260( 253): 260( 253)] Allocate a new trap: 0xc000bfa030 33 D0719 21:52:56.679767 445017 usertrap_amd64.go:225] [ 260( 253): 260( 253)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.680711 445017 usertrap_amd64.go:212] [ 260( 253): 261( 254)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:56.680802 445017 usertrap_amd64.go:122] [ 260( 253): 261( 254)] Allocate a new trap: 0xc000bfa030 34 D0719 21:52:56.680936 445017 usertrap_amd64.go:225] [ 260( 253): 261( 254)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:56.690280 445017 usertrap_amd64.go:212] [ 260( 253): 260( 253)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:56.690387 445017 usertrap_amd64.go:122] [ 260( 253): 260( 253)] Allocate a new trap: 0xc000bfa030 35 D0719 21:52:56.690525 445017 usertrap_amd64.go:225] [ 260( 253): 260( 253)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:56.693136 445017 usertrap_amd64.go:212] [ 260( 253): 260( 253)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:56.693204 445017 usertrap_amd64.go:122] [ 260( 253): 260( 253)] Allocate a new trap: 0xc000bfa030 36 D0719 21:52:56.693262 445017 usertrap_amd64.go:225] [ 260( 253): 260( 253)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:56.693807 445017 task_exit.go:204] [ 260( 253): 260( 253)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.694095 445017 task_exit.go:204] [ 260( 253): 260( 253)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.694236 445017 task_signals.go:204] [ 260( 253): 261( 254)] Signal 260, PID: 261, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.694328 445017 task_exit.go:204] [ 260( 253): 261( 254)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.694514 445017 task_exit.go:204] [ 260( 253): 261( 254)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.694569 445017 task_exit.go:204] [ 260( 253): 261( 254)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.694695 445017 task_signals.go:204] [ 260( 253): 262( 255)] Signal 260, PID: 262, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.694775 445017 task_exit.go:204] [ 260( 253): 262( 255)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.698201 445017 task_exit.go:204] [ 260( 253): 262( 255)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.698321 445017 task_exit.go:204] [ 260( 253): 262( 255)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.698409 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.698724 445017 task_exit.go:204] [ 260( 253): 260( 253)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.705927 445017 usertrap_amd64.go:212] [ 263( 256): 263( 256)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.706025 445017 usertrap_amd64.go:122] [ 263( 256): 263( 256)] Allocate a new trap: 0xc00037ea20 28 D0719 21:52:56.706466 445017 usertrap_amd64.go:225] [ 263( 256): 263( 256)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.709824 445017 usertrap_amd64.go:212] [ 263( 256): 263( 256)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.709937 445017 usertrap_amd64.go:122] [ 263( 256): 263( 256)] Allocate a new trap: 0xc00037ea20 29 D0719 21:52:56.710055 445017 usertrap_amd64.go:225] [ 263( 256): 263( 256)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.710812 445017 usertrap_amd64.go:212] [ 263( 256): 263( 256)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.710862 445017 usertrap_amd64.go:122] [ 263( 256): 263( 256)] Allocate a new trap: 0xc00037ea20 30 D0719 21:52:56.710922 445017 usertrap_amd64.go:225] [ 263( 256): 263( 256)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.714472 445017 usertrap_amd64.go:212] [ 263( 256): 263( 256)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.714530 445017 usertrap_amd64.go:122] [ 263( 256): 263( 256)] Allocate a new trap: 0xc00037ea20 31 D0719 21:52:56.714596 445017 usertrap_amd64.go:225] [ 263( 256): 263( 256)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.714808 445017 usertrap_amd64.go:212] [ 263( 256): 263( 256)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.714855 445017 usertrap_amd64.go:122] [ 263( 256): 263( 256)] Allocate a new trap: 0xc00037ea20 32 D0719 21:52:56.714924 445017 usertrap_amd64.go:225] [ 263( 256): 263( 256)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.715544 445017 usertrap_amd64.go:212] [ 263( 256): 263( 256)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.715703 445017 usertrap_amd64.go:122] [ 263( 256): 263( 256)] Allocate a new trap: 0xc00037ea20 33 D0719 21:52:56.715783 445017 usertrap_amd64.go:225] [ 263( 256): 263( 256)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.716097 445017 usertrap_amd64.go:212] [ 263( 256): 264( 257)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:56.716192 445017 usertrap_amd64.go:122] [ 263( 256): 264( 257)] Allocate a new trap: 0xc00037ea20 34 D0719 21:52:56.716290 445017 usertrap_amd64.go:225] [ 263( 256): 264( 257)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:56.723378 445017 usertrap_amd64.go:212] [ 263( 256): 263( 256)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:56.723463 445017 usertrap_amd64.go:122] [ 263( 256): 263( 256)] Allocate a new trap: 0xc00037ea20 35 D0719 21:52:56.723530 445017 usertrap_amd64.go:225] [ 263( 256): 263( 256)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:56.726160 445017 usertrap_amd64.go:212] [ 263( 256): 263( 256)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:56.726256 445017 usertrap_amd64.go:122] [ 263( 256): 263( 256)] Allocate a new trap: 0xc00037ea20 36 D0719 21:52:56.726387 445017 usertrap_amd64.go:225] [ 263( 256): 263( 256)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:56.726956 445017 task_exit.go:204] [ 263( 256): 263( 256)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.727131 445017 task_signals.go:204] [ 263( 256): 264( 257)] Signal 263, PID: 264, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.727164 445017 task_signals.go:204] [ 263( 256): 265( 258)] Signal 263, PID: 265, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.727365 445017 task_exit.go:204] [ 263( 256): 264( 257)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.727666 445017 task_exit.go:204] [ 263( 256): 265( 258)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.727914 445017 task_exit.go:204] [ 263( 256): 264( 257)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.727970 445017 task_exit.go:204] [ 263( 256): 264( 257)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.728078 445017 task_exit.go:204] [ 263( 256): 263( 256)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.731315 445017 task_exit.go:204] [ 263( 256): 265( 258)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.731378 445017 task_exit.go:204] [ 263( 256): 265( 258)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.731463 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.731778 445017 task_exit.go:204] [ 263( 256): 263( 256)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.739109 445017 usertrap_amd64.go:212] [ 266( 259): 266( 259)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.739234 445017 usertrap_amd64.go:122] [ 266( 259): 266( 259)] Allocate a new trap: 0xc000b120f0 28 D0719 21:52:56.740112 445017 usertrap_amd64.go:225] [ 266( 259): 266( 259)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.744597 445017 usertrap_amd64.go:212] [ 266( 259): 266( 259)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.744693 445017 usertrap_amd64.go:122] [ 266( 259): 266( 259)] Allocate a new trap: 0xc000b120f0 29 D0719 21:52:56.744744 445017 usertrap_amd64.go:225] [ 266( 259): 266( 259)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.745854 445017 usertrap_amd64.go:212] [ 266( 259): 266( 259)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.745928 445017 usertrap_amd64.go:122] [ 266( 259): 266( 259)] Allocate a new trap: 0xc000b120f0 30 D0719 21:52:56.745993 445017 usertrap_amd64.go:225] [ 266( 259): 266( 259)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.749851 445017 usertrap_amd64.go:212] [ 266( 259): 266( 259)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.749914 445017 usertrap_amd64.go:122] [ 266( 259): 266( 259)] Allocate a new trap: 0xc000b120f0 31 D0719 21:52:56.750005 445017 usertrap_amd64.go:225] [ 266( 259): 266( 259)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.750287 445017 usertrap_amd64.go:212] [ 266( 259): 266( 259)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.750350 445017 usertrap_amd64.go:122] [ 266( 259): 266( 259)] Allocate a new trap: 0xc000b120f0 32 D0719 21:52:56.750444 445017 usertrap_amd64.go:225] [ 266( 259): 266( 259)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.750967 445017 usertrap_amd64.go:212] [ 266( 259): 266( 259)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.751027 445017 usertrap_amd64.go:122] [ 266( 259): 266( 259)] Allocate a new trap: 0xc000b120f0 33 D0719 21:52:56.751173 445017 usertrap_amd64.go:225] [ 266( 259): 266( 259)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.751538 445017 usertrap_amd64.go:212] [ 266( 259): 267( 260)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:56.751656 445017 usertrap_amd64.go:122] [ 266( 259): 267( 260)] Allocate a new trap: 0xc000b120f0 34 D0719 21:52:56.751857 445017 usertrap_amd64.go:225] [ 266( 259): 267( 260)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:56.759799 445017 usertrap_amd64.go:212] [ 266( 259): 266( 259)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:56.759872 445017 usertrap_amd64.go:122] [ 266( 259): 266( 259)] Allocate a new trap: 0xc000b120f0 35 D0719 21:52:56.759928 445017 usertrap_amd64.go:225] [ 266( 259): 266( 259)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:56.762141 445017 usertrap_amd64.go:212] [ 266( 259): 266( 259)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:56.762207 445017 usertrap_amd64.go:122] [ 266( 259): 266( 259)] Allocate a new trap: 0xc000b120f0 36 D0719 21:52:56.762273 445017 usertrap_amd64.go:225] [ 266( 259): 266( 259)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:56.762708 445017 task_exit.go:204] [ 266( 259): 266( 259)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.762847 445017 task_signals.go:204] [ 266( 259): 268( 261)] Signal 266, PID: 268, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.762944 445017 task_exit.go:204] [ 266( 259): 268( 261)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.762882 445017 task_signals.go:204] [ 266( 259): 267( 260)] Signal 266, PID: 267, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.763096 445017 task_exit.go:204] [ 266( 259): 267( 260)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.763452 445017 task_exit.go:204] [ 266( 259): 267( 260)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.763532 445017 task_exit.go:204] [ 266( 259): 267( 260)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.763955 445017 task_exit.go:204] [ 266( 259): 268( 261)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.764030 445017 task_exit.go:204] [ 266( 259): 268( 261)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.766715 445017 task_exit.go:204] [ 266( 259): 266( 259)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.766790 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.767762 445017 task_exit.go:204] [ 266( 259): 266( 259)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.776528 445017 usertrap_amd64.go:212] [ 269( 262): 269( 262)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.776625 445017 usertrap_amd64.go:122] [ 269( 262): 269( 262)] Allocate a new trap: 0xc000bfa360 28 D0719 21:52:56.777106 445017 usertrap_amd64.go:225] [ 269( 262): 269( 262)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.782215 445017 usertrap_amd64.go:212] [ 269( 262): 269( 262)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.782310 445017 usertrap_amd64.go:122] [ 269( 262): 269( 262)] Allocate a new trap: 0xc000bfa360 29 D0719 21:52:56.782390 445017 usertrap_amd64.go:225] [ 269( 262): 269( 262)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.783448 445017 usertrap_amd64.go:212] [ 269( 262): 269( 262)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.783521 445017 usertrap_amd64.go:122] [ 269( 262): 269( 262)] Allocate a new trap: 0xc000bfa360 30 D0719 21:52:56.783646 445017 usertrap_amd64.go:225] [ 269( 262): 269( 262)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.787873 445017 usertrap_amd64.go:212] [ 269( 262): 269( 262)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.787956 445017 usertrap_amd64.go:122] [ 269( 262): 269( 262)] Allocate a new trap: 0xc000bfa360 31 D0719 21:52:56.788028 445017 usertrap_amd64.go:225] [ 269( 262): 269( 262)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.788253 445017 usertrap_amd64.go:212] [ 269( 262): 269( 262)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.788299 445017 usertrap_amd64.go:122] [ 269( 262): 269( 262)] Allocate a new trap: 0xc000bfa360 32 D0719 21:52:56.788351 445017 usertrap_amd64.go:225] [ 269( 262): 269( 262)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.788808 445017 usertrap_amd64.go:212] [ 269( 262): 269( 262)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.788846 445017 usertrap_amd64.go:122] [ 269( 262): 269( 262)] Allocate a new trap: 0xc000bfa360 33 D0719 21:52:56.788970 445017 usertrap_amd64.go:225] [ 269( 262): 269( 262)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.789238 445017 usertrap_amd64.go:212] [ 269( 262): 270( 263)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:56.789328 445017 usertrap_amd64.go:122] [ 269( 262): 270( 263)] Allocate a new trap: 0xc000bfa360 34 D0719 21:52:56.789450 445017 usertrap_amd64.go:225] [ 269( 262): 270( 263)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:56.796578 445017 usertrap_amd64.go:212] [ 269( 262): 269( 262)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:56.796664 445017 usertrap_amd64.go:122] [ 269( 262): 269( 262)] Allocate a new trap: 0xc000bfa360 35 D0719 21:52:56.796740 445017 usertrap_amd64.go:225] [ 269( 262): 269( 262)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:56.799555 445017 usertrap_amd64.go:212] [ 269( 262): 269( 262)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:56.799648 445017 usertrap_amd64.go:122] [ 269( 262): 269( 262)] Allocate a new trap: 0xc000bfa360 36 D0719 21:52:56.799727 445017 usertrap_amd64.go:225] [ 269( 262): 269( 262)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:56.800266 445017 task_exit.go:204] [ 269( 262): 269( 262)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.800480 445017 task_signals.go:204] [ 269( 262): 270( 263)] Signal 269, PID: 270, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.800503 445017 task_signals.go:204] [ 269( 262): 271( 264)] Signal 269, PID: 271, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.800573 445017 task_exit.go:204] [ 269( 262): 269( 262)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.800928 445017 task_exit.go:204] [ 269( 262): 270( 263)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.801142 445017 task_exit.go:204] [ 269( 262): 270( 263)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.801204 445017 task_exit.go:204] [ 269( 262): 270( 263)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.801305 445017 task_exit.go:204] [ 269( 262): 271( 264)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.804420 445017 task_exit.go:204] [ 269( 262): 271( 264)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.804509 445017 task_exit.go:204] [ 269( 262): 271( 264)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.804652 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.804914 445017 task_exit.go:204] [ 269( 262): 269( 262)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.811292 445017 usertrap_amd64.go:212] [ 272( 265): 272( 265)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.811548 445017 usertrap_amd64.go:122] [ 272( 265): 272( 265)] Allocate a new trap: 0xc00030ea20 28 D0719 21:52:56.812005 445017 usertrap_amd64.go:225] [ 272( 265): 272( 265)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.815835 445017 usertrap_amd64.go:212] [ 272( 265): 272( 265)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.815893 445017 usertrap_amd64.go:122] [ 272( 265): 272( 265)] Allocate a new trap: 0xc00030ea20 29 D0719 21:52:56.815945 445017 usertrap_amd64.go:225] [ 272( 265): 272( 265)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.816803 445017 usertrap_amd64.go:212] [ 272( 265): 272( 265)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.816892 445017 usertrap_amd64.go:122] [ 272( 265): 272( 265)] Allocate a new trap: 0xc00030ea20 30 D0719 21:52:56.816963 445017 usertrap_amd64.go:225] [ 272( 265): 272( 265)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.821164 445017 usertrap_amd64.go:212] [ 272( 265): 272( 265)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.821232 445017 usertrap_amd64.go:122] [ 272( 265): 272( 265)] Allocate a new trap: 0xc00030ea20 31 D0719 21:52:56.821304 445017 usertrap_amd64.go:225] [ 272( 265): 272( 265)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.821571 445017 usertrap_amd64.go:212] [ 272( 265): 272( 265)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.821634 445017 usertrap_amd64.go:122] [ 272( 265): 272( 265)] Allocate a new trap: 0xc00030ea20 32 D0719 21:52:56.821725 445017 usertrap_amd64.go:225] [ 272( 265): 272( 265)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.822729 445017 usertrap_amd64.go:212] [ 272( 265): 272( 265)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.822867 445017 usertrap_amd64.go:122] [ 272( 265): 272( 265)] Allocate a new trap: 0xc00030ea20 33 D0719 21:52:56.822943 445017 usertrap_amd64.go:225] [ 272( 265): 272( 265)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.823188 445017 usertrap_amd64.go:212] [ 272( 265): 273( 266)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:56.823254 445017 usertrap_amd64.go:122] [ 272( 265): 273( 266)] Allocate a new trap: 0xc00030ea20 34 D0719 21:52:56.823373 445017 usertrap_amd64.go:225] [ 272( 265): 273( 266)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:56.838893 445017 usertrap_amd64.go:212] [ 272( 265): 272( 265)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:56.839022 445017 usertrap_amd64.go:122] [ 272( 265): 272( 265)] Allocate a new trap: 0xc00030ea20 35 D0719 21:52:56.839094 445017 usertrap_amd64.go:225] [ 272( 265): 272( 265)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:56.841857 445017 usertrap_amd64.go:212] [ 272( 265): 272( 265)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:56.841943 445017 usertrap_amd64.go:122] [ 272( 265): 272( 265)] Allocate a new trap: 0xc00030ea20 36 D0719 21:52:56.842040 445017 usertrap_amd64.go:225] [ 272( 265): 272( 265)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:56.842688 445017 task_exit.go:204] [ 272( 265): 272( 265)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.842904 445017 task_signals.go:204] [ 272( 265): 273( 266)] Signal 272, PID: 273, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.843039 445017 task_signals.go:204] [ 272( 265): 274( 267)] Signal 272, PID: 274, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.843089 445017 task_exit.go:204] [ 272( 265): 273( 266)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.843190 445017 task_exit.go:204] [ 272( 265): 272( 265)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.843281 445017 task_exit.go:204] [ 272( 265): 274( 267)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.843530 445017 task_exit.go:204] [ 272( 265): 273( 266)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.843652 445017 task_exit.go:204] [ 272( 265): 273( 266)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.846726 445017 task_exit.go:204] [ 272( 265): 274( 267)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.846784 445017 task_exit.go:204] [ 272( 265): 274( 267)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.846864 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.847519 445017 task_exit.go:204] [ 272( 265): 272( 265)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.858431 445017 usertrap_amd64.go:212] [ 275( 268): 275( 268)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.858585 445017 usertrap_amd64.go:122] [ 275( 268): 275( 268)] Allocate a new trap: 0xc00030f140 28 D0719 21:52:56.859016 445017 usertrap_amd64.go:225] [ 275( 268): 275( 268)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.862708 445017 usertrap_amd64.go:212] [ 275( 268): 275( 268)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.862778 445017 usertrap_amd64.go:122] [ 275( 268): 275( 268)] Allocate a new trap: 0xc00030f140 29 D0719 21:52:56.862837 445017 usertrap_amd64.go:225] [ 275( 268): 275( 268)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.864074 445017 usertrap_amd64.go:212] [ 275( 268): 275( 268)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.864139 445017 usertrap_amd64.go:122] [ 275( 268): 275( 268)] Allocate a new trap: 0xc00030f140 30 D0719 21:52:56.864232 445017 usertrap_amd64.go:225] [ 275( 268): 275( 268)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.869786 445017 usertrap_amd64.go:212] [ 275( 268): 275( 268)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.869874 445017 usertrap_amd64.go:122] [ 275( 268): 275( 268)] Allocate a new trap: 0xc00030f140 31 D0719 21:52:56.869962 445017 usertrap_amd64.go:225] [ 275( 268): 275( 268)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.870236 445017 usertrap_amd64.go:212] [ 275( 268): 275( 268)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.870286 445017 usertrap_amd64.go:122] [ 275( 268): 275( 268)] Allocate a new trap: 0xc00030f140 32 D0719 21:52:56.870369 445017 usertrap_amd64.go:225] [ 275( 268): 275( 268)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.870926 445017 usertrap_amd64.go:212] [ 275( 268): 275( 268)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.870990 445017 usertrap_amd64.go:122] [ 275( 268): 275( 268)] Allocate a new trap: 0xc00030f140 33 D0719 21:52:56.871075 445017 usertrap_amd64.go:225] [ 275( 268): 275( 268)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.871352 445017 usertrap_amd64.go:212] [ 275( 268): 276( 269)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:56.871415 445017 usertrap_amd64.go:122] [ 275( 268): 276( 269)] Allocate a new trap: 0xc00030f140 34 D0719 21:52:56.871475 445017 usertrap_amd64.go:225] [ 275( 268): 276( 269)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:56.878129 445017 usertrap_amd64.go:212] [ 275( 268): 275( 268)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:56.878205 445017 usertrap_amd64.go:122] [ 275( 268): 275( 268)] Allocate a new trap: 0xc00030f140 35 D0719 21:52:56.878287 445017 usertrap_amd64.go:225] [ 275( 268): 275( 268)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:56.881015 445017 usertrap_amd64.go:212] [ 275( 268): 275( 268)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:56.881089 445017 usertrap_amd64.go:122] [ 275( 268): 275( 268)] Allocate a new trap: 0xc00030f140 36 D0719 21:52:56.881195 445017 usertrap_amd64.go:225] [ 275( 268): 275( 268)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:56.881710 445017 task_exit.go:204] [ 275( 268): 275( 268)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.881915 445017 task_signals.go:204] [ 275( 268): 277( 270)] Signal 275, PID: 277, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.881980 445017 task_exit.go:204] [ 275( 268): 275( 268)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.882171 445017 task_signals.go:204] [ 275( 268): 276( 269)] Signal 275, PID: 276, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.882297 445017 task_exit.go:204] [ 275( 268): 276( 269)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.882438 445017 task_exit.go:204] [ 275( 268): 277( 270)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.882902 445017 task_exit.go:204] [ 275( 268): 276( 269)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.883012 445017 task_exit.go:204] [ 275( 268): 276( 269)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.886517 445017 task_exit.go:204] [ 275( 268): 277( 270)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.886666 445017 task_exit.go:204] [ 275( 268): 277( 270)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.886770 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.886896 445017 task_exit.go:204] [ 275( 268): 275( 268)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.895479 445017 usertrap_amd64.go:212] [ 278( 271): 278( 271)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.895594 445017 usertrap_amd64.go:122] [ 278( 271): 278( 271)] Allocate a new trap: 0xc00037eba0 28 D0719 21:52:56.896753 445017 usertrap_amd64.go:225] [ 278( 271): 278( 271)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.902884 445017 usertrap_amd64.go:212] [ 278( 271): 278( 271)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.902970 445017 usertrap_amd64.go:122] [ 278( 271): 278( 271)] Allocate a new trap: 0xc00037eba0 29 D0719 21:52:56.903052 445017 usertrap_amd64.go:225] [ 278( 271): 278( 271)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.904143 445017 usertrap_amd64.go:212] [ 278( 271): 278( 271)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.904246 445017 usertrap_amd64.go:122] [ 278( 271): 278( 271)] Allocate a new trap: 0xc00037eba0 30 D0719 21:52:56.904317 445017 usertrap_amd64.go:225] [ 278( 271): 278( 271)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.910185 445017 usertrap_amd64.go:212] [ 278( 271): 278( 271)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.910297 445017 usertrap_amd64.go:122] [ 278( 271): 278( 271)] Allocate a new trap: 0xc00037eba0 31 D0719 21:52:56.910373 445017 usertrap_amd64.go:225] [ 278( 271): 278( 271)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.910651 445017 usertrap_amd64.go:212] [ 278( 271): 278( 271)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.910707 445017 usertrap_amd64.go:122] [ 278( 271): 278( 271)] Allocate a new trap: 0xc00037eba0 32 D0719 21:52:56.910782 445017 usertrap_amd64.go:225] [ 278( 271): 278( 271)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.911479 445017 usertrap_amd64.go:212] [ 278( 271): 278( 271)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.911540 445017 usertrap_amd64.go:122] [ 278( 271): 278( 271)] Allocate a new trap: 0xc00037eba0 33 D0719 21:52:56.911638 445017 usertrap_amd64.go:225] [ 278( 271): 278( 271)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.912041 445017 usertrap_amd64.go:212] [ 278( 271): 279( 272)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:56.912108 445017 usertrap_amd64.go:122] [ 278( 271): 279( 272)] Allocate a new trap: 0xc00037eba0 34 D0719 21:52:56.912211 445017 usertrap_amd64.go:225] [ 278( 271): 279( 272)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:56.922343 445017 usertrap_amd64.go:212] [ 278( 271): 278( 271)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:56.922412 445017 usertrap_amd64.go:122] [ 278( 271): 278( 271)] Allocate a new trap: 0xc00037eba0 35 D0719 21:52:56.922526 445017 usertrap_amd64.go:225] [ 278( 271): 278( 271)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:56.925946 445017 usertrap_amd64.go:212] [ 278( 271): 278( 271)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:56.926044 445017 usertrap_amd64.go:122] [ 278( 271): 278( 271)] Allocate a new trap: 0xc00037eba0 36 D0719 21:52:56.926114 445017 usertrap_amd64.go:225] [ 278( 271): 278( 271)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:56.926646 445017 task_exit.go:204] [ 278( 271): 278( 271)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.926876 445017 task_exit.go:204] [ 278( 271): 278( 271)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.927077 445017 task_signals.go:204] [ 278( 271): 279( 272)] Signal 278, PID: 279, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.927180 445017 task_exit.go:204] [ 278( 271): 279( 272)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.927385 445017 task_exit.go:204] [ 278( 271): 279( 272)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.927461 445017 task_exit.go:204] [ 278( 271): 279( 272)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.927826 445017 task_signals.go:204] [ 278( 271): 280( 273)] Signal 278, PID: 280, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.927937 445017 task_exit.go:204] [ 278( 271): 280( 273)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.931179 445017 task_exit.go:204] [ 278( 271): 280( 273)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.931271 445017 task_exit.go:204] [ 278( 271): 280( 273)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.931383 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.932919 445017 task_exit.go:204] [ 278( 271): 278( 271)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.946440 445017 usertrap_amd64.go:212] [ 281( 274): 281( 274)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.946558 445017 usertrap_amd64.go:122] [ 281( 274): 281( 274)] Allocate a new trap: 0xc00037ecc0 28 D0719 21:52:56.947123 445017 usertrap_amd64.go:225] [ 281( 274): 281( 274)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.954224 445017 usertrap_amd64.go:212] [ 281( 274): 281( 274)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.954302 445017 usertrap_amd64.go:122] [ 281( 274): 281( 274)] Allocate a new trap: 0xc00037ecc0 29 D0719 21:52:56.954380 445017 usertrap_amd64.go:225] [ 281( 274): 281( 274)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.955268 445017 usertrap_amd64.go:212] [ 281( 274): 281( 274)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.955343 445017 usertrap_amd64.go:122] [ 281( 274): 281( 274)] Allocate a new trap: 0xc00037ecc0 30 D0719 21:52:56.955405 445017 usertrap_amd64.go:225] [ 281( 274): 281( 274)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.959144 445017 usertrap_amd64.go:212] [ 281( 274): 281( 274)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.959225 445017 usertrap_amd64.go:122] [ 281( 274): 281( 274)] Allocate a new trap: 0xc00037ecc0 31 D0719 21:52:56.959297 445017 usertrap_amd64.go:225] [ 281( 274): 281( 274)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.959565 445017 usertrap_amd64.go:212] [ 281( 274): 281( 274)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.959680 445017 usertrap_amd64.go:122] [ 281( 274): 281( 274)] Allocate a new trap: 0xc00037ecc0 32 D0719 21:52:56.959746 445017 usertrap_amd64.go:225] [ 281( 274): 281( 274)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.960375 445017 usertrap_amd64.go:212] [ 281( 274): 281( 274)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.960431 445017 usertrap_amd64.go:122] [ 281( 274): 281( 274)] Allocate a new trap: 0xc00037ecc0 33 D0719 21:52:56.960507 445017 usertrap_amd64.go:225] [ 281( 274): 281( 274)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.960782 445017 usertrap_amd64.go:212] [ 281( 274): 282( 275)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:56.960853 445017 usertrap_amd64.go:122] [ 281( 274): 282( 275)] Allocate a new trap: 0xc00037ecc0 34 D0719 21:52:56.960941 445017 usertrap_amd64.go:225] [ 281( 274): 282( 275)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:56.969293 445017 usertrap_amd64.go:212] [ 281( 274): 281( 274)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:56.969373 445017 usertrap_amd64.go:122] [ 281( 274): 281( 274)] Allocate a new trap: 0xc00037ecc0 35 D0719 21:52:56.969427 445017 usertrap_amd64.go:225] [ 281( 274): 281( 274)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:56.972126 445017 usertrap_amd64.go:212] [ 281( 274): 281( 274)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:56.972202 445017 usertrap_amd64.go:122] [ 281( 274): 281( 274)] Allocate a new trap: 0xc00037ecc0 36 D0719 21:52:56.972269 445017 usertrap_amd64.go:225] [ 281( 274): 281( 274)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:56.972846 445017 task_exit.go:204] [ 281( 274): 281( 274)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.973076 445017 task_exit.go:204] [ 281( 274): 281( 274)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.973207 445017 task_signals.go:204] [ 281( 274): 282( 275)] Signal 281, PID: 282, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.973209 445017 task_signals.go:204] [ 281( 274): 283( 276)] Signal 281, PID: 283, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:56.973305 445017 task_exit.go:204] [ 281( 274): 282( 275)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.973554 445017 task_exit.go:204] [ 281( 274): 283( 276)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:56.973923 445017 task_exit.go:204] [ 281( 274): 282( 275)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.973993 445017 task_exit.go:204] [ 281( 274): 282( 275)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.977129 445017 task_exit.go:204] [ 281( 274): 283( 276)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:56.977222 445017 task_exit.go:204] [ 281( 274): 283( 276)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.977306 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:56.978368 445017 task_exit.go:204] [ 281( 274): 281( 274)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:56.986329 445017 usertrap_amd64.go:212] [ 284( 277): 284( 277)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:56.986435 445017 usertrap_amd64.go:122] [ 284( 277): 284( 277)] Allocate a new trap: 0xc00037edb0 28 D0719 21:52:56.986860 445017 usertrap_amd64.go:225] [ 284( 277): 284( 277)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:56.990874 445017 usertrap_amd64.go:212] [ 284( 277): 284( 277)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:56.990938 445017 usertrap_amd64.go:122] [ 284( 277): 284( 277)] Allocate a new trap: 0xc00037edb0 29 D0719 21:52:56.991089 445017 usertrap_amd64.go:225] [ 284( 277): 284( 277)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:56.992238 445017 usertrap_amd64.go:212] [ 284( 277): 284( 277)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:56.992385 445017 usertrap_amd64.go:122] [ 284( 277): 284( 277)] Allocate a new trap: 0xc00037edb0 30 D0719 21:52:56.992491 445017 usertrap_amd64.go:225] [ 284( 277): 284( 277)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:56.998180 445017 usertrap_amd64.go:212] [ 284( 277): 284( 277)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:56.998280 445017 usertrap_amd64.go:122] [ 284( 277): 284( 277)] Allocate a new trap: 0xc00037edb0 31 D0719 21:52:56.998335 445017 usertrap_amd64.go:225] [ 284( 277): 284( 277)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:56.998653 445017 usertrap_amd64.go:212] [ 284( 277): 284( 277)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:56.998707 445017 usertrap_amd64.go:122] [ 284( 277): 284( 277)] Allocate a new trap: 0xc00037edb0 32 D0719 21:52:56.998765 445017 usertrap_amd64.go:225] [ 284( 277): 284( 277)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:56.999424 445017 usertrap_amd64.go:212] [ 284( 277): 284( 277)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:56.999544 445017 usertrap_amd64.go:122] [ 284( 277): 284( 277)] Allocate a new trap: 0xc00037edb0 33 D0719 21:52:56.999690 445017 usertrap_amd64.go:225] [ 284( 277): 284( 277)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:56.999946 445017 usertrap_amd64.go:212] [ 284( 277): 285( 278)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.000014 445017 usertrap_amd64.go:122] [ 284( 277): 285( 278)] Allocate a new trap: 0xc00037edb0 34 D0719 21:52:57.000209 445017 usertrap_amd64.go:225] [ 284( 277): 285( 278)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.009300 445017 usertrap_amd64.go:212] [ 284( 277): 284( 277)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.009458 445017 usertrap_amd64.go:122] [ 284( 277): 284( 277)] Allocate a new trap: 0xc00037edb0 35 D0719 21:52:57.009561 445017 usertrap_amd64.go:225] [ 284( 277): 284( 277)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.012445 445017 usertrap_amd64.go:212] [ 284( 277): 284( 277)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.012640 445017 usertrap_amd64.go:122] [ 284( 277): 284( 277)] Allocate a new trap: 0xc00037edb0 36 D0719 21:52:57.012858 445017 usertrap_amd64.go:225] [ 284( 277): 284( 277)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.013616 445017 task_exit.go:204] [ 284( 277): 284( 277)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.013959 445017 task_exit.go:204] [ 284( 277): 284( 277)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.014260 445017 task_signals.go:204] [ 284( 277): 285( 278)] Signal 284, PID: 285, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.014474 445017 task_signals.go:204] [ 284( 277): 286( 279)] Signal 284, PID: 286, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.014581 445017 task_exit.go:204] [ 284( 277): 285( 278)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.014829 445017 task_exit.go:204] [ 284( 277): 285( 278)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.014892 445017 task_exit.go:204] [ 284( 277): 285( 278)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.015015 445017 task_exit.go:204] [ 284( 277): 286( 279)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.018539 445017 task_exit.go:204] [ 284( 277): 286( 279)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.018608 445017 task_exit.go:204] [ 284( 277): 286( 279)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.018698 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.019663 445017 task_exit.go:204] [ 284( 277): 284( 277)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.026927 445017 usertrap_amd64.go:212] [ 287( 280): 287( 280)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.027004 445017 usertrap_amd64.go:122] [ 287( 280): 287( 280)] Allocate a new trap: 0xc00037ede0 28 D0719 21:52:57.027480 445017 usertrap_amd64.go:225] [ 287( 280): 287( 280)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.031676 445017 usertrap_amd64.go:212] [ 287( 280): 287( 280)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.031792 445017 usertrap_amd64.go:122] [ 287( 280): 287( 280)] Allocate a new trap: 0xc00037ede0 29 D0719 21:52:57.031929 445017 usertrap_amd64.go:225] [ 287( 280): 287( 280)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.033357 445017 usertrap_amd64.go:212] [ 287( 280): 287( 280)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.033509 445017 usertrap_amd64.go:122] [ 287( 280): 287( 280)] Allocate a new trap: 0xc00037ede0 30 D0719 21:52:57.033660 445017 usertrap_amd64.go:225] [ 287( 280): 287( 280)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.038735 445017 usertrap_amd64.go:212] [ 287( 280): 287( 280)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.038836 445017 usertrap_amd64.go:122] [ 287( 280): 287( 280)] Allocate a new trap: 0xc00037ede0 31 D0719 21:52:57.038905 445017 usertrap_amd64.go:225] [ 287( 280): 287( 280)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.039691 445017 usertrap_amd64.go:212] [ 287( 280): 287( 280)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.039762 445017 usertrap_amd64.go:122] [ 287( 280): 287( 280)] Allocate a new trap: 0xc00037ede0 32 D0719 21:52:57.039825 445017 usertrap_amd64.go:225] [ 287( 280): 287( 280)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.040357 445017 usertrap_amd64.go:212] [ 287( 280): 287( 280)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.040412 445017 usertrap_amd64.go:122] [ 287( 280): 287( 280)] Allocate a new trap: 0xc00037ede0 33 D0719 21:52:57.040471 445017 usertrap_amd64.go:225] [ 287( 280): 287( 280)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.040870 445017 usertrap_amd64.go:212] [ 287( 280): 288( 281)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.040932 445017 usertrap_amd64.go:122] [ 287( 280): 288( 281)] Allocate a new trap: 0xc00037ede0 34 D0719 21:52:57.040995 445017 usertrap_amd64.go:225] [ 287( 280): 288( 281)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.051894 445017 usertrap_amd64.go:212] [ 287( 280): 287( 280)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.051995 445017 usertrap_amd64.go:122] [ 287( 280): 287( 280)] Allocate a new trap: 0xc00037ede0 35 D0719 21:52:57.052067 445017 usertrap_amd64.go:225] [ 287( 280): 287( 280)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.056029 445017 usertrap_amd64.go:212] [ 287( 280): 287( 280)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.056122 445017 usertrap_amd64.go:122] [ 287( 280): 287( 280)] Allocate a new trap: 0xc00037ede0 36 D0719 21:52:57.056213 445017 usertrap_amd64.go:225] [ 287( 280): 287( 280)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.056791 445017 task_exit.go:204] [ 287( 280): 287( 280)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.056928 445017 task_signals.go:204] [ 287( 280): 289( 282)] Signal 287, PID: 289, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.057044 445017 task_exit.go:204] [ 287( 280): 287( 280)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.057058 445017 task_signals.go:204] [ 287( 280): 288( 281)] Signal 287, PID: 288, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.057185 445017 task_exit.go:204] [ 287( 280): 289( 282)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.057372 445017 task_exit.go:204] [ 287( 280): 288( 281)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.057604 445017 task_exit.go:204] [ 287( 280): 289( 282)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.057680 445017 task_exit.go:204] [ 287( 280): 289( 282)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.061000 445017 task_exit.go:204] [ 287( 280): 288( 281)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.061077 445017 task_exit.go:204] [ 287( 280): 288( 281)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.061159 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.061426 445017 task_exit.go:204] [ 287( 280): 287( 280)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.070259 445017 usertrap_amd64.go:212] [ 290( 283): 290( 283)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.070358 445017 usertrap_amd64.go:122] [ 290( 283): 290( 283)] Allocate a new trap: 0xc000bfa5d0 28 D0719 21:52:57.070797 445017 usertrap_amd64.go:225] [ 290( 283): 290( 283)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.077032 445017 usertrap_amd64.go:212] [ 290( 283): 290( 283)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.077131 445017 usertrap_amd64.go:122] [ 290( 283): 290( 283)] Allocate a new trap: 0xc000bfa5d0 29 D0719 21:52:57.077207 445017 usertrap_amd64.go:225] [ 290( 283): 290( 283)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.079839 445017 usertrap_amd64.go:212] [ 290( 283): 290( 283)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.079900 445017 usertrap_amd64.go:122] [ 290( 283): 290( 283)] Allocate a new trap: 0xc000bfa5d0 30 D0719 21:52:57.079964 445017 usertrap_amd64.go:225] [ 290( 283): 290( 283)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.088364 445017 usertrap_amd64.go:212] [ 290( 283): 290( 283)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.088447 445017 usertrap_amd64.go:122] [ 290( 283): 290( 283)] Allocate a new trap: 0xc000bfa5d0 31 D0719 21:52:57.088525 445017 usertrap_amd64.go:225] [ 290( 283): 290( 283)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.088804 445017 usertrap_amd64.go:212] [ 290( 283): 290( 283)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.088866 445017 usertrap_amd64.go:122] [ 290( 283): 290( 283)] Allocate a new trap: 0xc000bfa5d0 32 D0719 21:52:57.089037 445017 usertrap_amd64.go:225] [ 290( 283): 290( 283)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.090938 445017 usertrap_amd64.go:212] [ 290( 283): 290( 283)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.091026 445017 usertrap_amd64.go:122] [ 290( 283): 290( 283)] Allocate a new trap: 0xc000bfa5d0 33 D0719 21:52:57.091085 445017 usertrap_amd64.go:225] [ 290( 283): 290( 283)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.091556 445017 usertrap_amd64.go:212] [ 290( 283): 291( 284)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.091663 445017 usertrap_amd64.go:122] [ 290( 283): 291( 284)] Allocate a new trap: 0xc000bfa5d0 34 D0719 21:52:57.091751 445017 usertrap_amd64.go:225] [ 290( 283): 291( 284)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.098909 445017 usertrap_amd64.go:212] [ 290( 283): 290( 283)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.098997 445017 usertrap_amd64.go:122] [ 290( 283): 290( 283)] Allocate a new trap: 0xc000bfa5d0 35 D0719 21:52:57.099091 445017 usertrap_amd64.go:225] [ 290( 283): 290( 283)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.102262 445017 usertrap_amd64.go:212] [ 290( 283): 290( 283)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.102359 445017 usertrap_amd64.go:122] [ 290( 283): 290( 283)] Allocate a new trap: 0xc000bfa5d0 36 D0719 21:52:57.102453 445017 usertrap_amd64.go:225] [ 290( 283): 290( 283)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.103113 445017 task_exit.go:204] [ 290( 283): 290( 283)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.103348 445017 task_signals.go:204] [ 290( 283): 291( 284)] Signal 290, PID: 291, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.103481 445017 task_signals.go:204] [ 290( 283): 292( 285)] Signal 290, PID: 292, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.103559 445017 task_exit.go:204] [ 290( 283): 291( 284)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.103780 445017 task_exit.go:204] [ 290( 283): 292( 285)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.104110 445017 task_exit.go:204] [ 290( 283): 290( 283)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.104251 445017 task_exit.go:204] [ 290( 283): 292( 285)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.104315 445017 task_exit.go:204] [ 290( 283): 292( 285)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.107407 445017 task_exit.go:204] [ 290( 283): 291( 284)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.107529 445017 task_exit.go:204] [ 290( 283): 291( 284)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.107705 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.108681 445017 task_exit.go:204] [ 290( 283): 290( 283)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.117202 445017 usertrap_amd64.go:212] [ 293( 286): 293( 286)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.117302 445017 usertrap_amd64.go:122] [ 293( 286): 293( 286)] Allocate a new trap: 0xc000a684b0 28 D0719 21:52:57.117678 445017 usertrap_amd64.go:225] [ 293( 286): 293( 286)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.123019 445017 usertrap_amd64.go:212] [ 293( 286): 293( 286)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.123095 445017 usertrap_amd64.go:122] [ 293( 286): 293( 286)] Allocate a new trap: 0xc000a684b0 29 D0719 21:52:57.123210 445017 usertrap_amd64.go:225] [ 293( 286): 293( 286)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.124489 445017 usertrap_amd64.go:212] [ 293( 286): 293( 286)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.124588 445017 usertrap_amd64.go:122] [ 293( 286): 293( 286)] Allocate a new trap: 0xc000a684b0 30 D0719 21:52:57.124669 445017 usertrap_amd64.go:225] [ 293( 286): 293( 286)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.129300 445017 usertrap_amd64.go:212] [ 293( 286): 293( 286)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.129377 445017 usertrap_amd64.go:122] [ 293( 286): 293( 286)] Allocate a new trap: 0xc000a684b0 31 D0719 21:52:57.129463 445017 usertrap_amd64.go:225] [ 293( 286): 293( 286)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.129763 445017 usertrap_amd64.go:212] [ 293( 286): 293( 286)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.129819 445017 usertrap_amd64.go:122] [ 293( 286): 293( 286)] Allocate a new trap: 0xc000a684b0 32 D0719 21:52:57.129902 445017 usertrap_amd64.go:225] [ 293( 286): 293( 286)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.130788 445017 usertrap_amd64.go:212] [ 293( 286): 293( 286)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.130854 445017 usertrap_amd64.go:122] [ 293( 286): 293( 286)] Allocate a new trap: 0xc000a684b0 33 D0719 21:52:57.130949 445017 usertrap_amd64.go:225] [ 293( 286): 293( 286)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.131594 445017 usertrap_amd64.go:212] [ 293( 286): 294( 287)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.131720 445017 usertrap_amd64.go:122] [ 293( 286): 294( 287)] Allocate a new trap: 0xc000a684b0 34 D0719 21:52:57.131951 445017 usertrap_amd64.go:225] [ 293( 286): 294( 287)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.144976 445017 usertrap_amd64.go:212] [ 293( 286): 293( 286)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.145099 445017 usertrap_amd64.go:122] [ 293( 286): 293( 286)] Allocate a new trap: 0xc000a684b0 35 D0719 21:52:57.145165 445017 usertrap_amd64.go:225] [ 293( 286): 293( 286)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.149949 445017 usertrap_amd64.go:212] [ 293( 286): 293( 286)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.150069 445017 usertrap_amd64.go:122] [ 293( 286): 293( 286)] Allocate a new trap: 0xc000a684b0 36 D0719 21:52:57.150216 445017 usertrap_amd64.go:225] [ 293( 286): 293( 286)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.151019 445017 task_exit.go:204] [ 293( 286): 293( 286)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.151201 445017 task_signals.go:204] [ 293( 286): 295( 288)] Signal 293, PID: 295, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.151354 445017 task_signals.go:204] [ 293( 286): 294( 287)] Signal 293, PID: 294, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.151416 445017 task_exit.go:204] [ 293( 286): 293( 286)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.151644 445017 task_exit.go:204] [ 293( 286): 294( 287)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.151819 445017 task_signals.go:204] [ 293( 286): 296( 289)] Signal 293, PID: 296, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.151870 445017 task_exit.go:204] [ 293( 286): 295( 288)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.151990 445017 task_exit.go:204] [ 293( 286): 296( 289)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.152260 445017 task_exit.go:204] [ 293( 286): 295( 288)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.152331 445017 task_exit.go:204] [ 293( 286): 295( 288)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.152490 445017 task_exit.go:204] [ 293( 286): 294( 287)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.152557 445017 task_exit.go:204] [ 293( 286): 294( 287)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.155285 445017 task_exit.go:204] [ 293( 286): 296( 289)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.155348 445017 task_exit.go:204] [ 293( 286): 296( 289)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.155479 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.158033 445017 task_exit.go:204] [ 293( 286): 293( 286)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.167694 445017 usertrap_amd64.go:212] [ 297( 290): 297( 290)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.167915 445017 usertrap_amd64.go:122] [ 297( 290): 297( 290)] Allocate a new trap: 0xc000b12540 28 D0719 21:52:57.168439 445017 usertrap_amd64.go:225] [ 297( 290): 297( 290)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.172441 445017 usertrap_amd64.go:212] [ 297( 290): 297( 290)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.172525 445017 usertrap_amd64.go:122] [ 297( 290): 297( 290)] Allocate a new trap: 0xc000b12540 29 D0719 21:52:57.172598 445017 usertrap_amd64.go:225] [ 297( 290): 297( 290)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.173823 445017 usertrap_amd64.go:212] [ 297( 290): 297( 290)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.173891 445017 usertrap_amd64.go:122] [ 297( 290): 297( 290)] Allocate a new trap: 0xc000b12540 30 D0719 21:52:57.173943 445017 usertrap_amd64.go:225] [ 297( 290): 297( 290)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.178169 445017 usertrap_amd64.go:212] [ 297( 290): 297( 290)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.178258 445017 usertrap_amd64.go:122] [ 297( 290): 297( 290)] Allocate a new trap: 0xc000b12540 31 D0719 21:52:57.178343 445017 usertrap_amd64.go:225] [ 297( 290): 297( 290)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.178649 445017 usertrap_amd64.go:212] [ 297( 290): 297( 290)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.178707 445017 usertrap_amd64.go:122] [ 297( 290): 297( 290)] Allocate a new trap: 0xc000b12540 32 D0719 21:52:57.178783 445017 usertrap_amd64.go:225] [ 297( 290): 297( 290)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.179585 445017 usertrap_amd64.go:212] [ 297( 290): 297( 290)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.179703 445017 usertrap_amd64.go:122] [ 297( 290): 297( 290)] Allocate a new trap: 0xc000b12540 33 D0719 21:52:57.179875 445017 usertrap_amd64.go:225] [ 297( 290): 297( 290)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.180188 445017 usertrap_amd64.go:212] [ 297( 290): 298( 291)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.180269 445017 usertrap_amd64.go:122] [ 297( 290): 298( 291)] Allocate a new trap: 0xc000b12540 34 D0719 21:52:57.180343 445017 usertrap_amd64.go:225] [ 297( 290): 298( 291)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.188562 445017 usertrap_amd64.go:212] [ 297( 290): 297( 290)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.188649 445017 usertrap_amd64.go:122] [ 297( 290): 297( 290)] Allocate a new trap: 0xc000b12540 35 D0719 21:52:57.188725 445017 usertrap_amd64.go:225] [ 297( 290): 297( 290)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.191690 445017 usertrap_amd64.go:212] [ 297( 290): 297( 290)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.191765 445017 usertrap_amd64.go:122] [ 297( 290): 297( 290)] Allocate a new trap: 0xc000b12540 36 D0719 21:52:57.191835 445017 usertrap_amd64.go:225] [ 297( 290): 297( 290)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.192595 445017 task_exit.go:204] [ 297( 290): 297( 290)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.192835 445017 task_signals.go:204] [ 297( 290): 299( 292)] Signal 297, PID: 299, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.192907 445017 task_exit.go:204] [ 297( 290): 297( 290)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.193160 445017 task_exit.go:204] [ 297( 290): 299( 292)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.193289 445017 task_signals.go:204] [ 297( 290): 298( 291)] Signal 297, PID: 298, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.193423 445017 task_exit.go:204] [ 297( 290): 298( 291)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.193645 445017 task_exit.go:204] [ 297( 290): 299( 292)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.193723 445017 task_exit.go:204] [ 297( 290): 299( 292)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.196840 445017 task_exit.go:204] [ 297( 290): 298( 291)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.196932 445017 task_exit.go:204] [ 297( 290): 298( 291)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.197034 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.197781 445017 task_exit.go:204] [ 297( 290): 297( 290)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.208472 445017 usertrap_amd64.go:212] [ 300( 293): 300( 293)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.208617 445017 usertrap_amd64.go:122] [ 300( 293): 300( 293)] Allocate a new trap: 0xc00030f6b0 28 D0719 21:52:57.209122 445017 usertrap_amd64.go:225] [ 300( 293): 300( 293)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.216241 445017 usertrap_amd64.go:212] [ 300( 293): 300( 293)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.216313 445017 usertrap_amd64.go:122] [ 300( 293): 300( 293)] Allocate a new trap: 0xc00030f6b0 29 D0719 21:52:57.216388 445017 usertrap_amd64.go:225] [ 300( 293): 300( 293)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.217433 445017 usertrap_amd64.go:212] [ 300( 293): 300( 293)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.217508 445017 usertrap_amd64.go:122] [ 300( 293): 300( 293)] Allocate a new trap: 0xc00030f6b0 30 D0719 21:52:57.217577 445017 usertrap_amd64.go:225] [ 300( 293): 300( 293)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.222021 445017 usertrap_amd64.go:212] [ 300( 293): 300( 293)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.222107 445017 usertrap_amd64.go:122] [ 300( 293): 300( 293)] Allocate a new trap: 0xc00030f6b0 31 D0719 21:52:57.222197 445017 usertrap_amd64.go:225] [ 300( 293): 300( 293)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.222946 445017 usertrap_amd64.go:212] [ 300( 293): 300( 293)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.222990 445017 usertrap_amd64.go:122] [ 300( 293): 300( 293)] Allocate a new trap: 0xc00030f6b0 32 D0719 21:52:57.223063 445017 usertrap_amd64.go:225] [ 300( 293): 300( 293)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.223808 445017 usertrap_amd64.go:212] [ 300( 293): 300( 293)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.223866 445017 usertrap_amd64.go:122] [ 300( 293): 300( 293)] Allocate a new trap: 0xc00030f6b0 33 D0719 21:52:57.223940 445017 usertrap_amd64.go:225] [ 300( 293): 300( 293)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.224148 445017 usertrap_amd64.go:212] [ 300( 293): 301( 294)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.224228 445017 usertrap_amd64.go:122] [ 300( 293): 301( 294)] Allocate a new trap: 0xc00030f6b0 34 D0719 21:52:57.224294 445017 usertrap_amd64.go:225] [ 300( 293): 301( 294)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.233180 445017 usertrap_amd64.go:212] [ 300( 293): 300( 293)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.233275 445017 usertrap_amd64.go:122] [ 300( 293): 300( 293)] Allocate a new trap: 0xc00030f6b0 35 D0719 21:52:57.233365 445017 usertrap_amd64.go:225] [ 300( 293): 300( 293)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.236062 445017 usertrap_amd64.go:212] [ 300( 293): 300( 293)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.236211 445017 usertrap_amd64.go:122] [ 300( 293): 300( 293)] Allocate a new trap: 0xc00030f6b0 36 D0719 21:52:57.236293 445017 usertrap_amd64.go:225] [ 300( 293): 300( 293)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.247923 445017 task_exit.go:204] [ 300( 293): 300( 293)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.248200 445017 task_exit.go:204] [ 300( 293): 300( 293)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.248181 445017 task_signals.go:204] [ 300( 293): 301( 294)] Signal 300, PID: 301, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.248319 445017 task_exit.go:204] [ 300( 293): 301( 294)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.248505 445017 task_signals.go:204] [ 300( 293): 302( 295)] Signal 300, PID: 302, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.248787 445017 task_exit.go:204] [ 300( 293): 301( 294)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.248861 445017 task_exit.go:204] [ 300( 293): 301( 294)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.249035 445017 task_exit.go:204] [ 300( 293): 302( 295)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.253050 445017 task_exit.go:204] [ 300( 293): 302( 295)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.253142 445017 task_exit.go:204] [ 300( 293): 302( 295)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.253264 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.254212 445017 task_exit.go:204] [ 300( 293): 300( 293)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.263721 445017 usertrap_amd64.go:212] [ 303( 296): 303( 296)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.263811 445017 usertrap_amd64.go:122] [ 303( 296): 303( 296)] Allocate a new trap: 0xc000b12660 28 D0719 21:52:57.264278 445017 usertrap_amd64.go:225] [ 303( 296): 303( 296)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.268177 445017 usertrap_amd64.go:212] [ 303( 296): 303( 296)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.268286 445017 usertrap_amd64.go:122] [ 303( 296): 303( 296)] Allocate a new trap: 0xc000b12660 29 D0719 21:52:57.268386 445017 usertrap_amd64.go:225] [ 303( 296): 303( 296)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.270958 445017 usertrap_amd64.go:212] [ 303( 296): 303( 296)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.271082 445017 usertrap_amd64.go:122] [ 303( 296): 303( 296)] Allocate a new trap: 0xc000b12660 30 D0719 21:52:57.271200 445017 usertrap_amd64.go:225] [ 303( 296): 303( 296)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.276253 445017 usertrap_amd64.go:212] [ 303( 296): 303( 296)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.276323 445017 usertrap_amd64.go:122] [ 303( 296): 303( 296)] Allocate a new trap: 0xc000b12660 31 D0719 21:52:57.276421 445017 usertrap_amd64.go:225] [ 303( 296): 303( 296)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.276642 445017 usertrap_amd64.go:212] [ 303( 296): 303( 296)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.276712 445017 usertrap_amd64.go:122] [ 303( 296): 303( 296)] Allocate a new trap: 0xc000b12660 32 D0719 21:52:57.276782 445017 usertrap_amd64.go:225] [ 303( 296): 303( 296)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.277424 445017 usertrap_amd64.go:212] [ 303( 296): 303( 296)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.277487 445017 usertrap_amd64.go:122] [ 303( 296): 303( 296)] Allocate a new trap: 0xc000b12660 33 D0719 21:52:57.277569 445017 usertrap_amd64.go:225] [ 303( 296): 303( 296)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.278338 445017 usertrap_amd64.go:212] [ 303( 296): 304( 297)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.278424 445017 usertrap_amd64.go:122] [ 303( 296): 304( 297)] Allocate a new trap: 0xc000b12660 34 D0719 21:52:57.278564 445017 usertrap_amd64.go:225] [ 303( 296): 304( 297)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.288992 445017 usertrap_amd64.go:212] [ 303( 296): 303( 296)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.289092 445017 usertrap_amd64.go:122] [ 303( 296): 303( 296)] Allocate a new trap: 0xc000b12660 35 D0719 21:52:57.289207 445017 usertrap_amd64.go:225] [ 303( 296): 303( 296)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.293312 445017 usertrap_amd64.go:212] [ 303( 296): 303( 296)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.293388 445017 usertrap_amd64.go:122] [ 303( 296): 303( 296)] Allocate a new trap: 0xc000b12660 36 D0719 21:52:57.293479 445017 usertrap_amd64.go:225] [ 303( 296): 303( 296)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.293964 445017 task_exit.go:204] [ 303( 296): 303( 296)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.294065 445017 task_signals.go:204] [ 303( 296): 305( 298)] Signal 303, PID: 305, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.294196 445017 task_exit.go:204] [ 303( 296): 305( 298)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.294357 445017 task_signals.go:204] [ 303( 296): 304( 297)] Signal 303, PID: 304, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.294487 445017 task_exit.go:204] [ 303( 296): 304( 297)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.294705 445017 task_exit.go:204] [ 303( 296): 305( 298)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.294786 445017 task_exit.go:204] [ 303( 296): 305( 298)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.294954 445017 task_exit.go:204] [ 303( 296): 303( 296)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.297750 445017 task_exit.go:204] [ 303( 296): 304( 297)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.297807 445017 task_exit.go:204] [ 303( 296): 304( 297)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.297870 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.299238 445017 task_exit.go:204] [ 303( 296): 303( 296)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.308569 445017 usertrap_amd64.go:212] [ 306( 299): 306( 299)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.308678 445017 usertrap_amd64.go:122] [ 306( 299): 306( 299)] Allocate a new trap: 0xc000048180 28 D0719 21:52:57.309263 445017 usertrap_amd64.go:225] [ 306( 299): 306( 299)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.313357 445017 usertrap_amd64.go:212] [ 306( 299): 306( 299)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.313408 445017 usertrap_amd64.go:122] [ 306( 299): 306( 299)] Allocate a new trap: 0xc000048180 29 D0719 21:52:57.313456 445017 usertrap_amd64.go:225] [ 306( 299): 306( 299)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.314363 445017 usertrap_amd64.go:212] [ 306( 299): 306( 299)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.314419 445017 usertrap_amd64.go:122] [ 306( 299): 306( 299)] Allocate a new trap: 0xc000048180 30 D0719 21:52:57.314470 445017 usertrap_amd64.go:225] [ 306( 299): 306( 299)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.319532 445017 usertrap_amd64.go:212] [ 306( 299): 306( 299)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.319645 445017 usertrap_amd64.go:122] [ 306( 299): 306( 299)] Allocate a new trap: 0xc000048180 31 D0719 21:52:57.319733 445017 usertrap_amd64.go:225] [ 306( 299): 306( 299)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.320072 445017 usertrap_amd64.go:212] [ 306( 299): 306( 299)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.320130 445017 usertrap_amd64.go:122] [ 306( 299): 306( 299)] Allocate a new trap: 0xc000048180 32 D0719 21:52:57.320231 445017 usertrap_amd64.go:225] [ 306( 299): 306( 299)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.320838 445017 usertrap_amd64.go:212] [ 306( 299): 306( 299)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.320922 445017 usertrap_amd64.go:122] [ 306( 299): 306( 299)] Allocate a new trap: 0xc000048180 33 D0719 21:52:57.321019 445017 usertrap_amd64.go:225] [ 306( 299): 306( 299)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.321862 445017 usertrap_amd64.go:212] [ 306( 299): 307( 300)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.321954 445017 usertrap_amd64.go:122] [ 306( 299): 307( 300)] Allocate a new trap: 0xc000048180 34 D0719 21:52:57.322196 445017 usertrap_amd64.go:225] [ 306( 299): 307( 300)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.332550 445017 usertrap_amd64.go:212] [ 306( 299): 306( 299)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.332673 445017 usertrap_amd64.go:122] [ 306( 299): 306( 299)] Allocate a new trap: 0xc000048180 35 D0719 21:52:57.332767 445017 usertrap_amd64.go:225] [ 306( 299): 306( 299)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.335719 445017 usertrap_amd64.go:212] [ 306( 299): 306( 299)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.335880 445017 usertrap_amd64.go:122] [ 306( 299): 306( 299)] Allocate a new trap: 0xc000048180 36 D0719 21:52:57.336004 445017 usertrap_amd64.go:225] [ 306( 299): 306( 299)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.336732 445017 task_exit.go:204] [ 306( 299): 306( 299)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.337024 445017 task_exit.go:204] [ 306( 299): 306( 299)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.337014 445017 task_signals.go:204] [ 306( 299): 307( 300)] Signal 306, PID: 307, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.337197 445017 task_signals.go:204] [ 306( 299): 308( 301)] Signal 306, PID: 308, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.337271 445017 task_exit.go:204] [ 306( 299): 307( 300)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.337667 445017 task_exit.go:204] [ 306( 299): 307( 300)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.337721 445017 task_exit.go:204] [ 306( 299): 307( 300)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.338072 445017 task_exit.go:204] [ 306( 299): 308( 301)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.341574 445017 task_exit.go:204] [ 306( 299): 308( 301)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.341643 445017 task_exit.go:204] [ 306( 299): 308( 301)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.341728 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.341836 445017 task_exit.go:204] [ 306( 299): 306( 299)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.352542 445017 usertrap_amd64.go:212] [ 309( 302): 309( 302)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.352657 445017 usertrap_amd64.go:122] [ 309( 302): 309( 302)] Allocate a new trap: 0xc00037f0b0 28 D0719 21:52:57.353029 445017 usertrap_amd64.go:225] [ 309( 302): 309( 302)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.357227 445017 usertrap_amd64.go:212] [ 309( 302): 309( 302)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.357336 445017 usertrap_amd64.go:122] [ 309( 302): 309( 302)] Allocate a new trap: 0xc00037f0b0 29 D0719 21:52:57.357432 445017 usertrap_amd64.go:225] [ 309( 302): 309( 302)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.358531 445017 usertrap_amd64.go:212] [ 309( 302): 309( 302)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.358607 445017 usertrap_amd64.go:122] [ 309( 302): 309( 302)] Allocate a new trap: 0xc00037f0b0 30 D0719 21:52:57.358707 445017 usertrap_amd64.go:225] [ 309( 302): 309( 302)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.363422 445017 usertrap_amd64.go:212] [ 309( 302): 309( 302)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.363521 445017 usertrap_amd64.go:122] [ 309( 302): 309( 302)] Allocate a new trap: 0xc00037f0b0 31 D0719 21:52:57.363595 445017 usertrap_amd64.go:225] [ 309( 302): 309( 302)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.363879 445017 usertrap_amd64.go:212] [ 309( 302): 309( 302)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.363935 445017 usertrap_amd64.go:122] [ 309( 302): 309( 302)] Allocate a new trap: 0xc00037f0b0 32 D0719 21:52:57.364028 445017 usertrap_amd64.go:225] [ 309( 302): 309( 302)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.364628 445017 usertrap_amd64.go:212] [ 309( 302): 309( 302)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.364710 445017 usertrap_amd64.go:122] [ 309( 302): 309( 302)] Allocate a new trap: 0xc00037f0b0 33 D0719 21:52:57.364785 445017 usertrap_amd64.go:225] [ 309( 302): 309( 302)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.365209 445017 usertrap_amd64.go:212] [ 309( 302): 310( 303)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.365284 445017 usertrap_amd64.go:122] [ 309( 302): 310( 303)] Allocate a new trap: 0xc00037f0b0 34 D0719 21:52:57.365365 445017 usertrap_amd64.go:225] [ 309( 302): 310( 303)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.372530 445017 usertrap_amd64.go:212] [ 309( 302): 309( 302)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.372612 445017 usertrap_amd64.go:122] [ 309( 302): 309( 302)] Allocate a new trap: 0xc00037f0b0 35 D0719 21:52:57.372687 445017 usertrap_amd64.go:225] [ 309( 302): 309( 302)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.374842 445017 usertrap_amd64.go:212] [ 309( 302): 309( 302)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.374902 445017 usertrap_amd64.go:122] [ 309( 302): 309( 302)] Allocate a new trap: 0xc00037f0b0 36 D0719 21:52:57.374951 445017 usertrap_amd64.go:225] [ 309( 302): 309( 302)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.375399 445017 task_exit.go:204] [ 309( 302): 309( 302)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.375508 445017 task_signals.go:204] [ 309( 302): 311( 304)] Signal 309, PID: 311, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.375513 445017 task_signals.go:204] [ 309( 302): 310( 303)] Signal 309, PID: 310, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.375689 445017 task_exit.go:204] [ 309( 302): 311( 304)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.375930 445017 task_exit.go:204] [ 309( 302): 309( 302)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.376126 445017 task_exit.go:204] [ 309( 302): 310( 303)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.376342 445017 task_exit.go:204] [ 309( 302): 311( 304)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.376403 445017 task_exit.go:204] [ 309( 302): 311( 304)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.378917 445017 task_exit.go:204] [ 309( 302): 310( 303)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.378974 445017 task_exit.go:204] [ 309( 302): 310( 303)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.379059 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.379786 445017 task_exit.go:204] [ 309( 302): 309( 302)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.387315 445017 usertrap_amd64.go:212] [ 312( 305): 312( 305)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.387413 445017 usertrap_amd64.go:122] [ 312( 305): 312( 305)] Allocate a new trap: 0xc001466030 28 D0719 21:52:57.387847 445017 usertrap_amd64.go:225] [ 312( 305): 312( 305)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.391994 445017 usertrap_amd64.go:212] [ 312( 305): 312( 305)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.392100 445017 usertrap_amd64.go:122] [ 312( 305): 312( 305)] Allocate a new trap: 0xc001466030 29 D0719 21:52:57.392246 445017 usertrap_amd64.go:225] [ 312( 305): 312( 305)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.394623 445017 usertrap_amd64.go:212] [ 312( 305): 312( 305)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.394701 445017 usertrap_amd64.go:122] [ 312( 305): 312( 305)] Allocate a new trap: 0xc001466030 30 D0719 21:52:57.394770 445017 usertrap_amd64.go:225] [ 312( 305): 312( 305)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.400234 445017 usertrap_amd64.go:212] [ 312( 305): 312( 305)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.400432 445017 usertrap_amd64.go:122] [ 312( 305): 312( 305)] Allocate a new trap: 0xc001466030 31 D0719 21:52:57.400547 445017 usertrap_amd64.go:225] [ 312( 305): 312( 305)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.400777 445017 usertrap_amd64.go:212] [ 312( 305): 312( 305)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.400828 445017 usertrap_amd64.go:122] [ 312( 305): 312( 305)] Allocate a new trap: 0xc001466030 32 D0719 21:52:57.400878 445017 usertrap_amd64.go:225] [ 312( 305): 312( 305)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.401466 445017 usertrap_amd64.go:212] [ 312( 305): 312( 305)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.401519 445017 usertrap_amd64.go:122] [ 312( 305): 312( 305)] Allocate a new trap: 0xc001466030 33 D0719 21:52:57.401579 445017 usertrap_amd64.go:225] [ 312( 305): 312( 305)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.401914 445017 usertrap_amd64.go:212] [ 312( 305): 313( 306)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.402030 445017 usertrap_amd64.go:122] [ 312( 305): 313( 306)] Allocate a new trap: 0xc001466030 34 D0719 21:52:57.402105 445017 usertrap_amd64.go:225] [ 312( 305): 313( 306)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.412033 445017 usertrap_amd64.go:212] [ 312( 305): 312( 305)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.412102 445017 usertrap_amd64.go:122] [ 312( 305): 312( 305)] Allocate a new trap: 0xc001466030 35 D0719 21:52:57.412193 445017 usertrap_amd64.go:225] [ 312( 305): 312( 305)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.414497 445017 usertrap_amd64.go:212] [ 312( 305): 312( 305)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.414560 445017 usertrap_amd64.go:122] [ 312( 305): 312( 305)] Allocate a new trap: 0xc001466030 36 D0719 21:52:57.414635 445017 usertrap_amd64.go:225] [ 312( 305): 312( 305)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.415099 445017 task_exit.go:204] [ 312( 305): 312( 305)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.415288 445017 task_signals.go:204] [ 312( 305): 314( 307)] Signal 312, PID: 314, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.415404 445017 task_signals.go:204] [ 312( 305): 313( 306)] Signal 312, PID: 313, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.415458 445017 task_exit.go:204] [ 312( 305): 314( 307)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.415575 445017 task_exit.go:204] [ 312( 305): 313( 306)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.415978 445017 task_exit.go:204] [ 312( 305): 312( 305)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.416073 445017 task_exit.go:204] [ 312( 305): 313( 306)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.416142 445017 task_exit.go:204] [ 312( 305): 313( 306)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.419369 445017 task_exit.go:204] [ 312( 305): 314( 307)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.419435 445017 task_exit.go:204] [ 312( 305): 314( 307)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.419563 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.420246 445017 task_exit.go:204] [ 312( 305): 312( 305)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.427278 445017 usertrap_amd64.go:212] [ 315( 308): 315( 308)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.427373 445017 usertrap_amd64.go:122] [ 315( 308): 315( 308)] Allocate a new trap: 0xc000a685a0 28 D0719 21:52:57.427981 445017 usertrap_amd64.go:225] [ 315( 308): 315( 308)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.432114 445017 usertrap_amd64.go:212] [ 315( 308): 315( 308)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.432189 445017 usertrap_amd64.go:122] [ 315( 308): 315( 308)] Allocate a new trap: 0xc000a685a0 29 D0719 21:52:57.432274 445017 usertrap_amd64.go:225] [ 315( 308): 315( 308)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.433111 445017 usertrap_amd64.go:212] [ 315( 308): 315( 308)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.433188 445017 usertrap_amd64.go:122] [ 315( 308): 315( 308)] Allocate a new trap: 0xc000a685a0 30 D0719 21:52:57.433246 445017 usertrap_amd64.go:225] [ 315( 308): 315( 308)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.437147 445017 usertrap_amd64.go:212] [ 315( 308): 315( 308)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.437224 445017 usertrap_amd64.go:122] [ 315( 308): 315( 308)] Allocate a new trap: 0xc000a685a0 31 D0719 21:52:57.437289 445017 usertrap_amd64.go:225] [ 315( 308): 315( 308)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.437570 445017 usertrap_amd64.go:212] [ 315( 308): 315( 308)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.437635 445017 usertrap_amd64.go:122] [ 315( 308): 315( 308)] Allocate a new trap: 0xc000a685a0 32 D0719 21:52:57.437696 445017 usertrap_amd64.go:225] [ 315( 308): 315( 308)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.438351 445017 usertrap_amd64.go:212] [ 315( 308): 315( 308)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.438419 445017 usertrap_amd64.go:122] [ 315( 308): 315( 308)] Allocate a new trap: 0xc000a685a0 33 D0719 21:52:57.438502 445017 usertrap_amd64.go:225] [ 315( 308): 315( 308)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.438691 445017 usertrap_amd64.go:212] [ 315( 308): 316( 309)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.438768 445017 usertrap_amd64.go:122] [ 315( 308): 316( 309)] Allocate a new trap: 0xc000a685a0 34 D0719 21:52:57.438822 445017 usertrap_amd64.go:225] [ 315( 308): 316( 309)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.447649 445017 usertrap_amd64.go:212] [ 315( 308): 315( 308)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.447764 445017 usertrap_amd64.go:122] [ 315( 308): 315( 308)] Allocate a new trap: 0xc000a685a0 35 D0719 21:52:57.447940 445017 usertrap_amd64.go:225] [ 315( 308): 315( 308)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.451585 445017 usertrap_amd64.go:212] [ 315( 308): 315( 308)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.451695 445017 usertrap_amd64.go:122] [ 315( 308): 315( 308)] Allocate a new trap: 0xc000a685a0 36 D0719 21:52:57.451798 445017 usertrap_amd64.go:225] [ 315( 308): 315( 308)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.452273 445017 task_exit.go:204] [ 315( 308): 315( 308)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.452522 445017 task_signals.go:204] [ 315( 308): 317( 310)] Signal 315, PID: 317, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.452576 445017 task_signals.go:204] [ 315( 308): 316( 309)] Signal 315, PID: 316, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.452670 445017 task_exit.go:204] [ 315( 308): 317( 310)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.452809 445017 task_exit.go:204] [ 315( 308): 315( 308)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.453002 445017 task_exit.go:204] [ 315( 308): 316( 309)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.453233 445017 task_exit.go:204] [ 315( 308): 316( 309)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.453279 445017 task_exit.go:204] [ 315( 308): 316( 309)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.456536 445017 task_exit.go:204] [ 315( 308): 317( 310)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.456619 445017 task_exit.go:204] [ 315( 308): 317( 310)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.456712 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.457635 445017 task_exit.go:204] [ 315( 308): 315( 308)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.464584 445017 usertrap_amd64.go:212] [ 318( 311): 318( 311)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.464679 445017 usertrap_amd64.go:122] [ 318( 311): 318( 311)] Allocate a new trap: 0xc000b12870 28 D0719 21:52:57.465135 445017 usertrap_amd64.go:225] [ 318( 311): 318( 311)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.469498 445017 usertrap_amd64.go:212] [ 318( 311): 318( 311)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.469582 445017 usertrap_amd64.go:122] [ 318( 311): 318( 311)] Allocate a new trap: 0xc000b12870 29 D0719 21:52:57.469674 445017 usertrap_amd64.go:225] [ 318( 311): 318( 311)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.470495 445017 usertrap_amd64.go:212] [ 318( 311): 318( 311)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.470550 445017 usertrap_amd64.go:122] [ 318( 311): 318( 311)] Allocate a new trap: 0xc000b12870 30 D0719 21:52:57.470602 445017 usertrap_amd64.go:225] [ 318( 311): 318( 311)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.473779 445017 usertrap_amd64.go:212] [ 318( 311): 318( 311)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.473829 445017 usertrap_amd64.go:122] [ 318( 311): 318( 311)] Allocate a new trap: 0xc000b12870 31 D0719 21:52:57.473874 445017 usertrap_amd64.go:225] [ 318( 311): 318( 311)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.474061 445017 usertrap_amd64.go:212] [ 318( 311): 318( 311)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.474117 445017 usertrap_amd64.go:122] [ 318( 311): 318( 311)] Allocate a new trap: 0xc000b12870 32 D0719 21:52:57.474170 445017 usertrap_amd64.go:225] [ 318( 311): 318( 311)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.474720 445017 usertrap_amd64.go:212] [ 318( 311): 318( 311)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.474785 445017 usertrap_amd64.go:122] [ 318( 311): 318( 311)] Allocate a new trap: 0xc000b12870 33 D0719 21:52:57.474860 445017 usertrap_amd64.go:225] [ 318( 311): 318( 311)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.475258 445017 usertrap_amd64.go:212] [ 318( 311): 319( 312)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.475348 445017 usertrap_amd64.go:122] [ 318( 311): 319( 312)] Allocate a new trap: 0xc000b12870 34 D0719 21:52:57.475445 445017 usertrap_amd64.go:225] [ 318( 311): 319( 312)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.481999 445017 usertrap_amd64.go:212] [ 318( 311): 318( 311)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.482098 445017 usertrap_amd64.go:122] [ 318( 311): 318( 311)] Allocate a new trap: 0xc000b12870 35 D0719 21:52:57.482171 445017 usertrap_amd64.go:225] [ 318( 311): 318( 311)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.485210 445017 usertrap_amd64.go:212] [ 318( 311): 318( 311)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.485291 445017 usertrap_amd64.go:122] [ 318( 311): 318( 311)] Allocate a new trap: 0xc000b12870 36 D0719 21:52:57.485425 445017 usertrap_amd64.go:225] [ 318( 311): 318( 311)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.485997 445017 task_exit.go:204] [ 318( 311): 318( 311)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.486347 445017 task_signals.go:204] [ 318( 311): 320( 313)] Signal 318, PID: 320, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.486377 445017 task_signals.go:204] [ 318( 311): 319( 312)] Signal 318, PID: 319, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.486472 445017 task_exit.go:204] [ 318( 311): 318( 311)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.486597 445017 task_exit.go:204] [ 318( 311): 320( 313)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.486823 445017 task_exit.go:204] [ 318( 311): 320( 313)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.486862 445017 task_exit.go:204] [ 318( 311): 320( 313)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.486963 445017 task_exit.go:204] [ 318( 311): 319( 312)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.490375 445017 task_exit.go:204] [ 318( 311): 319( 312)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.490442 445017 task_exit.go:204] [ 318( 311): 319( 312)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.490505 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.490984 445017 task_exit.go:204] [ 318( 311): 318( 311)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.497578 445017 usertrap_amd64.go:212] [ 321( 314): 321( 314)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.497690 445017 usertrap_amd64.go:122] [ 321( 314): 321( 314)] Allocate a new trap: 0xc000b128a0 28 D0719 21:52:57.498151 445017 usertrap_amd64.go:225] [ 321( 314): 321( 314)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.501743 445017 usertrap_amd64.go:212] [ 321( 314): 321( 314)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.501811 445017 usertrap_amd64.go:122] [ 321( 314): 321( 314)] Allocate a new trap: 0xc000b128a0 29 D0719 21:52:57.501888 445017 usertrap_amd64.go:225] [ 321( 314): 321( 314)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.502802 445017 usertrap_amd64.go:212] [ 321( 314): 321( 314)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.502875 445017 usertrap_amd64.go:122] [ 321( 314): 321( 314)] Allocate a new trap: 0xc000b128a0 30 D0719 21:52:57.502972 445017 usertrap_amd64.go:225] [ 321( 314): 321( 314)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.506357 445017 usertrap_amd64.go:212] [ 321( 314): 321( 314)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.506429 445017 usertrap_amd64.go:122] [ 321( 314): 321( 314)] Allocate a new trap: 0xc000b128a0 31 D0719 21:52:57.506507 445017 usertrap_amd64.go:225] [ 321( 314): 321( 314)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.506831 445017 usertrap_amd64.go:212] [ 321( 314): 321( 314)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.506898 445017 usertrap_amd64.go:122] [ 321( 314): 321( 314)] Allocate a new trap: 0xc000b128a0 32 D0719 21:52:57.506958 445017 usertrap_amd64.go:225] [ 321( 314): 321( 314)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.507562 445017 usertrap_amd64.go:212] [ 321( 314): 321( 314)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.507650 445017 usertrap_amd64.go:122] [ 321( 314): 321( 314)] Allocate a new trap: 0xc000b128a0 33 D0719 21:52:57.507730 445017 usertrap_amd64.go:225] [ 321( 314): 321( 314)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.508077 445017 usertrap_amd64.go:212] [ 321( 314): 322( 315)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.508137 445017 usertrap_amd64.go:122] [ 321( 314): 322( 315)] Allocate a new trap: 0xc000b128a0 34 D0719 21:52:57.508271 445017 usertrap_amd64.go:225] [ 321( 314): 322( 315)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.515181 445017 usertrap_amd64.go:212] [ 321( 314): 321( 314)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.515243 445017 usertrap_amd64.go:122] [ 321( 314): 321( 314)] Allocate a new trap: 0xc000b128a0 35 D0719 21:52:57.515304 445017 usertrap_amd64.go:225] [ 321( 314): 321( 314)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.517562 445017 usertrap_amd64.go:212] [ 321( 314): 321( 314)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.517621 445017 usertrap_amd64.go:122] [ 321( 314): 321( 314)] Allocate a new trap: 0xc000b128a0 36 D0719 21:52:57.517699 445017 usertrap_amd64.go:225] [ 321( 314): 321( 314)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.518191 445017 task_exit.go:204] [ 321( 314): 321( 314)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.518451 445017 task_signals.go:204] [ 321( 314): 323( 316)] Signal 321, PID: 323, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.518503 445017 task_signals.go:204] [ 321( 314): 322( 315)] Signal 321, PID: 322, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.518556 445017 task_exit.go:204] [ 321( 314): 321( 314)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.518671 445017 task_exit.go:204] [ 321( 314): 323( 316)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.518858 445017 task_exit.go:204] [ 321( 314): 322( 315)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.519078 445017 task_exit.go:204] [ 321( 314): 323( 316)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.519152 445017 task_exit.go:204] [ 321( 314): 323( 316)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.521969 445017 task_exit.go:204] [ 321( 314): 322( 315)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.522044 445017 task_exit.go:204] [ 321( 314): 322( 315)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.522173 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.522355 445017 task_exit.go:204] [ 321( 314): 321( 314)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.528641 445017 usertrap_amd64.go:212] [ 324( 317): 324( 317)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.528752 445017 usertrap_amd64.go:122] [ 324( 317): 324( 317)] Allocate a new trap: 0xc000a686f0 28 D0719 21:52:57.529233 445017 usertrap_amd64.go:225] [ 324( 317): 324( 317)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.532386 445017 usertrap_amd64.go:212] [ 324( 317): 324( 317)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.532455 445017 usertrap_amd64.go:122] [ 324( 317): 324( 317)] Allocate a new trap: 0xc000a686f0 29 D0719 21:52:57.532521 445017 usertrap_amd64.go:225] [ 324( 317): 324( 317)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.533297 445017 usertrap_amd64.go:212] [ 324( 317): 324( 317)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.533344 445017 usertrap_amd64.go:122] [ 324( 317): 324( 317)] Allocate a new trap: 0xc000a686f0 30 D0719 21:52:57.533388 445017 usertrap_amd64.go:225] [ 324( 317): 324( 317)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.538779 445017 usertrap_amd64.go:212] [ 324( 317): 324( 317)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.538857 445017 usertrap_amd64.go:122] [ 324( 317): 324( 317)] Allocate a new trap: 0xc000a686f0 31 D0719 21:52:57.538905 445017 usertrap_amd64.go:225] [ 324( 317): 324( 317)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.539138 445017 usertrap_amd64.go:212] [ 324( 317): 324( 317)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.539188 445017 usertrap_amd64.go:122] [ 324( 317): 324( 317)] Allocate a new trap: 0xc000a686f0 32 D0719 21:52:57.539247 445017 usertrap_amd64.go:225] [ 324( 317): 324( 317)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.543942 445017 usertrap_amd64.go:212] [ 324( 317): 324( 317)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.544042 445017 usertrap_amd64.go:122] [ 324( 317): 324( 317)] Allocate a new trap: 0xc000a686f0 33 D0719 21:52:57.544108 445017 usertrap_amd64.go:225] [ 324( 317): 324( 317)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.544462 445017 usertrap_amd64.go:212] [ 324( 317): 325( 318)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.544570 445017 usertrap_amd64.go:122] [ 324( 317): 325( 318)] Allocate a new trap: 0xc000a686f0 34 D0719 21:52:57.544691 445017 usertrap_amd64.go:225] [ 324( 317): 325( 318)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.552744 445017 usertrap_amd64.go:212] [ 324( 317): 324( 317)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.552895 445017 usertrap_amd64.go:122] [ 324( 317): 324( 317)] Allocate a new trap: 0xc000a686f0 35 D0719 21:52:57.553092 445017 usertrap_amd64.go:225] [ 324( 317): 324( 317)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.555412 445017 usertrap_amd64.go:212] [ 324( 317): 324( 317)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.555464 445017 usertrap_amd64.go:122] [ 324( 317): 324( 317)] Allocate a new trap: 0xc000a686f0 36 D0719 21:52:57.555574 445017 usertrap_amd64.go:225] [ 324( 317): 324( 317)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.556244 445017 task_exit.go:204] [ 324( 317): 324( 317)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.556373 445017 task_signals.go:204] [ 324( 317): 326( 319)] Signal 324, PID: 326, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.556487 445017 task_exit.go:204] [ 324( 317): 324( 317)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.556631 445017 task_exit.go:204] [ 324( 317): 326( 319)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.556797 445017 task_signals.go:204] [ 324( 317): 325( 318)] Signal 324, PID: 325, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.556917 445017 task_exit.go:204] [ 324( 317): 326( 319)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.556991 445017 task_exit.go:204] [ 324( 317): 326( 319)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.557119 445017 task_exit.go:204] [ 324( 317): 325( 318)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.560295 445017 task_exit.go:204] [ 324( 317): 325( 318)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.560354 445017 task_exit.go:204] [ 324( 317): 325( 318)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.560458 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.560592 445017 task_exit.go:204] [ 324( 317): 324( 317)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.567142 445017 usertrap_amd64.go:212] [ 327( 320): 327( 320)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.567219 445017 usertrap_amd64.go:122] [ 327( 320): 327( 320)] Allocate a new trap: 0xc000b12120 28 D0719 21:52:57.567773 445017 usertrap_amd64.go:225] [ 327( 320): 327( 320)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.571801 445017 usertrap_amd64.go:212] [ 327( 320): 327( 320)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.571965 445017 usertrap_amd64.go:122] [ 327( 320): 327( 320)] Allocate a new trap: 0xc000b12120 29 D0719 21:52:57.572059 445017 usertrap_amd64.go:225] [ 327( 320): 327( 320)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.573089 445017 usertrap_amd64.go:212] [ 327( 320): 327( 320)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.573191 445017 usertrap_amd64.go:122] [ 327( 320): 327( 320)] Allocate a new trap: 0xc000b12120 30 D0719 21:52:57.573259 445017 usertrap_amd64.go:225] [ 327( 320): 327( 320)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.578532 445017 usertrap_amd64.go:212] [ 327( 320): 327( 320)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.578653 445017 usertrap_amd64.go:122] [ 327( 320): 327( 320)] Allocate a new trap: 0xc000b12120 31 D0719 21:52:57.578726 445017 usertrap_amd64.go:225] [ 327( 320): 327( 320)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.579075 445017 usertrap_amd64.go:212] [ 327( 320): 327( 320)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.579133 445017 usertrap_amd64.go:122] [ 327( 320): 327( 320)] Allocate a new trap: 0xc000b12120 32 D0719 21:52:57.579177 445017 usertrap_amd64.go:225] [ 327( 320): 327( 320)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.579867 445017 usertrap_amd64.go:212] [ 327( 320): 327( 320)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.579930 445017 usertrap_amd64.go:122] [ 327( 320): 327( 320)] Allocate a new trap: 0xc000b12120 33 D0719 21:52:57.580008 445017 usertrap_amd64.go:225] [ 327( 320): 327( 320)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.580176 445017 usertrap_amd64.go:212] [ 327( 320): 328( 321)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.580256 445017 usertrap_amd64.go:122] [ 327( 320): 328( 321)] Allocate a new trap: 0xc000b12120 34 D0719 21:52:57.580342 445017 usertrap_amd64.go:225] [ 327( 320): 328( 321)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.587503 445017 usertrap_amd64.go:212] [ 327( 320): 327( 320)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.587594 445017 usertrap_amd64.go:122] [ 327( 320): 327( 320)] Allocate a new trap: 0xc000b12120 35 D0719 21:52:57.587699 445017 usertrap_amd64.go:225] [ 327( 320): 327( 320)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.590451 445017 usertrap_amd64.go:212] [ 327( 320): 327( 320)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.590542 445017 usertrap_amd64.go:122] [ 327( 320): 327( 320)] Allocate a new trap: 0xc000b12120 36 D0719 21:52:57.590638 445017 usertrap_amd64.go:225] [ 327( 320): 327( 320)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.591168 445017 task_exit.go:204] [ 327( 320): 327( 320)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.591529 445017 task_exit.go:204] [ 327( 320): 327( 320)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.591514 445017 task_signals.go:204] [ 327( 320): 329( 322)] Signal 327, PID: 329, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.591521 445017 task_signals.go:204] [ 327( 320): 328( 321)] Signal 327, PID: 328, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.591700 445017 task_exit.go:204] [ 327( 320): 329( 322)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.591998 445017 task_exit.go:204] [ 327( 320): 328( 321)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.592249 445017 task_exit.go:204] [ 327( 320): 329( 322)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.592320 445017 task_exit.go:204] [ 327( 320): 329( 322)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.595454 445017 task_exit.go:204] [ 327( 320): 328( 321)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.595561 445017 task_exit.go:204] [ 327( 320): 328( 321)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.595694 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.595879 445017 task_exit.go:204] [ 327( 320): 327( 320)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.603174 445017 usertrap_amd64.go:212] [ 330( 323): 330( 323)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.603250 445017 usertrap_amd64.go:122] [ 330( 323): 330( 323)] Allocate a new trap: 0xc000b12420 28 D0719 21:52:57.603675 445017 usertrap_amd64.go:225] [ 330( 323): 330( 323)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.607938 445017 usertrap_amd64.go:212] [ 330( 323): 330( 323)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.608033 445017 usertrap_amd64.go:122] [ 330( 323): 330( 323)] Allocate a new trap: 0xc000b12420 29 D0719 21:52:57.608085 445017 usertrap_amd64.go:225] [ 330( 323): 330( 323)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.609126 445017 usertrap_amd64.go:212] [ 330( 323): 330( 323)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.609219 445017 usertrap_amd64.go:122] [ 330( 323): 330( 323)] Allocate a new trap: 0xc000b12420 30 D0719 21:52:57.609284 445017 usertrap_amd64.go:225] [ 330( 323): 330( 323)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.614674 445017 usertrap_amd64.go:212] [ 330( 323): 330( 323)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.614747 445017 usertrap_amd64.go:122] [ 330( 323): 330( 323)] Allocate a new trap: 0xc000b12420 31 D0719 21:52:57.614830 445017 usertrap_amd64.go:225] [ 330( 323): 330( 323)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.615096 445017 usertrap_amd64.go:212] [ 330( 323): 330( 323)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.615172 445017 usertrap_amd64.go:122] [ 330( 323): 330( 323)] Allocate a new trap: 0xc000b12420 32 D0719 21:52:57.615234 445017 usertrap_amd64.go:225] [ 330( 323): 330( 323)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.616250 445017 usertrap_amd64.go:212] [ 330( 323): 330( 323)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.616308 445017 usertrap_amd64.go:122] [ 330( 323): 330( 323)] Allocate a new trap: 0xc000b12420 33 D0719 21:52:57.616382 445017 usertrap_amd64.go:225] [ 330( 323): 330( 323)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.617032 445017 usertrap_amd64.go:212] [ 330( 323): 331( 324)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.617118 445017 usertrap_amd64.go:122] [ 330( 323): 331( 324)] Allocate a new trap: 0xc000b12420 34 D0719 21:52:57.617198 445017 usertrap_amd64.go:225] [ 330( 323): 331( 324)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.625733 445017 usertrap_amd64.go:212] [ 330( 323): 330( 323)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.625868 445017 usertrap_amd64.go:122] [ 330( 323): 330( 323)] Allocate a new trap: 0xc000b12420 35 D0719 21:52:57.625954 445017 usertrap_amd64.go:225] [ 330( 323): 330( 323)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.628950 445017 usertrap_amd64.go:212] [ 330( 323): 330( 323)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.629026 445017 usertrap_amd64.go:122] [ 330( 323): 330( 323)] Allocate a new trap: 0xc000b12420 36 D0719 21:52:57.629093 445017 usertrap_amd64.go:225] [ 330( 323): 330( 323)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.629618 445017 task_exit.go:204] [ 330( 323): 330( 323)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.629736 445017 task_signals.go:204] [ 330( 323): 332( 325)] Signal 330, PID: 332, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.629881 445017 task_signals.go:204] [ 330( 323): 331( 324)] Signal 330, PID: 331, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.630009 445017 task_exit.go:204] [ 330( 323): 332( 325)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.630213 445017 task_exit.go:204] [ 330( 323): 332( 325)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.630285 445017 task_exit.go:204] [ 330( 323): 332( 325)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.630415 445017 task_exit.go:204] [ 330( 323): 330( 323)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.630575 445017 task_exit.go:204] [ 330( 323): 331( 324)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.634446 445017 task_exit.go:204] [ 330( 323): 331( 324)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.634568 445017 task_exit.go:204] [ 330( 323): 331( 324)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.634668 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.635206 445017 task_exit.go:204] [ 330( 323): 330( 323)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.642355 445017 usertrap_amd64.go:212] [ 333( 326): 333( 326)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.642459 445017 usertrap_amd64.go:122] [ 333( 326): 333( 326)] Allocate a new trap: 0xc000886120 28 D0719 21:52:57.642962 445017 usertrap_amd64.go:225] [ 333( 326): 333( 326)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.646566 445017 usertrap_amd64.go:212] [ 333( 326): 333( 326)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.646630 445017 usertrap_amd64.go:122] [ 333( 326): 333( 326)] Allocate a new trap: 0xc000886120 29 D0719 21:52:57.646694 445017 usertrap_amd64.go:225] [ 333( 326): 333( 326)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.647519 445017 usertrap_amd64.go:212] [ 333( 326): 333( 326)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.647573 445017 usertrap_amd64.go:122] [ 333( 326): 333( 326)] Allocate a new trap: 0xc000886120 30 D0719 21:52:57.647681 445017 usertrap_amd64.go:225] [ 333( 326): 333( 326)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.651693 445017 usertrap_amd64.go:212] [ 333( 326): 333( 326)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.651762 445017 usertrap_amd64.go:122] [ 333( 326): 333( 326)] Allocate a new trap: 0xc000886120 31 D0719 21:52:57.651823 445017 usertrap_amd64.go:225] [ 333( 326): 333( 326)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.652063 445017 usertrap_amd64.go:212] [ 333( 326): 333( 326)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.652121 445017 usertrap_amd64.go:122] [ 333( 326): 333( 326)] Allocate a new trap: 0xc000886120 32 D0719 21:52:57.652166 445017 usertrap_amd64.go:225] [ 333( 326): 333( 326)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.652695 445017 usertrap_amd64.go:212] [ 333( 326): 333( 326)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.652746 445017 usertrap_amd64.go:122] [ 333( 326): 333( 326)] Allocate a new trap: 0xc000886120 33 D0719 21:52:57.652813 445017 usertrap_amd64.go:225] [ 333( 326): 333( 326)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.653078 445017 usertrap_amd64.go:212] [ 333( 326): 334( 327)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.653159 445017 usertrap_amd64.go:122] [ 333( 326): 334( 327)] Allocate a new trap: 0xc000886120 34 D0719 21:52:57.653229 445017 usertrap_amd64.go:225] [ 333( 326): 334( 327)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.662674 445017 usertrap_amd64.go:212] [ 333( 326): 333( 326)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.662759 445017 usertrap_amd64.go:122] [ 333( 326): 333( 326)] Allocate a new trap: 0xc000886120 35 D0719 21:52:57.662821 445017 usertrap_amd64.go:225] [ 333( 326): 333( 326)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.665945 445017 usertrap_amd64.go:212] [ 333( 326): 333( 326)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.666048 445017 usertrap_amd64.go:122] [ 333( 326): 333( 326)] Allocate a new trap: 0xc000886120 36 D0719 21:52:57.666138 445017 usertrap_amd64.go:225] [ 333( 326): 333( 326)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.666777 445017 task_exit.go:204] [ 333( 326): 333( 326)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.667042 445017 task_exit.go:204] [ 333( 326): 333( 326)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.667040 445017 task_signals.go:204] [ 333( 326): 334( 327)] Signal 333, PID: 334, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.667038 445017 task_signals.go:204] [ 333( 326): 335( 328)] Signal 333, PID: 335, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.667164 445017 task_exit.go:204] [ 333( 326): 334( 327)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.667455 445017 task_exit.go:204] [ 333( 326): 335( 328)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.667784 445017 task_exit.go:204] [ 333( 326): 334( 327)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.667864 445017 task_exit.go:204] [ 333( 326): 334( 327)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.670635 445017 task_exit.go:204] [ 333( 326): 335( 328)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.670718 445017 task_exit.go:204] [ 333( 326): 335( 328)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.670822 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.671047 445017 task_exit.go:204] [ 333( 326): 333( 326)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.678187 445017 usertrap_amd64.go:212] [ 336( 329): 336( 329)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.678349 445017 usertrap_amd64.go:122] [ 336( 329): 336( 329)] Allocate a new trap: 0xc000a68360 28 D0719 21:52:57.678844 445017 usertrap_amd64.go:225] [ 336( 329): 336( 329)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.682893 445017 usertrap_amd64.go:212] [ 336( 329): 336( 329)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.682969 445017 usertrap_amd64.go:122] [ 336( 329): 336( 329)] Allocate a new trap: 0xc000a68360 29 D0719 21:52:57.683035 445017 usertrap_amd64.go:225] [ 336( 329): 336( 329)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.683998 445017 usertrap_amd64.go:212] [ 336( 329): 336( 329)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.684245 445017 usertrap_amd64.go:122] [ 336( 329): 336( 329)] Allocate a new trap: 0xc000a68360 30 D0719 21:52:57.684342 445017 usertrap_amd64.go:225] [ 336( 329): 336( 329)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.689271 445017 usertrap_amd64.go:212] [ 336( 329): 336( 329)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.689438 445017 usertrap_amd64.go:122] [ 336( 329): 336( 329)] Allocate a new trap: 0xc000a68360 31 D0719 21:52:57.689548 445017 usertrap_amd64.go:225] [ 336( 329): 336( 329)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.689811 445017 usertrap_amd64.go:212] [ 336( 329): 336( 329)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.689880 445017 usertrap_amd64.go:122] [ 336( 329): 336( 329)] Allocate a new trap: 0xc000a68360 32 D0719 21:52:57.690005 445017 usertrap_amd64.go:225] [ 336( 329): 336( 329)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.690923 445017 usertrap_amd64.go:212] [ 336( 329): 336( 329)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.690991 445017 usertrap_amd64.go:122] [ 336( 329): 336( 329)] Allocate a new trap: 0xc000a68360 33 D0719 21:52:57.691059 445017 usertrap_amd64.go:225] [ 336( 329): 336( 329)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.691355 445017 usertrap_amd64.go:212] [ 336( 329): 337( 330)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.691472 445017 usertrap_amd64.go:122] [ 336( 329): 337( 330)] Allocate a new trap: 0xc000a68360 34 D0719 21:52:57.691594 445017 usertrap_amd64.go:225] [ 336( 329): 337( 330)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.701863 445017 usertrap_amd64.go:212] [ 336( 329): 336( 329)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.701961 445017 usertrap_amd64.go:122] [ 336( 329): 336( 329)] Allocate a new trap: 0xc000a68360 35 D0719 21:52:57.702014 445017 usertrap_amd64.go:225] [ 336( 329): 336( 329)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.705354 445017 usertrap_amd64.go:212] [ 336( 329): 336( 329)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.705452 445017 usertrap_amd64.go:122] [ 336( 329): 336( 329)] Allocate a new trap: 0xc000a68360 36 D0719 21:52:57.705535 445017 usertrap_amd64.go:225] [ 336( 329): 336( 329)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.706604 445017 task_exit.go:204] [ 336( 329): 336( 329)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.706849 445017 task_exit.go:204] [ 336( 329): 336( 329)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.706834 445017 task_signals.go:204] [ 336( 329): 338( 331)] Signal 336, PID: 338, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.706991 445017 task_exit.go:204] [ 336( 329): 338( 331)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.707229 445017 task_exit.go:204] [ 336( 329): 338( 331)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.707296 445017 task_exit.go:204] [ 336( 329): 338( 331)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.707531 445017 task_signals.go:204] [ 336( 329): 337( 330)] Signal 336, PID: 337, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.707656 445017 task_exit.go:204] [ 336( 329): 337( 330)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.711428 445017 task_exit.go:204] [ 336( 329): 337( 330)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.711522 445017 task_exit.go:204] [ 336( 329): 337( 330)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.711654 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.712504 445017 task_exit.go:204] [ 336( 329): 336( 329)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.722108 445017 usertrap_amd64.go:212] [ 339( 332): 339( 332)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.722221 445017 usertrap_amd64.go:122] [ 339( 332): 339( 332)] Allocate a new trap: 0xc00037e780 28 D0719 21:52:57.722719 445017 usertrap_amd64.go:225] [ 339( 332): 339( 332)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.727564 445017 usertrap_amd64.go:212] [ 339( 332): 339( 332)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.727679 445017 usertrap_amd64.go:122] [ 339( 332): 339( 332)] Allocate a new trap: 0xc00037e780 29 D0719 21:52:57.727751 445017 usertrap_amd64.go:225] [ 339( 332): 339( 332)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.728910 445017 usertrap_amd64.go:212] [ 339( 332): 339( 332)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.728994 445017 usertrap_amd64.go:122] [ 339( 332): 339( 332)] Allocate a new trap: 0xc00037e780 30 D0719 21:52:57.729083 445017 usertrap_amd64.go:225] [ 339( 332): 339( 332)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.746657 445017 usertrap_amd64.go:212] [ 339( 332): 339( 332)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.746759 445017 usertrap_amd64.go:122] [ 339( 332): 339( 332)] Allocate a new trap: 0xc00037e780 31 D0719 21:52:57.746823 445017 usertrap_amd64.go:225] [ 339( 332): 339( 332)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.747105 445017 usertrap_amd64.go:212] [ 339( 332): 339( 332)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.747176 445017 usertrap_amd64.go:122] [ 339( 332): 339( 332)] Allocate a new trap: 0xc00037e780 32 D0719 21:52:57.747257 445017 usertrap_amd64.go:225] [ 339( 332): 339( 332)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.748038 445017 usertrap_amd64.go:212] [ 339( 332): 339( 332)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.748102 445017 usertrap_amd64.go:122] [ 339( 332): 339( 332)] Allocate a new trap: 0xc00037e780 33 D0719 21:52:57.748170 445017 usertrap_amd64.go:225] [ 339( 332): 339( 332)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.748589 445017 usertrap_amd64.go:212] [ 339( 332): 340( 333)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.748697 445017 usertrap_amd64.go:122] [ 339( 332): 340( 333)] Allocate a new trap: 0xc00037e780 34 D0719 21:52:57.748779 445017 usertrap_amd64.go:225] [ 339( 332): 340( 333)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.760458 445017 usertrap_amd64.go:212] [ 339( 332): 339( 332)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.760556 445017 usertrap_amd64.go:122] [ 339( 332): 339( 332)] Allocate a new trap: 0xc00037e780 35 D0719 21:52:57.760644 445017 usertrap_amd64.go:225] [ 339( 332): 339( 332)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.763301 445017 usertrap_amd64.go:212] [ 339( 332): 339( 332)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.763368 445017 usertrap_amd64.go:122] [ 339( 332): 339( 332)] Allocate a new trap: 0xc00037e780 36 D0719 21:52:57.763446 445017 usertrap_amd64.go:225] [ 339( 332): 339( 332)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.768316 445017 task_exit.go:204] [ 339( 332): 339( 332)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.768517 445017 task_signals.go:204] [ 339( 332): 340( 333)] Signal 339, PID: 340, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.768688 445017 task_signals.go:204] [ 339( 332): 341( 334)] Signal 339, PID: 341, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.768710 445017 task_exit.go:204] [ 339( 332): 340( 333)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.768906 445017 task_exit.go:204] [ 339( 332): 341( 334)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.769161 445017 task_exit.go:204] [ 339( 332): 340( 333)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.769279 445017 task_exit.go:204] [ 339( 332): 340( 333)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.769465 445017 task_exit.go:204] [ 339( 332): 339( 332)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.772751 445017 task_exit.go:204] [ 339( 332): 341( 334)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.772825 445017 task_exit.go:204] [ 339( 332): 341( 334)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.772985 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.773344 445017 task_exit.go:204] [ 339( 332): 339( 332)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.783292 445017 usertrap_amd64.go:212] [ 342( 335): 342( 335)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.783418 445017 usertrap_amd64.go:122] [ 342( 335): 342( 335)] Allocate a new trap: 0xc000a684b0 28 D0719 21:52:57.783982 445017 usertrap_amd64.go:225] [ 342( 335): 342( 335)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.788411 445017 usertrap_amd64.go:212] [ 342( 335): 342( 335)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.788488 445017 usertrap_amd64.go:122] [ 342( 335): 342( 335)] Allocate a new trap: 0xc000a684b0 29 D0719 21:52:57.788562 445017 usertrap_amd64.go:225] [ 342( 335): 342( 335)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.789772 445017 usertrap_amd64.go:212] [ 342( 335): 342( 335)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.789868 445017 usertrap_amd64.go:122] [ 342( 335): 342( 335)] Allocate a new trap: 0xc000a684b0 30 D0719 21:52:57.789924 445017 usertrap_amd64.go:225] [ 342( 335): 342( 335)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.794502 445017 usertrap_amd64.go:212] [ 342( 335): 342( 335)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.794581 445017 usertrap_amd64.go:122] [ 342( 335): 342( 335)] Allocate a new trap: 0xc000a684b0 31 D0719 21:52:57.794672 445017 usertrap_amd64.go:225] [ 342( 335): 342( 335)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.795243 445017 usertrap_amd64.go:212] [ 342( 335): 342( 335)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.795298 445017 usertrap_amd64.go:122] [ 342( 335): 342( 335)] Allocate a new trap: 0xc000a684b0 32 D0719 21:52:57.795374 445017 usertrap_amd64.go:225] [ 342( 335): 342( 335)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.796089 445017 usertrap_amd64.go:212] [ 342( 335): 342( 335)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.796171 445017 usertrap_amd64.go:122] [ 342( 335): 342( 335)] Allocate a new trap: 0xc000a684b0 33 D0719 21:52:57.796240 445017 usertrap_amd64.go:225] [ 342( 335): 342( 335)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.797051 445017 usertrap_amd64.go:212] [ 342( 335): 343( 336)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.797177 445017 usertrap_amd64.go:122] [ 342( 335): 343( 336)] Allocate a new trap: 0xc000a684b0 34 D0719 21:52:57.797277 445017 usertrap_amd64.go:225] [ 342( 335): 343( 336)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.808300 445017 usertrap_amd64.go:212] [ 342( 335): 342( 335)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.808405 445017 usertrap_amd64.go:122] [ 342( 335): 342( 335)] Allocate a new trap: 0xc000a684b0 35 D0719 21:52:57.808476 445017 usertrap_amd64.go:225] [ 342( 335): 342( 335)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.811182 445017 usertrap_amd64.go:212] [ 342( 335): 342( 335)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.811263 445017 usertrap_amd64.go:122] [ 342( 335): 342( 335)] Allocate a new trap: 0xc000a684b0 36 D0719 21:52:57.811335 445017 usertrap_amd64.go:225] [ 342( 335): 342( 335)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.812048 445017 task_exit.go:204] [ 342( 335): 342( 335)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.812346 445017 task_signals.go:204] [ 342( 335): 343( 336)] Signal 342, PID: 343, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.812427 445017 task_exit.go:204] [ 342( 335): 342( 335)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.812421 445017 task_signals.go:204] [ 342( 335): 344( 337)] Signal 342, PID: 344, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.812565 445017 task_exit.go:204] [ 342( 335): 343( 336)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.812804 445017 task_exit.go:204] [ 342( 335): 344( 337)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.812991 445017 task_exit.go:204] [ 342( 335): 343( 336)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.813063 445017 task_exit.go:204] [ 342( 335): 343( 336)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.816474 445017 task_exit.go:204] [ 342( 335): 344( 337)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.816574 445017 task_exit.go:204] [ 342( 335): 344( 337)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.816674 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.818443 445017 task_exit.go:204] [ 342( 335): 342( 335)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.826852 445017 usertrap_amd64.go:212] [ 345( 338): 345( 338)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.826958 445017 usertrap_amd64.go:122] [ 345( 338): 345( 338)] Allocate a new trap: 0xc00037e930 28 D0719 21:52:57.827353 445017 usertrap_amd64.go:225] [ 345( 338): 345( 338)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.831293 445017 usertrap_amd64.go:212] [ 345( 338): 345( 338)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.831361 445017 usertrap_amd64.go:122] [ 345( 338): 345( 338)] Allocate a new trap: 0xc00037e930 29 D0719 21:52:57.831459 445017 usertrap_amd64.go:225] [ 345( 338): 345( 338)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.832381 445017 usertrap_amd64.go:212] [ 345( 338): 345( 338)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.832431 445017 usertrap_amd64.go:122] [ 345( 338): 345( 338)] Allocate a new trap: 0xc00037e930 30 D0719 21:52:57.832507 445017 usertrap_amd64.go:225] [ 345( 338): 345( 338)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.836054 445017 usertrap_amd64.go:212] [ 345( 338): 345( 338)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.836138 445017 usertrap_amd64.go:122] [ 345( 338): 345( 338)] Allocate a new trap: 0xc00037e930 31 D0719 21:52:57.836200 445017 usertrap_amd64.go:225] [ 345( 338): 345( 338)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.836420 445017 usertrap_amd64.go:212] [ 345( 338): 345( 338)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.836470 445017 usertrap_amd64.go:122] [ 345( 338): 345( 338)] Allocate a new trap: 0xc00037e930 32 D0719 21:52:57.836555 445017 usertrap_amd64.go:225] [ 345( 338): 345( 338)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.837165 445017 usertrap_amd64.go:212] [ 345( 338): 345( 338)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.837219 445017 usertrap_amd64.go:122] [ 345( 338): 345( 338)] Allocate a new trap: 0xc00037e930 33 D0719 21:52:57.837278 445017 usertrap_amd64.go:225] [ 345( 338): 345( 338)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.839145 445017 usertrap_amd64.go:212] [ 345( 338): 346( 339)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.839239 445017 usertrap_amd64.go:122] [ 345( 338): 346( 339)] Allocate a new trap: 0xc00037e930 34 D0719 21:52:57.839311 445017 usertrap_amd64.go:225] [ 345( 338): 346( 339)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.848229 445017 usertrap_amd64.go:212] [ 345( 338): 345( 338)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.848319 445017 usertrap_amd64.go:122] [ 345( 338): 345( 338)] Allocate a new trap: 0xc00037e930 35 D0719 21:52:57.848420 445017 usertrap_amd64.go:225] [ 345( 338): 345( 338)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.857393 445017 usertrap_amd64.go:212] [ 345( 338): 345( 338)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.857491 445017 usertrap_amd64.go:122] [ 345( 338): 345( 338)] Allocate a new trap: 0xc00037e930 36 D0719 21:52:57.857562 445017 usertrap_amd64.go:225] [ 345( 338): 345( 338)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.858037 445017 task_exit.go:204] [ 345( 338): 345( 338)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.858172 445017 task_signals.go:204] [ 345( 338): 347( 340)] Signal 345, PID: 347, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.858326 445017 task_exit.go:204] [ 345( 338): 347( 340)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.858473 445017 task_signals.go:204] [ 345( 338): 346( 339)] Signal 345, PID: 346, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.858671 445017 task_exit.go:204] [ 345( 338): 347( 340)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.858755 445017 task_exit.go:204] [ 345( 338): 347( 340)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.858904 445017 task_exit.go:204] [ 345( 338): 345( 338)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.859054 445017 task_exit.go:204] [ 345( 338): 346( 339)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.862440 445017 task_exit.go:204] [ 345( 338): 346( 339)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.862515 445017 task_exit.go:204] [ 345( 338): 346( 339)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.862657 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.862781 445017 task_exit.go:204] [ 345( 338): 345( 338)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.870042 445017 usertrap_amd64.go:212] [ 348( 341): 348( 341)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.870127 445017 usertrap_amd64.go:122] [ 348( 341): 348( 341)] Allocate a new trap: 0xc001466030 28 D0719 21:52:57.870661 445017 usertrap_amd64.go:225] [ 348( 341): 348( 341)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.874627 445017 usertrap_amd64.go:212] [ 348( 341): 348( 341)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.874704 445017 usertrap_amd64.go:122] [ 348( 341): 348( 341)] Allocate a new trap: 0xc001466030 29 D0719 21:52:57.874773 445017 usertrap_amd64.go:225] [ 348( 341): 348( 341)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.876361 445017 usertrap_amd64.go:212] [ 348( 341): 348( 341)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.876454 445017 usertrap_amd64.go:122] [ 348( 341): 348( 341)] Allocate a new trap: 0xc001466030 30 D0719 21:52:57.876563 445017 usertrap_amd64.go:225] [ 348( 341): 348( 341)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.882002 445017 usertrap_amd64.go:212] [ 348( 341): 348( 341)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.882087 445017 usertrap_amd64.go:122] [ 348( 341): 348( 341)] Allocate a new trap: 0xc001466030 31 D0719 21:52:57.882164 445017 usertrap_amd64.go:225] [ 348( 341): 348( 341)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.882432 445017 usertrap_amd64.go:212] [ 348( 341): 348( 341)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.882501 445017 usertrap_amd64.go:122] [ 348( 341): 348( 341)] Allocate a new trap: 0xc001466030 32 D0719 21:52:57.882590 445017 usertrap_amd64.go:225] [ 348( 341): 348( 341)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.883315 445017 usertrap_amd64.go:212] [ 348( 341): 348( 341)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.883358 445017 usertrap_amd64.go:122] [ 348( 341): 348( 341)] Allocate a new trap: 0xc001466030 33 D0719 21:52:57.883434 445017 usertrap_amd64.go:225] [ 348( 341): 348( 341)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.883992 445017 usertrap_amd64.go:212] [ 348( 341): 349( 342)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.884121 445017 usertrap_amd64.go:122] [ 348( 341): 349( 342)] Allocate a new trap: 0xc001466030 34 D0719 21:52:57.884224 445017 usertrap_amd64.go:225] [ 348( 341): 349( 342)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.893240 445017 usertrap_amd64.go:212] [ 348( 341): 348( 341)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.893323 445017 usertrap_amd64.go:122] [ 348( 341): 348( 341)] Allocate a new trap: 0xc001466030 35 D0719 21:52:57.893395 445017 usertrap_amd64.go:225] [ 348( 341): 348( 341)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.899026 445017 usertrap_amd64.go:212] [ 348( 341): 348( 341)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.899110 445017 usertrap_amd64.go:122] [ 348( 341): 348( 341)] Allocate a new trap: 0xc001466030 36 D0719 21:52:57.899376 445017 usertrap_amd64.go:225] [ 348( 341): 348( 341)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.902331 445017 task_exit.go:204] [ 348( 341): 348( 341)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.902538 445017 task_signals.go:204] [ 348( 341): 350( 343)] Signal 348, PID: 350, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.902739 445017 task_signals.go:204] [ 348( 341): 349( 342)] Signal 348, PID: 349, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.902854 445017 task_exit.go:204] [ 348( 341): 349( 342)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.903100 445017 task_exit.go:204] [ 348( 341): 349( 342)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.903185 445017 task_exit.go:204] [ 348( 341): 349( 342)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.903318 445017 task_exit.go:204] [ 348( 341): 350( 343)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.904231 445017 task_exit.go:204] [ 348( 341): 348( 341)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.906901 445017 task_exit.go:204] [ 348( 341): 350( 343)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.906960 445017 task_exit.go:204] [ 348( 341): 350( 343)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.907163 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.907298 445017 task_exit.go:204] [ 348( 341): 348( 341)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.920122 445017 usertrap_amd64.go:212] [ 351( 344): 351( 344)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.920226 445017 usertrap_amd64.go:122] [ 351( 344): 351( 344)] Allocate a new trap: 0xc00037e990 28 D0719 21:52:57.920741 445017 usertrap_amd64.go:225] [ 351( 344): 351( 344)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.924375 445017 usertrap_amd64.go:212] [ 351( 344): 351( 344)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.924427 445017 usertrap_amd64.go:122] [ 351( 344): 351( 344)] Allocate a new trap: 0xc00037e990 29 D0719 21:52:57.924474 445017 usertrap_amd64.go:225] [ 351( 344): 351( 344)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.925353 445017 usertrap_amd64.go:212] [ 351( 344): 351( 344)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.925402 445017 usertrap_amd64.go:122] [ 351( 344): 351( 344)] Allocate a new trap: 0xc00037e990 30 D0719 21:52:57.925455 445017 usertrap_amd64.go:225] [ 351( 344): 351( 344)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.929132 445017 usertrap_amd64.go:212] [ 351( 344): 351( 344)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.929191 445017 usertrap_amd64.go:122] [ 351( 344): 351( 344)] Allocate a new trap: 0xc00037e990 31 D0719 21:52:57.929277 445017 usertrap_amd64.go:225] [ 351( 344): 351( 344)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.929526 445017 usertrap_amd64.go:212] [ 351( 344): 351( 344)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.929591 445017 usertrap_amd64.go:122] [ 351( 344): 351( 344)] Allocate a new trap: 0xc00037e990 32 D0719 21:52:57.929652 445017 usertrap_amd64.go:225] [ 351( 344): 351( 344)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.930357 445017 usertrap_amd64.go:212] [ 351( 344): 351( 344)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.930440 445017 usertrap_amd64.go:122] [ 351( 344): 351( 344)] Allocate a new trap: 0xc00037e990 33 D0719 21:52:57.930520 445017 usertrap_amd64.go:225] [ 351( 344): 351( 344)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.930759 445017 usertrap_amd64.go:212] [ 351( 344): 352( 345)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.930810 445017 usertrap_amd64.go:122] [ 351( 344): 352( 345)] Allocate a new trap: 0xc00037e990 34 D0719 21:52:57.930861 445017 usertrap_amd64.go:225] [ 351( 344): 352( 345)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.938743 445017 usertrap_amd64.go:212] [ 351( 344): 351( 344)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.938798 445017 usertrap_amd64.go:122] [ 351( 344): 351( 344)] Allocate a new trap: 0xc00037e990 35 D0719 21:52:57.938879 445017 usertrap_amd64.go:225] [ 351( 344): 351( 344)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.941324 445017 usertrap_amd64.go:212] [ 351( 344): 351( 344)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.941393 445017 usertrap_amd64.go:122] [ 351( 344): 351( 344)] Allocate a new trap: 0xc00037e990 36 D0719 21:52:57.941440 445017 usertrap_amd64.go:225] [ 351( 344): 351( 344)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.941925 445017 task_exit.go:204] [ 351( 344): 351( 344)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.942137 445017 task_signals.go:204] [ 351( 344): 352( 345)] Signal 351, PID: 352, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.942354 445017 task_signals.go:204] [ 351( 344): 353( 346)] Signal 351, PID: 353, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.942392 445017 task_exit.go:204] [ 351( 344): 351( 344)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.942604 445017 task_exit.go:204] [ 351( 344): 352( 345)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.942765 445017 task_exit.go:204] [ 351( 344): 353( 346)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.943090 445017 task_exit.go:204] [ 351( 344): 353( 346)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.943174 445017 task_exit.go:204] [ 351( 344): 353( 346)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.946097 445017 task_exit.go:204] [ 351( 344): 352( 345)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.946161 445017 task_exit.go:204] [ 351( 344): 352( 345)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.946258 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.947115 445017 task_exit.go:204] [ 351( 344): 351( 344)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.954503 445017 usertrap_amd64.go:212] [ 354( 347): 354( 347)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.954649 445017 usertrap_amd64.go:122] [ 354( 347): 354( 347)] Allocate a new trap: 0xc000b126c0 28 D0719 21:52:57.955113 445017 usertrap_amd64.go:225] [ 354( 347): 354( 347)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.958970 445017 usertrap_amd64.go:212] [ 354( 347): 354( 347)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.959093 445017 usertrap_amd64.go:122] [ 354( 347): 354( 347)] Allocate a new trap: 0xc000b126c0 29 D0719 21:52:57.959184 445017 usertrap_amd64.go:225] [ 354( 347): 354( 347)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.961231 445017 usertrap_amd64.go:212] [ 354( 347): 354( 347)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.961308 445017 usertrap_amd64.go:122] [ 354( 347): 354( 347)] Allocate a new trap: 0xc000b126c0 30 D0719 21:52:57.961365 445017 usertrap_amd64.go:225] [ 354( 347): 354( 347)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:57.965955 445017 usertrap_amd64.go:212] [ 354( 347): 354( 347)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:57.966046 445017 usertrap_amd64.go:122] [ 354( 347): 354( 347)] Allocate a new trap: 0xc000b126c0 31 D0719 21:52:57.966109 445017 usertrap_amd64.go:225] [ 354( 347): 354( 347)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:57.966384 445017 usertrap_amd64.go:212] [ 354( 347): 354( 347)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:57.966465 445017 usertrap_amd64.go:122] [ 354( 347): 354( 347)] Allocate a new trap: 0xc000b126c0 32 D0719 21:52:57.966529 445017 usertrap_amd64.go:225] [ 354( 347): 354( 347)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:57.967194 445017 usertrap_amd64.go:212] [ 354( 347): 354( 347)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:57.967276 445017 usertrap_amd64.go:122] [ 354( 347): 354( 347)] Allocate a new trap: 0xc000b126c0 33 D0719 21:52:57.967348 445017 usertrap_amd64.go:225] [ 354( 347): 354( 347)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:57.967538 445017 usertrap_amd64.go:212] [ 354( 347): 355( 348)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:57.967689 445017 usertrap_amd64.go:122] [ 354( 347): 355( 348)] Allocate a new trap: 0xc000b126c0 34 D0719 21:52:57.967785 445017 usertrap_amd64.go:225] [ 354( 347): 355( 348)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:57.974897 445017 usertrap_amd64.go:212] [ 354( 347): 354( 347)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:57.974963 445017 usertrap_amd64.go:122] [ 354( 347): 354( 347)] Allocate a new trap: 0xc000b126c0 35 D0719 21:52:57.975028 445017 usertrap_amd64.go:225] [ 354( 347): 354( 347)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:57.977447 445017 usertrap_amd64.go:212] [ 354( 347): 354( 347)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:57.977533 445017 usertrap_amd64.go:122] [ 354( 347): 354( 347)] Allocate a new trap: 0xc000b126c0 36 D0719 21:52:57.977584 445017 usertrap_amd64.go:225] [ 354( 347): 354( 347)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:57.978082 445017 task_exit.go:204] [ 354( 347): 354( 347)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.978267 445017 task_signals.go:204] [ 354( 347): 356( 349)] Signal 354, PID: 356, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.978329 445017 task_exit.go:204] [ 354( 347): 354( 347)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.978291 445017 task_signals.go:204] [ 354( 347): 355( 348)] Signal 354, PID: 355, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:57.978419 445017 task_exit.go:204] [ 354( 347): 356( 349)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.978653 445017 task_exit.go:204] [ 354( 347): 355( 348)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:57.979047 445017 task_exit.go:204] [ 354( 347): 356( 349)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.979117 445017 task_exit.go:204] [ 354( 347): 356( 349)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.981928 445017 task_exit.go:204] [ 354( 347): 355( 348)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:57.982008 445017 task_exit.go:204] [ 354( 347): 355( 348)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.982111 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:57.983274 445017 task_exit.go:204] [ 354( 347): 354( 347)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:57.992157 445017 usertrap_amd64.go:212] [ 357( 350): 357( 350)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:57.992266 445017 usertrap_amd64.go:122] [ 357( 350): 357( 350)] Allocate a new trap: 0xc00037ebd0 28 D0719 21:52:57.992769 445017 usertrap_amd64.go:225] [ 357( 350): 357( 350)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:57.996389 445017 usertrap_amd64.go:212] [ 357( 350): 357( 350)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:57.996470 445017 usertrap_amd64.go:122] [ 357( 350): 357( 350)] Allocate a new trap: 0xc00037ebd0 29 D0719 21:52:57.996563 445017 usertrap_amd64.go:225] [ 357( 350): 357( 350)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:57.997477 445017 usertrap_amd64.go:212] [ 357( 350): 357( 350)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:57.997555 445017 usertrap_amd64.go:122] [ 357( 350): 357( 350)] Allocate a new trap: 0xc00037ebd0 30 D0719 21:52:57.997635 445017 usertrap_amd64.go:225] [ 357( 350): 357( 350)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:58.001308 445017 usertrap_amd64.go:212] [ 357( 350): 357( 350)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:58.001393 445017 usertrap_amd64.go:122] [ 357( 350): 357( 350)] Allocate a new trap: 0xc00037ebd0 31 D0719 21:52:58.001470 445017 usertrap_amd64.go:225] [ 357( 350): 357( 350)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:58.001784 445017 usertrap_amd64.go:212] [ 357( 350): 357( 350)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:58.001835 445017 usertrap_amd64.go:122] [ 357( 350): 357( 350)] Allocate a new trap: 0xc00037ebd0 32 D0719 21:52:58.001895 445017 usertrap_amd64.go:225] [ 357( 350): 357( 350)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:58.002491 445017 usertrap_amd64.go:212] [ 357( 350): 357( 350)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:58.002553 445017 usertrap_amd64.go:122] [ 357( 350): 357( 350)] Allocate a new trap: 0xc00037ebd0 33 D0719 21:52:58.002617 445017 usertrap_amd64.go:225] [ 357( 350): 357( 350)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:58.002973 445017 usertrap_amd64.go:212] [ 357( 350): 358( 351)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:58.003044 445017 usertrap_amd64.go:122] [ 357( 350): 358( 351)] Allocate a new trap: 0xc00037ebd0 34 D0719 21:52:58.003133 445017 usertrap_amd64.go:225] [ 357( 350): 358( 351)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:58.014331 445017 usertrap_amd64.go:212] [ 357( 350): 357( 350)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:58.014426 445017 usertrap_amd64.go:122] [ 357( 350): 357( 350)] Allocate a new trap: 0xc00037ebd0 35 D0719 21:52:58.014534 445017 usertrap_amd64.go:225] [ 357( 350): 357( 350)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:58.017082 445017 usertrap_amd64.go:212] [ 357( 350): 357( 350)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:58.017159 445017 usertrap_amd64.go:122] [ 357( 350): 357( 350)] Allocate a new trap: 0xc00037ebd0 36 D0719 21:52:58.017255 445017 usertrap_amd64.go:225] [ 357( 350): 357( 350)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:58.017766 445017 task_exit.go:204] [ 357( 350): 357( 350)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.017864 445017 task_signals.go:204] [ 357( 350): 358( 351)] Signal 357, PID: 358, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.017885 445017 task_signals.go:204] [ 357( 350): 359( 352)] Signal 357, PID: 359, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.017937 445017 task_exit.go:204] [ 357( 350): 358( 351)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.018160 445017 task_exit.go:204] [ 357( 350): 359( 352)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.018374 445017 task_exit.go:204] [ 357( 350): 357( 350)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.018462 445017 task_exit.go:204] [ 357( 350): 358( 351)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.018498 445017 task_exit.go:204] [ 357( 350): 358( 351)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.021420 445017 task_exit.go:204] [ 357( 350): 359( 352)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.021495 445017 task_exit.go:204] [ 357( 350): 359( 352)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.021579 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:58.021784 445017 task_exit.go:204] [ 357( 350): 357( 350)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.029562 445017 usertrap_amd64.go:212] [ 360( 353): 360( 353)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:58.029665 445017 usertrap_amd64.go:122] [ 360( 353): 360( 353)] Allocate a new trap: 0xc000886360 28 D0719 21:52:58.030265 445017 usertrap_amd64.go:225] [ 360( 353): 360( 353)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:58.037739 445017 usertrap_amd64.go:212] [ 360( 353): 360( 353)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:58.037813 445017 usertrap_amd64.go:122] [ 360( 353): 360( 353)] Allocate a new trap: 0xc000886360 29 D0719 21:52:58.037881 445017 usertrap_amd64.go:225] [ 360( 353): 360( 353)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:58.038632 445017 usertrap_amd64.go:212] [ 360( 353): 360( 353)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:58.038708 445017 usertrap_amd64.go:122] [ 360( 353): 360( 353)] Allocate a new trap: 0xc000886360 30 D0719 21:52:58.038765 445017 usertrap_amd64.go:225] [ 360( 353): 360( 353)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:58.046278 445017 usertrap_amd64.go:212] [ 360( 353): 360( 353)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:58.046368 445017 usertrap_amd64.go:122] [ 360( 353): 360( 353)] Allocate a new trap: 0xc000886360 31 D0719 21:52:58.046479 445017 usertrap_amd64.go:225] [ 360( 353): 360( 353)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:58.046780 445017 usertrap_amd64.go:212] [ 360( 353): 360( 353)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:58.046820 445017 usertrap_amd64.go:122] [ 360( 353): 360( 353)] Allocate a new trap: 0xc000886360 32 D0719 21:52:58.046877 445017 usertrap_amd64.go:225] [ 360( 353): 360( 353)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:58.047503 445017 usertrap_amd64.go:212] [ 360( 353): 360( 353)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:58.047553 445017 usertrap_amd64.go:122] [ 360( 353): 360( 353)] Allocate a new trap: 0xc000886360 33 D0719 21:52:58.047689 445017 usertrap_amd64.go:225] [ 360( 353): 360( 353)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:58.047856 445017 usertrap_amd64.go:212] [ 360( 353): 361( 354)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:58.047929 445017 usertrap_amd64.go:122] [ 360( 353): 361( 354)] Allocate a new trap: 0xc000886360 34 D0719 21:52:58.048041 445017 usertrap_amd64.go:225] [ 360( 353): 361( 354)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:58.056004 445017 usertrap_amd64.go:212] [ 360( 353): 360( 353)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:58.056078 445017 usertrap_amd64.go:122] [ 360( 353): 360( 353)] Allocate a new trap: 0xc000886360 35 D0719 21:52:58.056127 445017 usertrap_amd64.go:225] [ 360( 353): 360( 353)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:58.058416 445017 usertrap_amd64.go:212] [ 360( 353): 360( 353)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:58.058515 445017 usertrap_amd64.go:122] [ 360( 353): 360( 353)] Allocate a new trap: 0xc000886360 36 D0719 21:52:58.058584 445017 usertrap_amd64.go:225] [ 360( 353): 360( 353)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:58.059105 445017 task_exit.go:204] [ 360( 353): 360( 353)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.059387 445017 task_signals.go:204] [ 360( 353): 362( 355)] Signal 360, PID: 362, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.059522 445017 task_signals.go:204] [ 360( 353): 361( 354)] Signal 360, PID: 361, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.059527 445017 task_exit.go:204] [ 360( 353): 360( 353)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.059717 445017 task_exit.go:204] [ 360( 353): 361( 354)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.059893 445017 task_exit.go:204] [ 360( 353): 362( 355)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.060083 445017 task_exit.go:204] [ 360( 353): 361( 354)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.060143 445017 task_exit.go:204] [ 360( 353): 361( 354)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.063728 445017 task_exit.go:204] [ 360( 353): 362( 355)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.063795 445017 task_exit.go:204] [ 360( 353): 362( 355)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.063878 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:58.063972 445017 task_exit.go:204] [ 360( 353): 360( 353)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.078120 445017 usertrap_amd64.go:212] [ 363( 356): 363( 356)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:58.078211 445017 usertrap_amd64.go:122] [ 363( 356): 363( 356)] Allocate a new trap: 0xc00037ec00 28 D0719 21:52:58.078609 445017 usertrap_amd64.go:225] [ 363( 356): 363( 356)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:58.087012 445017 usertrap_amd64.go:212] [ 363( 356): 363( 356)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:58.087117 445017 usertrap_amd64.go:122] [ 363( 356): 363( 356)] Allocate a new trap: 0xc00037ec00 29 D0719 21:52:58.087233 445017 usertrap_amd64.go:225] [ 363( 356): 363( 356)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:58.091086 445017 usertrap_amd64.go:212] [ 363( 356): 363( 356)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:58.091162 445017 usertrap_amd64.go:122] [ 363( 356): 363( 356)] Allocate a new trap: 0xc00037ec00 30 D0719 21:52:58.091352 445017 usertrap_amd64.go:225] [ 363( 356): 363( 356)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:58.096173 445017 usertrap_amd64.go:212] [ 363( 356): 363( 356)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:58.096244 445017 usertrap_amd64.go:122] [ 363( 356): 363( 356)] Allocate a new trap: 0xc00037ec00 31 D0719 21:52:58.096340 445017 usertrap_amd64.go:225] [ 363( 356): 363( 356)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:58.096600 445017 usertrap_amd64.go:212] [ 363( 356): 363( 356)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:58.096664 445017 usertrap_amd64.go:122] [ 363( 356): 363( 356)] Allocate a new trap: 0xc00037ec00 32 D0719 21:52:58.096728 445017 usertrap_amd64.go:225] [ 363( 356): 363( 356)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:58.097357 445017 usertrap_amd64.go:212] [ 363( 356): 363( 356)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:58.097403 445017 usertrap_amd64.go:122] [ 363( 356): 363( 356)] Allocate a new trap: 0xc00037ec00 33 D0719 21:52:58.097444 445017 usertrap_amd64.go:225] [ 363( 356): 363( 356)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:58.097725 445017 usertrap_amd64.go:212] [ 363( 356): 364( 357)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:58.097818 445017 usertrap_amd64.go:122] [ 363( 356): 364( 357)] Allocate a new trap: 0xc00037ec00 34 D0719 21:52:58.097885 445017 usertrap_amd64.go:225] [ 363( 356): 364( 357)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:58.104476 445017 usertrap_amd64.go:212] [ 363( 356): 363( 356)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:58.104536 445017 usertrap_amd64.go:122] [ 363( 356): 363( 356)] Allocate a new trap: 0xc00037ec00 35 D0719 21:52:58.104619 445017 usertrap_amd64.go:225] [ 363( 356): 363( 356)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:58.106442 445017 usertrap_amd64.go:212] [ 363( 356): 363( 356)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:58.106500 445017 usertrap_amd64.go:122] [ 363( 356): 363( 356)] Allocate a new trap: 0xc00037ec00 36 D0719 21:52:58.106565 445017 usertrap_amd64.go:225] [ 363( 356): 363( 356)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:58.106941 445017 task_exit.go:204] [ 363( 356): 363( 356)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.107130 445017 task_exit.go:204] [ 363( 356): 363( 356)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.107249 445017 task_signals.go:204] [ 363( 356): 365( 358)] Signal 363, PID: 365, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.107249 445017 task_signals.go:204] [ 363( 356): 364( 357)] Signal 363, PID: 364, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.107348 445017 task_exit.go:204] [ 363( 356): 365( 358)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.107465 445017 task_exit.go:204] [ 363( 356): 364( 357)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.107736 445017 task_exit.go:204] [ 363( 356): 365( 358)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.107818 445017 task_exit.go:204] [ 363( 356): 365( 358)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.110510 445017 task_exit.go:204] [ 363( 356): 364( 357)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.110569 445017 task_exit.go:204] [ 363( 356): 364( 357)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.110656 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:58.110754 445017 task_exit.go:204] [ 363( 356): 363( 356)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.117131 445017 usertrap_amd64.go:212] [ 366( 359): 366( 359)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:58.117215 445017 usertrap_amd64.go:122] [ 366( 359): 366( 359)] Allocate a new trap: 0xc000bfa060 28 D0719 21:52:58.117633 445017 usertrap_amd64.go:225] [ 366( 359): 366( 359)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:58.122746 445017 usertrap_amd64.go:212] [ 366( 359): 366( 359)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:58.122827 445017 usertrap_amd64.go:122] [ 366( 359): 366( 359)] Allocate a new trap: 0xc000bfa060 29 D0719 21:52:58.122897 445017 usertrap_amd64.go:225] [ 366( 359): 366( 359)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:58.124467 445017 usertrap_amd64.go:212] [ 366( 359): 366( 359)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:58.124539 445017 usertrap_amd64.go:122] [ 366( 359): 366( 359)] Allocate a new trap: 0xc000bfa060 30 D0719 21:52:58.124611 445017 usertrap_amd64.go:225] [ 366( 359): 366( 359)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:58.130328 445017 usertrap_amd64.go:212] [ 366( 359): 366( 359)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:58.130399 445017 usertrap_amd64.go:122] [ 366( 359): 366( 359)] Allocate a new trap: 0xc000bfa060 31 D0719 21:52:58.130463 445017 usertrap_amd64.go:225] [ 366( 359): 366( 359)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:58.130815 445017 usertrap_amd64.go:212] [ 366( 359): 366( 359)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:58.130911 445017 usertrap_amd64.go:122] [ 366( 359): 366( 359)] Allocate a new trap: 0xc000bfa060 32 D0719 21:52:58.130974 445017 usertrap_amd64.go:225] [ 366( 359): 366( 359)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:58.131569 445017 usertrap_amd64.go:212] [ 366( 359): 366( 359)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:58.131710 445017 usertrap_amd64.go:122] [ 366( 359): 366( 359)] Allocate a new trap: 0xc000bfa060 33 D0719 21:52:58.131805 445017 usertrap_amd64.go:225] [ 366( 359): 366( 359)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:58.132103 445017 usertrap_amd64.go:212] [ 366( 359): 367( 360)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:58.132161 445017 usertrap_amd64.go:122] [ 366( 359): 367( 360)] Allocate a new trap: 0xc000bfa060 34 D0719 21:52:58.132245 445017 usertrap_amd64.go:225] [ 366( 359): 367( 360)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:58.139775 445017 usertrap_amd64.go:212] [ 366( 359): 366( 359)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:58.139829 445017 usertrap_amd64.go:122] [ 366( 359): 366( 359)] Allocate a new trap: 0xc000bfa060 35 D0719 21:52:58.139885 445017 usertrap_amd64.go:225] [ 366( 359): 366( 359)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:58.142067 445017 usertrap_amd64.go:212] [ 366( 359): 366( 359)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:58.142152 445017 usertrap_amd64.go:122] [ 366( 359): 366( 359)] Allocate a new trap: 0xc000bfa060 36 D0719 21:52:58.142245 445017 usertrap_amd64.go:225] [ 366( 359): 366( 359)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:58.142826 445017 task_exit.go:204] [ 366( 359): 366( 359)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.143159 445017 task_signals.go:204] [ 366( 359): 368( 361)] Signal 366, PID: 368, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.143183 445017 task_signals.go:204] [ 366( 359): 367( 360)] Signal 366, PID: 367, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.143251 445017 task_exit.go:204] [ 366( 359): 366( 359)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.143438 445017 task_exit.go:204] [ 366( 359): 368( 361)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.143711 445017 task_exit.go:204] [ 366( 359): 368( 361)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.143783 445017 task_exit.go:204] [ 366( 359): 368( 361)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.143901 445017 task_exit.go:204] [ 366( 359): 367( 360)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.147260 445017 task_exit.go:204] [ 366( 359): 367( 360)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.147311 445017 task_exit.go:204] [ 366( 359): 367( 360)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.147399 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:58.148591 445017 task_exit.go:204] [ 366( 359): 366( 359)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.157562 445017 usertrap_amd64.go:212] [ 369( 362): 369( 362)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:58.157709 445017 usertrap_amd64.go:122] [ 369( 362): 369( 362)] Allocate a new trap: 0xc000a68780 28 D0719 21:52:58.158250 445017 usertrap_amd64.go:225] [ 369( 362): 369( 362)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:58.162119 445017 usertrap_amd64.go:212] [ 369( 362): 369( 362)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:58.162198 445017 usertrap_amd64.go:122] [ 369( 362): 369( 362)] Allocate a new trap: 0xc000a68780 29 D0719 21:52:58.162266 445017 usertrap_amd64.go:225] [ 369( 362): 369( 362)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:58.163468 445017 usertrap_amd64.go:212] [ 369( 362): 369( 362)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:58.163544 445017 usertrap_amd64.go:122] [ 369( 362): 369( 362)] Allocate a new trap: 0xc000a68780 30 D0719 21:52:58.163693 445017 usertrap_amd64.go:225] [ 369( 362): 369( 362)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:58.167279 445017 usertrap_amd64.go:212] [ 369( 362): 369( 362)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:58.167336 445017 usertrap_amd64.go:122] [ 369( 362): 369( 362)] Allocate a new trap: 0xc000a68780 31 D0719 21:52:58.167417 445017 usertrap_amd64.go:225] [ 369( 362): 369( 362)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:58.167924 445017 usertrap_amd64.go:212] [ 369( 362): 369( 362)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:58.168021 445017 usertrap_amd64.go:122] [ 369( 362): 369( 362)] Allocate a new trap: 0xc000a68780 32 D0719 21:52:58.168087 445017 usertrap_amd64.go:225] [ 369( 362): 369( 362)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:58.168636 445017 usertrap_amd64.go:212] [ 369( 362): 369( 362)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:58.168687 445017 usertrap_amd64.go:122] [ 369( 362): 369( 362)] Allocate a new trap: 0xc000a68780 33 D0719 21:52:58.168748 445017 usertrap_amd64.go:225] [ 369( 362): 369( 362)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:58.169793 445017 usertrap_amd64.go:212] [ 369( 362): 370( 363)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:58.169852 445017 usertrap_amd64.go:122] [ 369( 362): 370( 363)] Allocate a new trap: 0xc000a68780 34 D0719 21:52:58.169914 445017 usertrap_amd64.go:225] [ 369( 362): 370( 363)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:58.176397 445017 usertrap_amd64.go:212] [ 369( 362): 369( 362)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:58.176471 445017 usertrap_amd64.go:122] [ 369( 362): 369( 362)] Allocate a new trap: 0xc000a68780 35 D0719 21:52:58.176573 445017 usertrap_amd64.go:225] [ 369( 362): 369( 362)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:58.178932 445017 usertrap_amd64.go:212] [ 369( 362): 369( 362)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:58.179001 445017 usertrap_amd64.go:122] [ 369( 362): 369( 362)] Allocate a new trap: 0xc000a68780 36 D0719 21:52:58.179070 445017 usertrap_amd64.go:225] [ 369( 362): 369( 362)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:58.179477 445017 task_exit.go:204] [ 369( 362): 369( 362)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.179585 445017 task_signals.go:204] [ 369( 362): 371( 364)] Signal 369, PID: 371, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.179656 445017 task_signals.go:204] [ 369( 362): 370( 363)] Signal 369, PID: 370, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.179800 445017 task_exit.go:204] [ 369( 362): 370( 363)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.179924 445017 task_exit.go:204] [ 369( 362): 369( 362)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.180224 445017 task_exit.go:204] [ 369( 362): 371( 364)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.180439 445017 task_exit.go:204] [ 369( 362): 370( 363)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.180520 445017 task_exit.go:204] [ 369( 362): 370( 363)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.183582 445017 task_exit.go:204] [ 369( 362): 371( 364)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.183683 445017 task_exit.go:204] [ 369( 362): 371( 364)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.183807 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:58.184145 445017 task_exit.go:204] [ 369( 362): 369( 362)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.190954 445017 usertrap_amd64.go:212] [ 372( 365): 372( 365)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:58.191071 445017 usertrap_amd64.go:122] [ 372( 365): 372( 365)] Allocate a new trap: 0xc000a687b0 28 D0719 21:52:58.191532 445017 usertrap_amd64.go:225] [ 372( 365): 372( 365)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:58.195840 445017 usertrap_amd64.go:212] [ 372( 365): 372( 365)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:58.195940 445017 usertrap_amd64.go:122] [ 372( 365): 372( 365)] Allocate a new trap: 0xc000a687b0 29 D0719 21:52:58.196015 445017 usertrap_amd64.go:225] [ 372( 365): 372( 365)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:58.197178 445017 usertrap_amd64.go:212] [ 372( 365): 372( 365)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:58.197251 445017 usertrap_amd64.go:122] [ 372( 365): 372( 365)] Allocate a new trap: 0xc000a687b0 30 D0719 21:52:58.197359 445017 usertrap_amd64.go:225] [ 372( 365): 372( 365)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:58.202243 445017 usertrap_amd64.go:212] [ 372( 365): 372( 365)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:58.202338 445017 usertrap_amd64.go:122] [ 372( 365): 372( 365)] Allocate a new trap: 0xc000a687b0 31 D0719 21:52:58.202405 445017 usertrap_amd64.go:225] [ 372( 365): 372( 365)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:58.202683 445017 usertrap_amd64.go:212] [ 372( 365): 372( 365)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:58.202738 445017 usertrap_amd64.go:122] [ 372( 365): 372( 365)] Allocate a new trap: 0xc000a687b0 32 D0719 21:52:58.202824 445017 usertrap_amd64.go:225] [ 372( 365): 372( 365)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:58.203592 445017 usertrap_amd64.go:212] [ 372( 365): 372( 365)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:58.203779 445017 usertrap_amd64.go:122] [ 372( 365): 372( 365)] Allocate a new trap: 0xc000a687b0 33 D0719 21:52:58.203849 445017 usertrap_amd64.go:225] [ 372( 365): 372( 365)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:58.204232 445017 usertrap_amd64.go:212] [ 372( 365): 373( 366)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:58.204302 445017 usertrap_amd64.go:122] [ 372( 365): 373( 366)] Allocate a new trap: 0xc000a687b0 34 D0719 21:52:58.204578 445017 usertrap_amd64.go:225] [ 372( 365): 373( 366)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:58.211582 445017 usertrap_amd64.go:212] [ 372( 365): 372( 365)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:58.211702 445017 usertrap_amd64.go:122] [ 372( 365): 372( 365)] Allocate a new trap: 0xc000a687b0 35 D0719 21:52:58.211797 445017 usertrap_amd64.go:225] [ 372( 365): 372( 365)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:58.214005 445017 usertrap_amd64.go:212] [ 372( 365): 372( 365)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:58.214061 445017 usertrap_amd64.go:122] [ 372( 365): 372( 365)] Allocate a new trap: 0xc000a687b0 36 D0719 21:52:58.214124 445017 usertrap_amd64.go:225] [ 372( 365): 372( 365)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:58.214603 445017 task_exit.go:204] [ 372( 365): 372( 365)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.214711 445017 task_signals.go:204] [ 372( 365): 374( 367)] Signal 372, PID: 374, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.214846 445017 task_signals.go:204] [ 372( 365): 373( 366)] Signal 372, PID: 373, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.214857 445017 task_exit.go:204] [ 372( 365): 374( 367)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.214979 445017 task_exit.go:204] [ 372( 365): 373( 366)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.215208 445017 task_exit.go:204] [ 372( 365): 374( 367)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.215289 445017 task_exit.go:204] [ 372( 365): 374( 367)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.215426 445017 task_exit.go:204] [ 372( 365): 372( 365)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.217936 445017 task_exit.go:204] [ 372( 365): 373( 366)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.218011 445017 task_exit.go:204] [ 372( 365): 373( 366)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.218067 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:58.218266 445017 task_exit.go:204] [ 372( 365): 372( 365)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.225929 445017 usertrap_amd64.go:212] [ 375( 368): 375( 368)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:58.226021 445017 usertrap_amd64.go:122] [ 375( 368): 375( 368)] Allocate a new trap: 0xc001466210 28 D0719 21:52:58.226430 445017 usertrap_amd64.go:225] [ 375( 368): 375( 368)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:58.230008 445017 usertrap_amd64.go:212] [ 375( 368): 375( 368)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:58.230073 445017 usertrap_amd64.go:122] [ 375( 368): 375( 368)] Allocate a new trap: 0xc001466210 29 D0719 21:52:58.230124 445017 usertrap_amd64.go:225] [ 375( 368): 375( 368)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:58.231226 445017 usertrap_amd64.go:212] [ 375( 368): 375( 368)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:58.231269 445017 usertrap_amd64.go:122] [ 375( 368): 375( 368)] Allocate a new trap: 0xc001466210 30 D0719 21:52:58.231323 445017 usertrap_amd64.go:225] [ 375( 368): 375( 368)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:58.235524 445017 usertrap_amd64.go:212] [ 375( 368): 375( 368)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:58.235639 445017 usertrap_amd64.go:122] [ 375( 368): 375( 368)] Allocate a new trap: 0xc001466210 31 D0719 21:52:58.235705 445017 usertrap_amd64.go:225] [ 375( 368): 375( 368)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:58.235927 445017 usertrap_amd64.go:212] [ 375( 368): 375( 368)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:58.235969 445017 usertrap_amd64.go:122] [ 375( 368): 375( 368)] Allocate a new trap: 0xc001466210 32 D0719 21:52:58.236031 445017 usertrap_amd64.go:225] [ 375( 368): 375( 368)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:58.236584 445017 usertrap_amd64.go:212] [ 375( 368): 375( 368)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:58.236684 445017 usertrap_amd64.go:122] [ 375( 368): 375( 368)] Allocate a new trap: 0xc001466210 33 D0719 21:52:58.236743 445017 usertrap_amd64.go:225] [ 375( 368): 375( 368)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:58.236913 445017 usertrap_amd64.go:212] [ 375( 368): 376( 369)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:58.236978 445017 usertrap_amd64.go:122] [ 375( 368): 376( 369)] Allocate a new trap: 0xc001466210 34 D0719 21:52:58.237041 445017 usertrap_amd64.go:225] [ 375( 368): 376( 369)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:58.244243 445017 usertrap_amd64.go:212] [ 375( 368): 375( 368)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:58.244337 445017 usertrap_amd64.go:122] [ 375( 368): 375( 368)] Allocate a new trap: 0xc001466210 35 D0719 21:52:58.244430 445017 usertrap_amd64.go:225] [ 375( 368): 375( 368)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:58.247379 445017 usertrap_amd64.go:212] [ 375( 368): 375( 368)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:58.247528 445017 usertrap_amd64.go:122] [ 375( 368): 375( 368)] Allocate a new trap: 0xc001466210 36 D0719 21:52:58.247677 445017 usertrap_amd64.go:225] [ 375( 368): 375( 368)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:58.248340 445017 task_signals.go:204] [ 375( 368): 376( 369)] Signal 375, PID: 376, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.248349 445017 task_signals.go:204] [ 375( 368): 377( 370)] Signal 375, PID: 377, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.248380 445017 task_exit.go:204] [ 375( 368): 375( 368)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.248650 445017 task_exit.go:204] [ 375( 368): 376( 369)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.248858 445017 task_exit.go:204] [ 375( 368): 377( 370)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.249285 445017 task_exit.go:204] [ 375( 368): 376( 369)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.249465 445017 task_exit.go:204] [ 375( 368): 376( 369)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.249644 445017 task_exit.go:204] [ 375( 368): 375( 368)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.252316 445017 task_exit.go:204] [ 375( 368): 377( 370)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.252413 445017 task_exit.go:204] [ 375( 368): 377( 370)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.252514 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:58.253151 445017 task_exit.go:204] [ 375( 368): 375( 368)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.260072 445017 usertrap_amd64.go:212] [ 378( 371): 378( 371)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:58.260145 445017 usertrap_amd64.go:122] [ 378( 371): 378( 371)] Allocate a new trap: 0xc000886540 28 D0719 21:52:58.260540 445017 usertrap_amd64.go:225] [ 378( 371): 378( 371)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:58.264145 445017 usertrap_amd64.go:212] [ 378( 371): 378( 371)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:58.264236 445017 usertrap_amd64.go:122] [ 378( 371): 378( 371)] Allocate a new trap: 0xc000886540 29 D0719 21:52:58.264309 445017 usertrap_amd64.go:225] [ 378( 371): 378( 371)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:58.265518 445017 usertrap_amd64.go:212] [ 378( 371): 378( 371)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:58.265576 445017 usertrap_amd64.go:122] [ 378( 371): 378( 371)] Allocate a new trap: 0xc000886540 30 D0719 21:52:58.265640 445017 usertrap_amd64.go:225] [ 378( 371): 378( 371)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:58.269099 445017 usertrap_amd64.go:212] [ 378( 371): 378( 371)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:58.269264 445017 usertrap_amd64.go:122] [ 378( 371): 378( 371)] Allocate a new trap: 0xc000886540 31 D0719 21:52:58.269353 445017 usertrap_amd64.go:225] [ 378( 371): 378( 371)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:58.269591 445017 usertrap_amd64.go:212] [ 378( 371): 378( 371)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:58.269631 445017 usertrap_amd64.go:122] [ 378( 371): 378( 371)] Allocate a new trap: 0xc000886540 32 D0719 21:52:58.269679 445017 usertrap_amd64.go:225] [ 378( 371): 378( 371)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:58.270190 445017 usertrap_amd64.go:212] [ 378( 371): 378( 371)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:58.270236 445017 usertrap_amd64.go:122] [ 378( 371): 378( 371)] Allocate a new trap: 0xc000886540 33 D0719 21:52:58.270313 445017 usertrap_amd64.go:225] [ 378( 371): 378( 371)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:58.270588 445017 usertrap_amd64.go:212] [ 378( 371): 379( 372)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:58.270652 445017 usertrap_amd64.go:122] [ 378( 371): 379( 372)] Allocate a new trap: 0xc000886540 34 D0719 21:52:58.270713 445017 usertrap_amd64.go:225] [ 378( 371): 379( 372)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:58.277924 445017 usertrap_amd64.go:212] [ 378( 371): 378( 371)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:58.277995 445017 usertrap_amd64.go:122] [ 378( 371): 378( 371)] Allocate a new trap: 0xc000886540 35 D0719 21:52:58.278045 445017 usertrap_amd64.go:225] [ 378( 371): 378( 371)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:58.280174 445017 usertrap_amd64.go:212] [ 378( 371): 378( 371)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:58.280236 445017 usertrap_amd64.go:122] [ 378( 371): 378( 371)] Allocate a new trap: 0xc000886540 36 D0719 21:52:58.280295 445017 usertrap_amd64.go:225] [ 378( 371): 378( 371)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:58.280938 445017 task_exit.go:204] [ 378( 371): 378( 371)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.281101 445017 task_signals.go:204] [ 378( 371): 379( 372)] Signal 378, PID: 379, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.281211 445017 task_signals.go:204] [ 378( 371): 380( 373)] Signal 378, PID: 380, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.281233 445017 task_exit.go:204] [ 378( 371): 378( 371)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.281302 445017 task_exit.go:204] [ 378( 371): 379( 372)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.281455 445017 task_exit.go:204] [ 378( 371): 379( 372)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.281516 445017 task_exit.go:204] [ 378( 371): 379( 372)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.281768 445017 task_exit.go:204] [ 378( 371): 380( 373)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.286024 445017 task_exit.go:204] [ 378( 371): 380( 373)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.286229 445017 task_exit.go:204] [ 378( 371): 380( 373)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.286375 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:58.286519 445017 task_exit.go:204] [ 378( 371): 378( 371)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.296570 445017 usertrap_amd64.go:212] [ 381( 374): 381( 374)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:58.296681 445017 usertrap_amd64.go:122] [ 381( 374): 381( 374)] Allocate a new trap: 0xc00037ed20 28 D0719 21:52:58.297113 445017 usertrap_amd64.go:225] [ 381( 374): 381( 374)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:58.301269 445017 usertrap_amd64.go:212] [ 381( 374): 381( 374)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:58.301356 445017 usertrap_amd64.go:122] [ 381( 374): 381( 374)] Allocate a new trap: 0xc00037ed20 29 D0719 21:52:58.301430 445017 usertrap_amd64.go:225] [ 381( 374): 381( 374)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:58.304308 445017 usertrap_amd64.go:212] [ 381( 374): 381( 374)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:58.304368 445017 usertrap_amd64.go:122] [ 381( 374): 381( 374)] Allocate a new trap: 0xc00037ed20 30 D0719 21:52:58.304435 445017 usertrap_amd64.go:225] [ 381( 374): 381( 374)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:58.308884 445017 usertrap_amd64.go:212] [ 381( 374): 381( 374)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:58.308999 445017 usertrap_amd64.go:122] [ 381( 374): 381( 374)] Allocate a new trap: 0xc00037ed20 31 D0719 21:52:58.309091 445017 usertrap_amd64.go:225] [ 381( 374): 381( 374)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:58.309382 445017 usertrap_amd64.go:212] [ 381( 374): 381( 374)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:58.309452 445017 usertrap_amd64.go:122] [ 381( 374): 381( 374)] Allocate a new trap: 0xc00037ed20 32 D0719 21:52:58.309511 445017 usertrap_amd64.go:225] [ 381( 374): 381( 374)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:58.310192 445017 usertrap_amd64.go:212] [ 381( 374): 381( 374)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:58.310267 445017 usertrap_amd64.go:122] [ 381( 374): 381( 374)] Allocate a new trap: 0xc00037ed20 33 D0719 21:52:58.310330 445017 usertrap_amd64.go:225] [ 381( 374): 381( 374)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:58.310636 445017 usertrap_amd64.go:212] [ 381( 374): 382( 375)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:58.310730 445017 usertrap_amd64.go:122] [ 381( 374): 382( 375)] Allocate a new trap: 0xc00037ed20 34 D0719 21:52:58.310799 445017 usertrap_amd64.go:225] [ 381( 374): 382( 375)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:58.318813 445017 usertrap_amd64.go:212] [ 381( 374): 381( 374)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:58.318882 445017 usertrap_amd64.go:122] [ 381( 374): 381( 374)] Allocate a new trap: 0xc00037ed20 35 D0719 21:52:58.318955 445017 usertrap_amd64.go:225] [ 381( 374): 381( 374)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:58.321693 445017 usertrap_amd64.go:212] [ 381( 374): 381( 374)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:58.321783 445017 usertrap_amd64.go:122] [ 381( 374): 381( 374)] Allocate a new trap: 0xc00037ed20 36 D0719 21:52:58.321861 445017 usertrap_amd64.go:225] [ 381( 374): 381( 374)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:58.322465 445017 task_exit.go:204] [ 381( 374): 381( 374)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.322732 445017 task_exit.go:204] [ 381( 374): 381( 374)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.322903 445017 task_signals.go:204] [ 381( 374): 382( 375)] Signal 381, PID: 382, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.323017 445017 task_exit.go:204] [ 381( 374): 382( 375)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.323216 445017 task_signals.go:204] [ 381( 374): 383( 376)] Signal 381, PID: 383, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.323353 445017 task_exit.go:204] [ 381( 374): 383( 376)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.323547 445017 task_exit.go:204] [ 381( 374): 382( 375)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.323745 445017 task_exit.go:204] [ 381( 374): 382( 375)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.327005 445017 task_exit.go:204] [ 381( 374): 383( 376)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.327091 445017 task_exit.go:204] [ 381( 374): 383( 376)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.327190 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:58.327504 445017 task_exit.go:204] [ 381( 374): 381( 374)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.334248 445017 usertrap_amd64.go:212] [ 384( 377): 384( 377)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:58.334317 445017 usertrap_amd64.go:122] [ 384( 377): 384( 377)] Allocate a new trap: 0xc000b12930 28 D0719 21:52:58.334636 445017 usertrap_amd64.go:225] [ 384( 377): 384( 377)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:58.352533 445017 usertrap_amd64.go:212] [ 384( 377): 384( 377)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:58.352598 445017 usertrap_amd64.go:122] [ 384( 377): 384( 377)] Allocate a new trap: 0xc000b12930 29 D0719 21:52:58.352653 445017 usertrap_amd64.go:225] [ 384( 377): 384( 377)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:58.353907 445017 usertrap_amd64.go:212] [ 384( 377): 384( 377)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:58.354005 445017 usertrap_amd64.go:122] [ 384( 377): 384( 377)] Allocate a new trap: 0xc000b12930 30 D0719 21:52:58.354064 445017 usertrap_amd64.go:225] [ 384( 377): 384( 377)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:58.358548 445017 usertrap_amd64.go:212] [ 384( 377): 384( 377)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:58.358631 445017 usertrap_amd64.go:122] [ 384( 377): 384( 377)] Allocate a new trap: 0xc000b12930 31 D0719 21:52:58.358680 445017 usertrap_amd64.go:225] [ 384( 377): 384( 377)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:58.358954 445017 usertrap_amd64.go:212] [ 384( 377): 384( 377)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:58.359027 445017 usertrap_amd64.go:122] [ 384( 377): 384( 377)] Allocate a new trap: 0xc000b12930 32 D0719 21:52:58.359102 445017 usertrap_amd64.go:225] [ 384( 377): 384( 377)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:58.359767 445017 usertrap_amd64.go:212] [ 384( 377): 384( 377)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:58.359814 445017 usertrap_amd64.go:122] [ 384( 377): 384( 377)] Allocate a new trap: 0xc000b12930 33 D0719 21:52:58.359911 445017 usertrap_amd64.go:225] [ 384( 377): 384( 377)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:58.360354 445017 usertrap_amd64.go:212] [ 384( 377): 385( 378)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:58.360433 445017 usertrap_amd64.go:122] [ 384( 377): 385( 378)] Allocate a new trap: 0xc000b12930 34 D0719 21:52:58.360515 445017 usertrap_amd64.go:225] [ 384( 377): 385( 378)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:58.367309 445017 usertrap_amd64.go:212] [ 384( 377): 384( 377)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:58.367387 445017 usertrap_amd64.go:122] [ 384( 377): 384( 377)] Allocate a new trap: 0xc000b12930 35 D0719 21:52:58.367436 445017 usertrap_amd64.go:225] [ 384( 377): 384( 377)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:58.372084 445017 usertrap_amd64.go:212] [ 384( 377): 384( 377)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:58.372208 445017 usertrap_amd64.go:122] [ 384( 377): 384( 377)] Allocate a new trap: 0xc000b12930 36 D0719 21:52:58.372291 445017 usertrap_amd64.go:225] [ 384( 377): 384( 377)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:58.373077 445017 task_exit.go:204] [ 384( 377): 384( 377)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.373238 445017 task_signals.go:204] [ 384( 377): 386( 379)] Signal 384, PID: 386, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.373401 445017 task_exit.go:204] [ 384( 377): 386( 379)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.373714 445017 task_exit.go:204] [ 384( 377): 386( 379)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.373720 445017 task_signals.go:204] [ 384( 377): 385( 378)] Signal 384, PID: 385, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.373811 445017 task_exit.go:204] [ 384( 377): 386( 379)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.374172 445017 task_exit.go:204] [ 384( 377): 385( 378)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.374351 445017 task_exit.go:204] [ 384( 377): 384( 377)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.377676 445017 task_exit.go:204] [ 384( 377): 385( 378)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.377738 445017 task_exit.go:204] [ 384( 377): 385( 378)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.377826 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:58.378075 445017 task_exit.go:204] [ 384( 377): 384( 377)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.384740 445017 usertrap_amd64.go:212] [ 387( 380): 387( 380)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:58.384854 445017 usertrap_amd64.go:122] [ 387( 380): 387( 380)] Allocate a new trap: 0xc001466330 28 D0719 21:52:58.385318 445017 usertrap_amd64.go:225] [ 387( 380): 387( 380)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:58.388832 445017 usertrap_amd64.go:212] [ 387( 380): 387( 380)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:58.388900 445017 usertrap_amd64.go:122] [ 387( 380): 387( 380)] Allocate a new trap: 0xc001466330 29 D0719 21:52:58.388971 445017 usertrap_amd64.go:225] [ 387( 380): 387( 380)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:58.389898 445017 usertrap_amd64.go:212] [ 387( 380): 387( 380)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:58.389994 445017 usertrap_amd64.go:122] [ 387( 380): 387( 380)] Allocate a new trap: 0xc001466330 30 D0719 21:52:58.390047 445017 usertrap_amd64.go:225] [ 387( 380): 387( 380)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:58.394939 445017 usertrap_amd64.go:212] [ 387( 380): 387( 380)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:58.395041 445017 usertrap_amd64.go:122] [ 387( 380): 387( 380)] Allocate a new trap: 0xc001466330 31 D0719 21:52:58.395113 445017 usertrap_amd64.go:225] [ 387( 380): 387( 380)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:58.395447 445017 usertrap_amd64.go:212] [ 387( 380): 387( 380)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:58.395563 445017 usertrap_amd64.go:122] [ 387( 380): 387( 380)] Allocate a new trap: 0xc001466330 32 D0719 21:52:58.395733 445017 usertrap_amd64.go:225] [ 387( 380): 387( 380)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:58.396379 445017 usertrap_amd64.go:212] [ 387( 380): 387( 380)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:58.396435 445017 usertrap_amd64.go:122] [ 387( 380): 387( 380)] Allocate a new trap: 0xc001466330 33 D0719 21:52:58.396504 445017 usertrap_amd64.go:225] [ 387( 380): 387( 380)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:58.397592 445017 usertrap_amd64.go:212] [ 387( 380): 388( 381)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:58.397705 445017 usertrap_amd64.go:122] [ 387( 380): 388( 381)] Allocate a new trap: 0xc001466330 34 D0719 21:52:58.397775 445017 usertrap_amd64.go:225] [ 387( 380): 388( 381)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:58.405667 445017 usertrap_amd64.go:212] [ 387( 380): 387( 380)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:58.405746 445017 usertrap_amd64.go:122] [ 387( 380): 387( 380)] Allocate a new trap: 0xc001466330 35 D0719 21:52:58.405830 445017 usertrap_amd64.go:225] [ 387( 380): 387( 380)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:58.408564 445017 usertrap_amd64.go:212] [ 387( 380): 387( 380)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:58.408656 445017 usertrap_amd64.go:122] [ 387( 380): 387( 380)] Allocate a new trap: 0xc001466330 36 D0719 21:52:58.408740 445017 usertrap_amd64.go:225] [ 387( 380): 387( 380)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:58.411964 445017 task_exit.go:204] [ 387( 380): 387( 380)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.412197 445017 task_signals.go:204] [ 387( 380): 388( 381)] Signal 387, PID: 388, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.412231 445017 task_signals.go:204] [ 387( 380): 389( 382)] Signal 387, PID: 389, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.412473 445017 task_exit.go:204] [ 387( 380): 388( 381)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.412877 445017 task_exit.go:204] [ 387( 380): 389( 382)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.413148 445017 task_exit.go:204] [ 387( 380): 387( 380)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.413475 445017 task_exit.go:204] [ 387( 380): 388( 381)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.413576 445017 task_exit.go:204] [ 387( 380): 388( 381)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.417080 445017 task_exit.go:204] [ 387( 380): 389( 382)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.417208 445017 task_exit.go:204] [ 387( 380): 389( 382)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.417337 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:58.417465 445017 task_exit.go:204] [ 387( 380): 387( 380)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.433520 445017 usertrap_amd64.go:212] [ 390( 383): 390( 383)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:58.433661 445017 usertrap_amd64.go:122] [ 390( 383): 390( 383)] Allocate a new trap: 0xc00037ef00 28 D0719 21:52:58.434064 445017 usertrap_amd64.go:225] [ 390( 383): 390( 383)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:58.438868 445017 usertrap_amd64.go:212] [ 390( 383): 390( 383)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:58.438935 445017 usertrap_amd64.go:122] [ 390( 383): 390( 383)] Allocate a new trap: 0xc00037ef00 29 D0719 21:52:58.439043 445017 usertrap_amd64.go:225] [ 390( 383): 390( 383)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:58.439925 445017 usertrap_amd64.go:212] [ 390( 383): 390( 383)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:58.439996 445017 usertrap_amd64.go:122] [ 390( 383): 390( 383)] Allocate a new trap: 0xc00037ef00 30 D0719 21:52:58.440058 445017 usertrap_amd64.go:225] [ 390( 383): 390( 383)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:58.443846 445017 usertrap_amd64.go:212] [ 390( 383): 390( 383)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:58.443925 445017 usertrap_amd64.go:122] [ 390( 383): 390( 383)] Allocate a new trap: 0xc00037ef00 31 D0719 21:52:58.444047 445017 usertrap_amd64.go:225] [ 390( 383): 390( 383)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:58.444436 445017 usertrap_amd64.go:212] [ 390( 383): 390( 383)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:58.444538 445017 usertrap_amd64.go:122] [ 390( 383): 390( 383)] Allocate a new trap: 0xc00037ef00 32 D0719 21:52:58.444613 445017 usertrap_amd64.go:225] [ 390( 383): 390( 383)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:58.445282 445017 usertrap_amd64.go:212] [ 390( 383): 390( 383)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:58.445349 445017 usertrap_amd64.go:122] [ 390( 383): 390( 383)] Allocate a new trap: 0xc00037ef00 33 D0719 21:52:58.445437 445017 usertrap_amd64.go:225] [ 390( 383): 390( 383)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:58.446263 445017 usertrap_amd64.go:212] [ 390( 383): 391( 384)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:58.446407 445017 usertrap_amd64.go:122] [ 390( 383): 391( 384)] Allocate a new trap: 0xc00037ef00 34 D0719 21:52:58.446496 445017 usertrap_amd64.go:225] [ 390( 383): 391( 384)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:58.453584 445017 usertrap_amd64.go:212] [ 390( 383): 390( 383)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:58.453653 445017 usertrap_amd64.go:122] [ 390( 383): 390( 383)] Allocate a new trap: 0xc00037ef00 35 D0719 21:52:58.453738 445017 usertrap_amd64.go:225] [ 390( 383): 390( 383)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:58.456833 445017 usertrap_amd64.go:212] [ 390( 383): 390( 383)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:58.456895 445017 usertrap_amd64.go:122] [ 390( 383): 390( 383)] Allocate a new trap: 0xc00037ef00 36 D0719 21:52:58.456983 445017 usertrap_amd64.go:225] [ 390( 383): 390( 383)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:58.457561 445017 task_exit.go:204] [ 390( 383): 390( 383)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.457756 445017 task_exit.go:204] [ 390( 383): 390( 383)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.457895 445017 task_signals.go:204] [ 390( 383): 392( 385)] Signal 390, PID: 392, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.458016 445017 task_exit.go:204] [ 390( 383): 392( 385)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.458229 445017 task_exit.go:204] [ 390( 383): 392( 385)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.458283 445017 task_exit.go:204] [ 390( 383): 392( 385)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.458437 445017 task_signals.go:204] [ 390( 383): 391( 384)] Signal 390, PID: 391, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.458535 445017 task_exit.go:204] [ 390( 383): 391( 384)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.461767 445017 task_exit.go:204] [ 390( 383): 391( 384)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.461832 445017 task_exit.go:204] [ 390( 383): 391( 384)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.461913 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:58.462011 445017 task_exit.go:204] [ 390( 383): 390( 383)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.477318 445017 usertrap_amd64.go:212] [ 393( 386): 393( 386)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:58.477416 445017 usertrap_amd64.go:122] [ 393( 386): 393( 386)] Allocate a new trap: 0xc000b129c0 28 D0719 21:52:58.477865 445017 usertrap_amd64.go:225] [ 393( 386): 393( 386)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:58.481123 445017 usertrap_amd64.go:212] [ 393( 386): 393( 386)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:58.481201 445017 usertrap_amd64.go:122] [ 393( 386): 393( 386)] Allocate a new trap: 0xc000b129c0 29 D0719 21:52:58.481272 445017 usertrap_amd64.go:225] [ 393( 386): 393( 386)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:58.482667 445017 usertrap_amd64.go:212] [ 393( 386): 393( 386)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:58.482755 445017 usertrap_amd64.go:122] [ 393( 386): 393( 386)] Allocate a new trap: 0xc000b129c0 30 D0719 21:52:58.482809 445017 usertrap_amd64.go:225] [ 393( 386): 393( 386)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:58.486718 445017 usertrap_amd64.go:212] [ 393( 386): 393( 386)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:58.486805 445017 usertrap_amd64.go:122] [ 393( 386): 393( 386)] Allocate a new trap: 0xc000b129c0 31 D0719 21:52:58.486884 445017 usertrap_amd64.go:225] [ 393( 386): 393( 386)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:58.487107 445017 usertrap_amd64.go:212] [ 393( 386): 393( 386)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:58.487165 445017 usertrap_amd64.go:122] [ 393( 386): 393( 386)] Allocate a new trap: 0xc000b129c0 32 D0719 21:52:58.487232 445017 usertrap_amd64.go:225] [ 393( 386): 393( 386)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:58.487776 445017 usertrap_amd64.go:212] [ 393( 386): 393( 386)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:58.487854 445017 usertrap_amd64.go:122] [ 393( 386): 393( 386)] Allocate a new trap: 0xc000b129c0 33 D0719 21:52:58.487926 445017 usertrap_amd64.go:225] [ 393( 386): 393( 386)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:58.488367 445017 usertrap_amd64.go:212] [ 393( 386): 394( 387)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:58.488441 445017 usertrap_amd64.go:122] [ 393( 386): 394( 387)] Allocate a new trap: 0xc000b129c0 34 D0719 21:52:58.488503 445017 usertrap_amd64.go:225] [ 393( 386): 394( 387)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:58.499856 445017 usertrap_amd64.go:212] [ 393( 386): 393( 386)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:58.499934 445017 usertrap_amd64.go:122] [ 393( 386): 393( 386)] Allocate a new trap: 0xc000b129c0 35 D0719 21:52:58.500032 445017 usertrap_amd64.go:225] [ 393( 386): 393( 386)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:58.502792 445017 usertrap_amd64.go:212] [ 393( 386): 393( 386)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:58.502872 445017 usertrap_amd64.go:122] [ 393( 386): 393( 386)] Allocate a new trap: 0xc000b129c0 36 D0719 21:52:58.502934 445017 usertrap_amd64.go:225] [ 393( 386): 393( 386)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:58.503404 445017 task_exit.go:204] [ 393( 386): 393( 386)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.503655 445017 task_exit.go:204] [ 393( 386): 393( 386)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.503778 445017 task_signals.go:204] [ 393( 386): 395( 388)] Signal 393, PID: 395, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.503758 445017 task_signals.go:204] [ 393( 386): 394( 387)] Signal 393, PID: 394, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.503869 445017 task_exit.go:204] [ 393( 386): 395( 388)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.504147 445017 task_exit.go:204] [ 393( 386): 395( 388)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.504224 445017 task_exit.go:204] [ 393( 386): 395( 388)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.504362 445017 task_exit.go:204] [ 393( 386): 394( 387)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.507691 445017 task_exit.go:204] [ 393( 386): 394( 387)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.507775 445017 task_exit.go:204] [ 393( 386): 394( 387)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.507860 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:58.508149 445017 task_exit.go:204] [ 393( 386): 393( 386)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.515265 445017 usertrap_amd64.go:212] [ 396( 389): 396( 389)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:58.515347 445017 usertrap_amd64.go:122] [ 396( 389): 396( 389)] Allocate a new trap: 0xc000a689f0 28 D0719 21:52:58.515889 445017 usertrap_amd64.go:225] [ 396( 389): 396( 389)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:58.519884 445017 usertrap_amd64.go:212] [ 396( 389): 396( 389)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:58.519966 445017 usertrap_amd64.go:122] [ 396( 389): 396( 389)] Allocate a new trap: 0xc000a689f0 29 D0719 21:52:58.520040 445017 usertrap_amd64.go:225] [ 396( 389): 396( 389)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:58.521042 445017 usertrap_amd64.go:212] [ 396( 389): 396( 389)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:58.521093 445017 usertrap_amd64.go:122] [ 396( 389): 396( 389)] Allocate a new trap: 0xc000a689f0 30 D0719 21:52:58.521141 445017 usertrap_amd64.go:225] [ 396( 389): 396( 389)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:58.525502 445017 usertrap_amd64.go:212] [ 396( 389): 396( 389)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:58.525566 445017 usertrap_amd64.go:122] [ 396( 389): 396( 389)] Allocate a new trap: 0xc000a689f0 31 D0719 21:52:58.525665 445017 usertrap_amd64.go:225] [ 396( 389): 396( 389)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:58.525962 445017 usertrap_amd64.go:212] [ 396( 389): 396( 389)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:58.526051 445017 usertrap_amd64.go:122] [ 396( 389): 396( 389)] Allocate a new trap: 0xc000a689f0 32 D0719 21:52:58.526112 445017 usertrap_amd64.go:225] [ 396( 389): 396( 389)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:58.526785 445017 usertrap_amd64.go:212] [ 396( 389): 396( 389)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:58.526866 445017 usertrap_amd64.go:122] [ 396( 389): 396( 389)] Allocate a new trap: 0xc000a689f0 33 D0719 21:52:58.526971 445017 usertrap_amd64.go:225] [ 396( 389): 396( 389)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:58.527104 445017 usertrap_amd64.go:212] [ 396( 389): 397( 390)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:58.527166 445017 usertrap_amd64.go:122] [ 396( 389): 397( 390)] Allocate a new trap: 0xc000a689f0 34 D0719 21:52:58.527244 445017 usertrap_amd64.go:225] [ 396( 389): 397( 390)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:58.535247 445017 usertrap_amd64.go:212] [ 396( 389): 396( 389)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:58.535330 445017 usertrap_amd64.go:122] [ 396( 389): 396( 389)] Allocate a new trap: 0xc000a689f0 35 D0719 21:52:58.535429 445017 usertrap_amd64.go:225] [ 396( 389): 396( 389)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:58.537890 445017 usertrap_amd64.go:212] [ 396( 389): 396( 389)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:58.537961 445017 usertrap_amd64.go:122] [ 396( 389): 396( 389)] Allocate a new trap: 0xc000a689f0 36 D0719 21:52:58.538032 445017 usertrap_amd64.go:225] [ 396( 389): 396( 389)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:58.538500 445017 task_exit.go:204] [ 396( 389): 396( 389)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.538628 445017 task_signals.go:204] [ 396( 389): 397( 390)] Signal 396, PID: 397, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.538632 445017 task_signals.go:204] [ 396( 389): 398( 391)] Signal 396, PID: 398, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.538772 445017 task_exit.go:204] [ 396( 389): 397( 390)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.538960 445017 task_exit.go:204] [ 396( 389): 398( 391)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.539121 445017 task_exit.go:204] [ 396( 389): 396( 389)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.539392 445017 task_exit.go:204] [ 396( 389): 397( 390)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.539452 445017 task_exit.go:204] [ 396( 389): 397( 390)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.542497 445017 task_exit.go:204] [ 396( 389): 398( 391)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.542586 445017 task_exit.go:204] [ 396( 389): 398( 391)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.542710 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:58.542838 445017 task_exit.go:204] [ 396( 389): 396( 389)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.555399 445017 usertrap_amd64.go:212] [ 399( 392): 399( 392)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:58.555486 445017 usertrap_amd64.go:122] [ 399( 392): 399( 392)] Allocate a new trap: 0xc00037efc0 28 D0719 21:52:58.556026 445017 usertrap_amd64.go:225] [ 399( 392): 399( 392)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:58.560920 445017 usertrap_amd64.go:212] [ 399( 392): 399( 392)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:58.560989 445017 usertrap_amd64.go:122] [ 399( 392): 399( 392)] Allocate a new trap: 0xc00037efc0 29 D0719 21:52:58.561076 445017 usertrap_amd64.go:225] [ 399( 392): 399( 392)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:58.561873 445017 usertrap_amd64.go:212] [ 399( 392): 399( 392)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:58.561924 445017 usertrap_amd64.go:122] [ 399( 392): 399( 392)] Allocate a new trap: 0xc00037efc0 30 D0719 21:52:58.562023 445017 usertrap_amd64.go:225] [ 399( 392): 399( 392)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:58.566414 445017 usertrap_amd64.go:212] [ 399( 392): 399( 392)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:58.566498 445017 usertrap_amd64.go:122] [ 399( 392): 399( 392)] Allocate a new trap: 0xc00037efc0 31 D0719 21:52:58.566585 445017 usertrap_amd64.go:225] [ 399( 392): 399( 392)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:58.567029 445017 usertrap_amd64.go:212] [ 399( 392): 399( 392)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:58.567071 445017 usertrap_amd64.go:122] [ 399( 392): 399( 392)] Allocate a new trap: 0xc00037efc0 32 D0719 21:52:58.567121 445017 usertrap_amd64.go:225] [ 399( 392): 399( 392)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:58.567646 445017 usertrap_amd64.go:212] [ 399( 392): 399( 392)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:58.567744 445017 usertrap_amd64.go:122] [ 399( 392): 399( 392)] Allocate a new trap: 0xc00037efc0 33 D0719 21:52:58.567969 445017 usertrap_amd64.go:225] [ 399( 392): 399( 392)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:58.568181 445017 usertrap_amd64.go:212] [ 399( 392): 400( 393)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:58.568251 445017 usertrap_amd64.go:122] [ 399( 392): 400( 393)] Allocate a new trap: 0xc00037efc0 34 D0719 21:52:58.568312 445017 usertrap_amd64.go:225] [ 399( 392): 400( 393)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:58.575057 445017 usertrap_amd64.go:212] [ 399( 392): 399( 392)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:58.575148 445017 usertrap_amd64.go:122] [ 399( 392): 399( 392)] Allocate a new trap: 0xc00037efc0 35 D0719 21:52:58.575225 445017 usertrap_amd64.go:225] [ 399( 392): 399( 392)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:58.577722 445017 usertrap_amd64.go:212] [ 399( 392): 399( 392)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:58.577803 445017 usertrap_amd64.go:122] [ 399( 392): 399( 392)] Allocate a new trap: 0xc00037efc0 36 D0719 21:52:58.577877 445017 usertrap_amd64.go:225] [ 399( 392): 399( 392)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:58.578347 445017 task_exit.go:204] [ 399( 392): 399( 392)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.578487 445017 task_signals.go:204] [ 399( 392): 400( 393)] Signal 399, PID: 400, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.578538 445017 task_signals.go:204] [ 399( 392): 401( 394)] Signal 399, PID: 401, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.578665 445017 task_exit.go:204] [ 399( 392): 399( 392)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.578873 445017 task_exit.go:204] [ 399( 392): 400( 393)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.579029 445017 task_exit.go:204] [ 399( 392): 400( 393)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.579069 445017 task_exit.go:204] [ 399( 392): 400( 393)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.579162 445017 task_exit.go:204] [ 399( 392): 401( 394)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.582094 445017 task_exit.go:204] [ 399( 392): 401( 394)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.582164 445017 task_exit.go:204] [ 399( 392): 401( 394)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.582246 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:58.582613 445017 task_exit.go:204] [ 399( 392): 399( 392)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.591752 445017 usertrap_amd64.go:212] [ 402( 395): 402( 395)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:58.591846 445017 usertrap_amd64.go:122] [ 402( 395): 402( 395)] Allocate a new trap: 0xc000a68b40 28 D0719 21:52:58.592299 445017 usertrap_amd64.go:225] [ 402( 395): 402( 395)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:58.596121 445017 usertrap_amd64.go:212] [ 402( 395): 402( 395)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:58.596207 445017 usertrap_amd64.go:122] [ 402( 395): 402( 395)] Allocate a new trap: 0xc000a68b40 29 D0719 21:52:58.596272 445017 usertrap_amd64.go:225] [ 402( 395): 402( 395)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:58.597003 445017 usertrap_amd64.go:212] [ 402( 395): 402( 395)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:58.597057 445017 usertrap_amd64.go:122] [ 402( 395): 402( 395)] Allocate a new trap: 0xc000a68b40 30 D0719 21:52:58.597119 445017 usertrap_amd64.go:225] [ 402( 395): 402( 395)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:58.601693 445017 usertrap_amd64.go:212] [ 402( 395): 402( 395)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:58.601776 445017 usertrap_amd64.go:122] [ 402( 395): 402( 395)] Allocate a new trap: 0xc000a68b40 31 D0719 21:52:58.601835 445017 usertrap_amd64.go:225] [ 402( 395): 402( 395)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:58.602061 445017 usertrap_amd64.go:212] [ 402( 395): 402( 395)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:58.602108 445017 usertrap_amd64.go:122] [ 402( 395): 402( 395)] Allocate a new trap: 0xc000a68b40 32 D0719 21:52:58.602150 445017 usertrap_amd64.go:225] [ 402( 395): 402( 395)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:58.602669 445017 usertrap_amd64.go:212] [ 402( 395): 402( 395)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:58.602740 445017 usertrap_amd64.go:122] [ 402( 395): 402( 395)] Allocate a new trap: 0xc000a68b40 33 D0719 21:52:58.602811 445017 usertrap_amd64.go:225] [ 402( 395): 402( 395)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:58.603239 445017 usertrap_amd64.go:212] [ 402( 395): 403( 396)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:58.603323 445017 usertrap_amd64.go:122] [ 402( 395): 403( 396)] Allocate a new trap: 0xc000a68b40 34 D0719 21:52:58.603425 445017 usertrap_amd64.go:225] [ 402( 395): 403( 396)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:58.611941 445017 usertrap_amd64.go:212] [ 402( 395): 402( 395)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:58.612017 445017 usertrap_amd64.go:122] [ 402( 395): 402( 395)] Allocate a new trap: 0xc000a68b40 35 D0719 21:52:58.612078 445017 usertrap_amd64.go:225] [ 402( 395): 402( 395)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:58.613619 445017 usertrap_amd64.go:212] [ 402( 395): 402( 395)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:58.613664 445017 usertrap_amd64.go:122] [ 402( 395): 402( 395)] Allocate a new trap: 0xc000a68b40 36 D0719 21:52:58.613720 445017 usertrap_amd64.go:225] [ 402( 395): 402( 395)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:58.614224 445017 task_exit.go:204] [ 402( 395): 402( 395)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.614514 445017 task_signals.go:204] [ 402( 395): 403( 396)] Signal 402, PID: 403, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.614560 445017 task_signals.go:204] [ 402( 395): 404( 397)] Signal 402, PID: 404, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.614667 445017 task_exit.go:204] [ 402( 395): 403( 396)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.614780 445017 task_exit.go:204] [ 402( 395): 402( 395)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.615011 445017 task_exit.go:204] [ 402( 395): 403( 396)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.615067 445017 task_exit.go:204] [ 402( 395): 403( 396)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.615204 445017 task_exit.go:204] [ 402( 395): 404( 397)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.618900 445017 task_exit.go:204] [ 402( 395): 404( 397)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.619003 445017 task_exit.go:204] [ 402( 395): 404( 397)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.619128 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:58.625480 445017 task_exit.go:204] [ 402( 395): 402( 395)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.639177 445017 usertrap_amd64.go:212] [ 405( 398): 405( 398)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:58.639279 445017 usertrap_amd64.go:122] [ 405( 398): 405( 398)] Allocate a new trap: 0xc00037f080 28 D0719 21:52:58.639748 445017 usertrap_amd64.go:225] [ 405( 398): 405( 398)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:58.643173 445017 usertrap_amd64.go:212] [ 405( 398): 405( 398)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:58.643254 445017 usertrap_amd64.go:122] [ 405( 398): 405( 398)] Allocate a new trap: 0xc00037f080 29 D0719 21:52:58.643328 445017 usertrap_amd64.go:225] [ 405( 398): 405( 398)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:58.644151 445017 usertrap_amd64.go:212] [ 405( 398): 405( 398)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:58.644198 445017 usertrap_amd64.go:122] [ 405( 398): 405( 398)] Allocate a new trap: 0xc00037f080 30 D0719 21:52:58.644279 445017 usertrap_amd64.go:225] [ 405( 398): 405( 398)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:58.648309 445017 usertrap_amd64.go:212] [ 405( 398): 405( 398)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:58.648373 445017 usertrap_amd64.go:122] [ 405( 398): 405( 398)] Allocate a new trap: 0xc00037f080 31 D0719 21:52:58.648455 445017 usertrap_amd64.go:225] [ 405( 398): 405( 398)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:58.648743 445017 usertrap_amd64.go:212] [ 405( 398): 405( 398)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:58.648792 445017 usertrap_amd64.go:122] [ 405( 398): 405( 398)] Allocate a new trap: 0xc00037f080 32 D0719 21:52:58.648853 445017 usertrap_amd64.go:225] [ 405( 398): 405( 398)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:58.649500 445017 usertrap_amd64.go:212] [ 405( 398): 405( 398)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:58.649577 445017 usertrap_amd64.go:122] [ 405( 398): 405( 398)] Allocate a new trap: 0xc00037f080 33 D0719 21:52:58.649661 445017 usertrap_amd64.go:225] [ 405( 398): 405( 398)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:58.650053 445017 usertrap_amd64.go:212] [ 405( 398): 406( 399)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:58.650111 445017 usertrap_amd64.go:122] [ 405( 398): 406( 399)] Allocate a new trap: 0xc00037f080 34 D0719 21:52:58.650316 445017 usertrap_amd64.go:225] [ 405( 398): 406( 399)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:58.657895 445017 usertrap_amd64.go:212] [ 405( 398): 405( 398)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:58.657978 445017 usertrap_amd64.go:122] [ 405( 398): 405( 398)] Allocate a new trap: 0xc00037f080 35 D0719 21:52:58.658048 445017 usertrap_amd64.go:225] [ 405( 398): 405( 398)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:58.660286 445017 usertrap_amd64.go:212] [ 405( 398): 405( 398)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:58.660377 445017 usertrap_amd64.go:122] [ 405( 398): 405( 398)] Allocate a new trap: 0xc00037f080 36 D0719 21:52:58.660429 445017 usertrap_amd64.go:225] [ 405( 398): 405( 398)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:58.665508 445017 task_exit.go:204] [ 405( 398): 405( 398)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.665717 445017 task_signals.go:204] [ 405( 398): 407( 400)] Signal 405, PID: 407, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.665720 445017 task_signals.go:204] [ 405( 398): 406( 399)] Signal 405, PID: 406, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.665860 445017 task_exit.go:204] [ 405( 398): 407( 400)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.666056 445017 task_exit.go:204] [ 405( 398): 406( 399)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.666404 445017 task_exit.go:204] [ 405( 398): 405( 398)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.666640 445017 task_exit.go:204] [ 405( 398): 407( 400)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.666722 445017 task_exit.go:204] [ 405( 398): 407( 400)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.670807 445017 task_exit.go:204] [ 405( 398): 406( 399)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.670890 445017 task_exit.go:204] [ 405( 398): 406( 399)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.670990 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:58.671161 445017 task_exit.go:204] [ 405( 398): 405( 398)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.678794 445017 usertrap_amd64.go:212] [ 408( 401): 408( 401)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:58.678930 445017 usertrap_amd64.go:122] [ 408( 401): 408( 401)] Allocate a new trap: 0xc000886000 28 D0719 21:52:58.679310 445017 usertrap_amd64.go:225] [ 408( 401): 408( 401)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:58.683920 445017 usertrap_amd64.go:212] [ 408( 401): 408( 401)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:58.683989 445017 usertrap_amd64.go:122] [ 408( 401): 408( 401)] Allocate a new trap: 0xc000886000 29 D0719 21:52:58.684053 445017 usertrap_amd64.go:225] [ 408( 401): 408( 401)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:58.684960 445017 usertrap_amd64.go:212] [ 408( 401): 408( 401)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:58.685039 445017 usertrap_amd64.go:122] [ 408( 401): 408( 401)] Allocate a new trap: 0xc000886000 30 D0719 21:52:58.685118 445017 usertrap_amd64.go:225] [ 408( 401): 408( 401)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:58.689224 445017 usertrap_amd64.go:212] [ 408( 401): 408( 401)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:58.689316 445017 usertrap_amd64.go:122] [ 408( 401): 408( 401)] Allocate a new trap: 0xc000886000 31 D0719 21:52:58.689413 445017 usertrap_amd64.go:225] [ 408( 401): 408( 401)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:58.689758 445017 usertrap_amd64.go:212] [ 408( 401): 408( 401)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:58.689829 445017 usertrap_amd64.go:122] [ 408( 401): 408( 401)] Allocate a new trap: 0xc000886000 32 D0719 21:52:58.689895 445017 usertrap_amd64.go:225] [ 408( 401): 408( 401)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:58.690418 445017 usertrap_amd64.go:212] [ 408( 401): 408( 401)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:58.690467 445017 usertrap_amd64.go:122] [ 408( 401): 408( 401)] Allocate a new trap: 0xc000886000 33 D0719 21:52:58.690522 445017 usertrap_amd64.go:225] [ 408( 401): 408( 401)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:58.691046 445017 usertrap_amd64.go:212] [ 408( 401): 409( 402)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:58.691128 445017 usertrap_amd64.go:122] [ 408( 401): 409( 402)] Allocate a new trap: 0xc000886000 34 D0719 21:52:58.691352 445017 usertrap_amd64.go:225] [ 408( 401): 409( 402)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:58.697472 445017 usertrap_amd64.go:212] [ 408( 401): 408( 401)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:58.697557 445017 usertrap_amd64.go:122] [ 408( 401): 408( 401)] Allocate a new trap: 0xc000886000 35 D0719 21:52:58.697628 445017 usertrap_amd64.go:225] [ 408( 401): 408( 401)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:58.699992 445017 usertrap_amd64.go:212] [ 408( 401): 408( 401)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:58.700062 445017 usertrap_amd64.go:122] [ 408( 401): 408( 401)] Allocate a new trap: 0xc000886000 36 D0719 21:52:58.700156 445017 usertrap_amd64.go:225] [ 408( 401): 408( 401)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:58.700701 445017 task_exit.go:204] [ 408( 401): 408( 401)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.700946 445017 task_signals.go:204] [ 408( 401): 410( 403)] Signal 408, PID: 410, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.701029 445017 task_exit.go:204] [ 408( 401): 408( 401)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.701207 445017 task_signals.go:204] [ 408( 401): 409( 402)] Signal 408, PID: 409, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.701242 445017 task_exit.go:204] [ 408( 401): 410( 403)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.701468 445017 task_exit.go:204] [ 408( 401): 410( 403)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.701520 445017 task_exit.go:204] [ 408( 401): 410( 403)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.701691 445017 task_exit.go:204] [ 408( 401): 409( 402)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.705081 445017 task_exit.go:204] [ 408( 401): 409( 402)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.705167 445017 task_exit.go:204] [ 408( 401): 409( 402)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.705256 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:58.705739 445017 task_exit.go:204] [ 408( 401): 408( 401)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.713038 445017 usertrap_amd64.go:212] [ 411( 404): 411( 404)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:58.713121 445017 usertrap_amd64.go:122] [ 411( 404): 411( 404)] Allocate a new trap: 0xc0008862d0 28 D0719 21:52:58.713623 445017 usertrap_amd64.go:225] [ 411( 404): 411( 404)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:58.717444 445017 usertrap_amd64.go:212] [ 411( 404): 411( 404)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:58.717519 445017 usertrap_amd64.go:122] [ 411( 404): 411( 404)] Allocate a new trap: 0xc0008862d0 29 D0719 21:52:58.717613 445017 usertrap_amd64.go:225] [ 411( 404): 411( 404)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:58.718373 445017 usertrap_amd64.go:212] [ 411( 404): 411( 404)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:58.718437 445017 usertrap_amd64.go:122] [ 411( 404): 411( 404)] Allocate a new trap: 0xc0008862d0 30 D0719 21:52:58.718512 445017 usertrap_amd64.go:225] [ 411( 404): 411( 404)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:58.722127 445017 usertrap_amd64.go:212] [ 411( 404): 411( 404)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:58.722194 445017 usertrap_amd64.go:122] [ 411( 404): 411( 404)] Allocate a new trap: 0xc0008862d0 31 D0719 21:52:58.722279 445017 usertrap_amd64.go:225] [ 411( 404): 411( 404)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:58.722508 445017 usertrap_amd64.go:212] [ 411( 404): 411( 404)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:58.722568 445017 usertrap_amd64.go:122] [ 411( 404): 411( 404)] Allocate a new trap: 0xc0008862d0 32 D0719 21:52:58.722642 445017 usertrap_amd64.go:225] [ 411( 404): 411( 404)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:58.723297 445017 usertrap_amd64.go:212] [ 411( 404): 411( 404)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:58.723345 445017 usertrap_amd64.go:122] [ 411( 404): 411( 404)] Allocate a new trap: 0xc0008862d0 33 D0719 21:52:58.723403 445017 usertrap_amd64.go:225] [ 411( 404): 411( 404)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:58.723845 445017 usertrap_amd64.go:212] [ 411( 404): 412( 405)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:58.723927 445017 usertrap_amd64.go:122] [ 411( 404): 412( 405)] Allocate a new trap: 0xc0008862d0 34 D0719 21:52:58.724003 445017 usertrap_amd64.go:225] [ 411( 404): 412( 405)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:58.729795 445017 usertrap_amd64.go:212] [ 411( 404): 411( 404)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:58.729861 445017 usertrap_amd64.go:122] [ 411( 404): 411( 404)] Allocate a new trap: 0xc0008862d0 35 D0719 21:52:58.729947 445017 usertrap_amd64.go:225] [ 411( 404): 411( 404)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:58.732214 445017 usertrap_amd64.go:212] [ 411( 404): 411( 404)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:58.732279 445017 usertrap_amd64.go:122] [ 411( 404): 411( 404)] Allocate a new trap: 0xc0008862d0 36 D0719 21:52:58.732330 445017 usertrap_amd64.go:225] [ 411( 404): 411( 404)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:58.732757 445017 task_exit.go:204] [ 411( 404): 411( 404)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.732874 445017 task_signals.go:204] [ 411( 404): 413( 406)] Signal 411, PID: 413, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.732972 445017 task_exit.go:204] [ 411( 404): 413( 406)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.733185 445017 task_exit.go:204] [ 411( 404): 413( 406)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.733206 445017 task_signals.go:204] [ 411( 404): 412( 405)] Signal 411, PID: 412, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.733228 445017 task_exit.go:204] [ 411( 404): 413( 406)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.733350 445017 task_exit.go:204] [ 411( 404): 412( 405)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.733428 445017 task_exit.go:204] [ 411( 404): 411( 404)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.736353 445017 task_exit.go:204] [ 411( 404): 412( 405)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.736424 445017 task_exit.go:204] [ 411( 404): 412( 405)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.736501 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:58.736681 445017 task_exit.go:204] [ 411( 404): 411( 404)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.744698 445017 usertrap_amd64.go:212] [ 414( 407): 414( 407)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:58.744795 445017 usertrap_amd64.go:122] [ 414( 407): 414( 407)] Allocate a new trap: 0xc000b12000 28 D0719 21:52:58.745195 445017 usertrap_amd64.go:225] [ 414( 407): 414( 407)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) D0719 21:52:58.749031 445017 usertrap_amd64.go:212] [ 414( 407): 414( 407)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:58.749094 445017 usertrap_amd64.go:122] [ 414( 407): 414( 407)] Allocate a new trap: 0xc000b12000 29 executing program D0719 21:52:58.749163 445017 usertrap_amd64.go:225] [ 414( 407): 414( 407)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:58.750465 445017 usertrap_amd64.go:212] [ 414( 407): 414( 407)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:58.750524 445017 usertrap_amd64.go:122] [ 414( 407): 414( 407)] Allocate a new trap: 0xc000b12000 30 D0719 21:52:58.750606 445017 usertrap_amd64.go:225] [ 414( 407): 414( 407)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:58.754824 445017 usertrap_amd64.go:212] [ 414( 407): 414( 407)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:58.754931 445017 usertrap_amd64.go:122] [ 414( 407): 414( 407)] Allocate a new trap: 0xc000b12000 31 D0719 21:52:58.755009 445017 usertrap_amd64.go:225] [ 414( 407): 414( 407)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:58.755241 445017 usertrap_amd64.go:212] [ 414( 407): 414( 407)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:58.755317 445017 usertrap_amd64.go:122] [ 414( 407): 414( 407)] Allocate a new trap: 0xc000b12000 32 D0719 21:52:58.755395 445017 usertrap_amd64.go:225] [ 414( 407): 414( 407)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:58.756105 445017 usertrap_amd64.go:212] [ 414( 407): 414( 407)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:58.756164 445017 usertrap_amd64.go:122] [ 414( 407): 414( 407)] Allocate a new trap: 0xc000b12000 33 D0719 21:52:58.756241 445017 usertrap_amd64.go:225] [ 414( 407): 414( 407)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:58.756354 445017 usertrap_amd64.go:212] [ 414( 407): 415( 408)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:58.756420 445017 usertrap_amd64.go:122] [ 414( 407): 415( 408)] Allocate a new trap: 0xc000b12000 34 D0719 21:52:58.756483 445017 usertrap_amd64.go:225] [ 414( 407): 415( 408)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0719 21:52:58.764196 445017 usertrap_amd64.go:212] [ 414( 407): 414( 407)] Found the pattern at ip 558eff7a58a3:sysno 3 D0719 21:52:58.764300 445017 usertrap_amd64.go:122] [ 414( 407): 414( 407)] Allocate a new trap: 0xc000b12000 35 D0719 21:52:58.764371 445017 usertrap_amd64.go:225] [ 414( 407): 414( 407)] Apply the binary patch addr 558eff7a58a3 trap addr 62af0 ([184 3 0 0 0 15 5] -> [255 36 37 240 42 6 0]) D0719 21:52:58.766484 445017 usertrap_amd64.go:212] [ 414( 407): 414( 407)] Found the pattern at ip 558eff7a57e8:sysno 1 D0719 21:52:58.766536 445017 usertrap_amd64.go:122] [ 414( 407): 414( 407)] Allocate a new trap: 0xc000b12000 36 D0719 21:52:58.766591 445017 usertrap_amd64.go:225] [ 414( 407): 414( 407)] Apply the binary patch addr 558eff7a57e8 trap addr 62b40 ([184 1 0 0 0 15 5] -> [255 36 37 64 43 6 0]) write to /sys/kernel/debug/x86/nmi_longest_ns failed: No such file or directory write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/net/core/bpf_jit_kallsyms failed: No such file or directory write to /proc/sys/net/core/bpf_jit_harden failed: No such file or directory write to /proc/sys/kernel/kptr_restrict failed: No such file or directory write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory write to /proc/sys/fs/mount-max failed: No such file or directory write to /proc/sys/vm/oom_dump_tasks failed: No such file or directory write to /proc/sys/debug/exception-trace failed: No such file or directory write to /proc/sys/kernel/printk failed: No such file or directory write to /proc/sys/kernel/keys/gc_delay failed: No such file or directory write to /proc/sys/vm/oom_kill_allocating_task failed: No such file or directory write to /proc/sys/kernel/ctrl-alt-del failed: No such file or directory write to /proc/sys/kernel/cad_pid failed: No such file or directory D0719 21:52:58.767073 445017 task_exit.go:204] [ 414( 407): 414( 407)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.767192 445017 task_signals.go:204] [ 414( 407): 416( 409)] Signal 414, PID: 416, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.767266 445017 task_signals.go:204] [ 414( 407): 415( 408)] Signal 414, PID: 415, TID: 0, fault addr: 0x9: terminating thread group D0719 21:52:58.767291 445017 task_exit.go:204] [ 414( 407): 416( 409)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.767577 445017 task_exit.go:204] [ 414( 407): 416( 409)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.767678 445017 task_exit.go:204] [ 414( 407): 416( 409)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.767907 445017 task_exit.go:204] [ 414( 407): 415( 408)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0719 21:52:58.768156 445017 task_exit.go:204] [ 414( 407): 414( 407)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.771064 445017 task_exit.go:204] [ 414( 407): 415( 408)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0719 21:52:58.771166 445017 task_exit.go:204] [ 414( 407): 415( 408)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.771251 445017 task_signals.go:443] [ 8( 1): 8( 1)] Discarding ignored signal 17 D0719 21:52:58.771988 445017 task_exit.go:204] [ 414( 407): 414( 407)] Transitioning from exit state TaskExitZombie to TaskExitDead D0719 21:52:58.779172 445017 usertrap_amd64.go:212] [ 417( 410): 417( 410)] Found the pattern at ip 558eff7d6540:sysno 109 D0719 21:52:58.779292 445017 usertrap_amd64.go:122] [ 417( 410): 417( 410)] Allocate a new trap: 0xc00037eb40 28 D0719 21:52:58.779766 445017 usertrap_amd64.go:225] [ 417( 410): 417( 410)] Apply the binary patch addr 558eff7d6540 trap addr 628c0 ([184 109 0 0 0 15 5] -> [255 36 37 192 40 6 0]) executing program D0719 21:52:58.784148 445017 usertrap_amd64.go:212] [ 417( 410): 417( 410)] Found the pattern at ip 558eff7813d2:sysno 14 D0719 21:52:58.784368 445017 usertrap_amd64.go:122] [ 417( 410): 417( 410)] Allocate a new trap: 0xc00037eb40 29 D0719 21:52:58.784464 445017 usertrap_amd64.go:225] [ 417( 410): 417( 410)] Apply the binary patch addr 558eff7813d2 trap addr 62910 ([184 14 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0719 21:52:58.785816 445017 usertrap_amd64.go:212] [ 417( 410): 417( 410)] Found the pattern at ip 558eff7a66cc:sysno 9 D0719 21:52:58.785896 445017 usertrap_amd64.go:122] [ 417( 410): 417( 410)] Allocate a new trap: 0xc00037eb40 30 D0719 21:52:58.785980 445017 usertrap_amd64.go:225] [ 417( 410): 417( 410)] Apply the binary patch addr 558eff7a66cc trap addr 62960 ([184 9 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0719 21:52:58.790067 445017 usertrap_amd64.go:212] [ 417( 410): 417( 410)] Found the pattern at ip 558eff7d6982:sysno 435 D0719 21:52:58.790152 445017 usertrap_amd64.go:122] [ 417( 410): 417( 410)] Allocate a new trap: 0xc00037eb40 31 D0719 21:52:58.790216 445017 usertrap_amd64.go:225] [ 417( 410): 417( 410)] Apply the binary patch addr 558eff7d6982 trap addr 629b0 ([184 179 1 0 0 15 5] -> [255 36 37 176 41 6 0]) D0719 21:52:58.790429 445017 usertrap_amd64.go:212] [ 417( 410): 417( 410)] Found the pattern at ip 558eff7d693b:sysno 56 D0719 21:52:58.790468 445017 usertrap_amd64.go:122] [ 417( 410): 417( 410)] Allocate a new trap: 0xc00037eb40 32 D0719 21:52:58.790514 445017 usertrap_amd64.go:225] [ 417( 410): 417( 410)] Apply the binary patch addr 558eff7d693b trap addr 62a00 ([184 56 0 0 0 15 5] -> [255 36 37 0 42 6 0]) D0719 21:52:58.791183 445017 usertrap_amd64.go:212] [ 417( 410): 417( 410)] Found the pattern at ip 558eff781340:sysno 14 D0719 21:52:58.791263 445017 usertrap_amd64.go:122] [ 417( 410): 417( 410)] Allocate a new trap: 0xc00037eb40 33 D0719 21:52:58.791508 445017 usertrap_amd64.go:225] [ 417( 410): 417( 410)] Apply the binary patch addr 558eff781340 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0719 21:52:58.791747 445017 usertrap_amd64.go:212] [ 417( 410): 418( 411)] Found the pattern at ip 558eff780a50:sysno 273 D0719 21:52:58.791828 445017 usertrap_amd64.go:122] [ 417( 410): 418( 411)] Allocate a new trap: 0xc00037eb40 34 D0719 21:52:58.791896 445017 usertrap_amd64.go:225] [ 417( 410): 418( 411)] Apply the binary patch addr 558eff780a50 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) ================== WARNING: DATA RACE Write at 0x00c00048c32a by goroutine 4484: gvisor.dev/gvisor/pkg/tcpip/transport/udp.(*endpoint).Connect.func1() pkg/tcpip/transport/udp/endpoint.go:694 +0x4f0 gvisor.dev/gvisor/pkg/tcpip/transport/internal/network.(*Endpoint).ConnectAndThen() pkg/tcpip/transport/internal/network/endpoint.go:650 +0x596 gvisor.dev/gvisor/pkg/tcpip/transport/udp.(*endpoint).Connect() pkg/tcpip/transport/udp/endpoint.go:665 +0x185 gvisor.dev/gvisor/pkg/sentry/socket/netstack.(*sock).Connect() pkg/sentry/socket/netstack/netstack.go:707 +0x5e5 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Connect() pkg/sentry/syscalls/linux/sys_socket.go:279 +0x1f5 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall() pkg/sentry/kernel/task_syscall.go:142 +0x9c1 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke() pkg/sentry/kernel/task_syscall.go:322 +0x7c gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter() pkg/sentry/kernel/task_syscall.go:282 +0x8e gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall() pkg/sentry/kernel/task_syscall.go:257 +0x4c4 gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute() pkg/sentry/kernel/task_run.go:269 +0x1d4a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run() pkg/sentry/kernel/task_run.go:98 +0x41a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.func1() pkg/sentry/kernel/task_start.go:389 +0x47 Previous read at 0x00c00048c32a by goroutine 4478: gvisor.dev/gvisor/pkg/tcpip/transport/udp.(*endpoint).onICMPError() pkg/tcpip/transport/udp/endpoint.go:1040 +0x78a gvisor.dev/gvisor/pkg/tcpip/transport/udp.(*endpoint).HandleError() pkg/tcpip/transport/udp/endpoint.go:1056 +0x8f gvisor.dev/gvisor/pkg/tcpip/stack.(*endpointsByNIC).handleError() pkg/tcpip/stack/transport_demuxer.go:209 +0x22c gvisor.dev/gvisor/pkg/tcpip/stack.(*transportDemuxer).deliverError() pkg/tcpip/stack/transport_demuxer.go:649 +0x1a9 gvisor.dev/gvisor/pkg/tcpip/stack.(*nic).DeliverTransportError() pkg/tcpip/stack/nic.go:882 +0x264 gvisor.dev/gvisor/pkg/tcpip/network/ipv4.(*endpoint).handleControl() pkg/tcpip/network/ipv4/icmp.go:280 +0x494 gvisor.dev/gvisor/pkg/tcpip/network/ipv4.(*endpoint).handleICMP() pkg/tcpip/network/ipv4/icmp.go:482 +0x63e gvisor.dev/gvisor/pkg/tcpip/network/ipv4.(*endpoint).deliverPacketLocally() pkg/tcpip/network/ipv4/ipv4.go:1290 +0xe16 gvisor.dev/gvisor/pkg/tcpip/network/ipv4.(*endpoint).handleValidatedPacket() pkg/tcpip/network/ipv4/ipv4.go:1154 +0xde4 gvisor.dev/gvisor/pkg/tcpip/network/ipv4.(*endpoint).handleLocalPacket() pkg/tcpip/network/ipv4/ipv4.go:882 +0x31a gvisor.dev/gvisor/pkg/tcpip/network/ipv4.(*endpoint).writePacketPostRouting() pkg/tcpip/network/ipv4/ipv4.go:546 +0xa4 gvisor.dev/gvisor/pkg/tcpip/network/ipv4.(*endpoint).writePacket() pkg/tcpip/network/ipv4/ipv4.go:538 +0x2d3 gvisor.dev/gvisor/pkg/tcpip/network/ipv4.(*endpoint).WritePacket() pkg/tcpip/network/ipv4/ipv4.go:506 +0x1a4 gvisor.dev/gvisor/pkg/tcpip/stack.(*Route).WritePacket() pkg/tcpip/stack/route.go:495 +0xf8 gvisor.dev/gvisor/pkg/tcpip/network/ipv4.(*protocol).returnError() pkg/tcpip/network/ipv4/icmp.go:794 +0xf70 gvisor.dev/gvisor/pkg/tcpip/network/ipv4.(*endpoint).deliverPacketLocally() pkg/tcpip/network/ipv4/ipv4.go:1331 +0x10e8 gvisor.dev/gvisor/pkg/tcpip/network/ipv4.(*endpoint).handleValidatedPacket() pkg/tcpip/network/ipv4/ipv4.go:1154 +0xde4 gvisor.dev/gvisor/pkg/tcpip/network/ipv4.(*endpoint).handleLocalPacket() pkg/tcpip/network/ipv4/ipv4.go:882 +0x31a gvisor.dev/gvisor/pkg/tcpip/network/ipv4.(*endpoint).writePacketPostRouting() pkg/tcpip/network/ipv4/ipv4.go:546 +0xa4 gvisor.dev/gvisor/pkg/tcpip/network/ipv4.(*endpoint).writePacket() pkg/tcpip/network/ipv4/ipv4.go:538 +0x2d3 gvisor.dev/gvisor/pkg/tcpip/network/ipv4.(*endpoint).WritePacket() pkg/tcpip/network/ipv4/ipv4.go:506 +0x1a4 gvisor.dev/gvisor/pkg/tcpip/stack.(*Route).WritePacket() pkg/tcpip/stack/route.go:495 +0xf8 gvisor.dev/gvisor/pkg/tcpip/transport/internal/network.(*WriteContext).WritePacket() pkg/tcpip/transport/internal/network/endpoint.go:320 +0x1ec gvisor.dev/gvisor/pkg/tcpip/transport/udp.(*endpoint).write() pkg/tcpip/transport/udp/endpoint.go:529 +0x8ea gvisor.dev/gvisor/pkg/tcpip/transport/udp.(*endpoint).Write() pkg/tcpip/transport/udp/endpoint.go:366 +0x86 gvisor.dev/gvisor/pkg/sentry/socket/netstack.(*sock).Write() pkg/sentry/socket/netstack/netstack.go:482 +0x202 gvisor.dev/gvisor/pkg/sentry/vfs.(*FileDescription).Write() pkg/sentry/vfs/file_description.go:679 +0x124 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.write() pkg/sentry/syscalls/linux/sys_read_write.go:347 +0x9c gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Write() pkg/sentry/syscalls/linux/sys_read_write.go:316 +0x274 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall() pkg/sentry/kernel/task_syscall.go:142 +0x9c1 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke() pkg/sentry/kernel/task_syscall.go:322 +0x7c gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter() pkg/sentry/kernel/task_syscall.go:282 +0x8e gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall() pkg/sentry/kernel/task_syscall.go:257 +0x4c4 gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute() pkg/sentry/kernel/task_run.go:269 +0x1d4a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run() pkg/sentry/kernel/task_run.go:98 +0x41a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.func1() pkg/sentry/kernel/task_start.go:389 +0x47 Goroutine 4484 (running) created at: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start() pkg/sentry/kernel/task_start.go:389 +0x1ac gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Clone.func7() pkg/sentry/kernel/task_clone.go:258 +0x44 runtime.deferreturn() GOROOT/src/runtime/panic.go:476 +0x32 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.clone() pkg/sentry/syscalls/linux/sys_thread.go:216 +0x144 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Clone() pkg/sentry/syscalls/linux/sys_clone_amd64.go:36 +0x4d gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall() pkg/sentry/kernel/task_syscall.go:142 +0x9c1 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke() pkg/sentry/kernel/task_syscall.go:322 +0x7c gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter() pkg/sentry/kernel/task_syscall.go:282 +0x8e gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall() pkg/sentry/kernel/task_syscall.go:257 +0x4c4 gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute() pkg/sentry/kernel/task_run.go:269 +0x1d4a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run() pkg/sentry/kernel/task_run.go:98 +0x41a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.func1() pkg/sentry/kernel/task_start.go:389 +0x47 Goroutine 4478 (running) created at: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start() pkg/sentry/kernel/task_start.go:389 +0x1ac gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Clone.func7() pkg/sentry/kernel/task_clone.go:258 +0x44 runtime.deferreturn() GOROOT/src/runtime/panic.go:476 +0x32 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.clone() pkg/sentry/syscalls/linux/sys_thread.go:216 +0x144 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Clone() pkg/sentry/syscalls/linux/sys_clone_amd64.go:36 +0x4d gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall() pkg/sentry/kernel/task_syscall.go:142 +0x9c1 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke() pkg/sentry/kernel/task_syscall.go:322 +0x7c gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter() pkg/sentry/kernel/task_syscall.go:282 +0x8e gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall() pkg/sentry/kernel/task_syscall.go:257 +0x4c4 gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute() pkg/sentry/kernel/task_run.go:269 +0x1d4a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run() pkg/sentry/kernel/task_run.go:98 +0x41a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.func1() pkg/sentry/kernel/task_start.go:389 +0x47 ================== W0719 21:52:58.830926 446768 util.go:64] FATAL ERROR: waiting on pid 7: waiting on PID 7 in sandbox "ci-gvisor-systrap-1-race-0": urpc method "containerManager.WaitPID" failed: EOF waiting on pid 7: waiting on PID 7 in sandbox "ci-gvisor-systrap-1-race-0": urpc method "containerManager.WaitPID" failed: EOF W0719 21:52:58.831276 446768 main.go:274] Failure to execute command, err: 1 D0719 21:52:58.837712 1 connection.go:127] sock read failed, closing connection: EOF I0719 21:52:58.837953 1 gofer.go:319] All lisafs servers exited. W0719 21:52:58.837940 444998 sandbox.go:1113] Wait RPC to container "ci-gvisor-systrap-1-race-0" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. I0719 21:52:58.838025 1 main.go:265] Exiting with status: 0 D0719 21:52:58.842279 444998 container.go:771] Destroy container, cid: ci-gvisor-systrap-1-race-0 D0719 21:52:58.842458 444998 container.go:1007] Destroying container, cid: ci-gvisor-systrap-1-race-0 D0719 21:52:58.842533 444998 sandbox.go:1405] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-race-0 D0719 21:52:58.842561 444998 sandbox.go:1155] Destroying sandbox "ci-gvisor-systrap-1-race-0" D0719 21:52:58.842702 444998 container.go:1021] Killing gofer for container, cid: ci-gvisor-systrap-1-race-0, PID: 445009 D0719 21:52:58.855704 444998 cgroup.go:549] Deleting cgroup "ci-gvisor-systrap-1-race-0" I0719 21:52:58.856086 444998 main.go:265] Exiting with status: 16896 VM DIAGNOSIS: I0719 21:52:58.986035 446867 main.go:230] *************************** I0719 21:52:58.986153 446867 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-0] I0719 21:52:58.986291 446867 main.go:232] Version 0.0.0 I0719 21:52:58.986352 446867 main.go:233] GOOS: linux I0719 21:52:58.986397 446867 main.go:234] GOARCH: amd64 I0719 21:52:58.986439 446867 main.go:235] PID: 446867 I0719 21:52:58.986535 446867 main.go:236] UID: 0, GID: 0 I0719 21:52:58.986590 446867 main.go:237] Configuration: I0719 21:52:58.986642 446867 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0719 21:52:58.986693 446867 main.go:239] Platform: systrap I0719 21:52:58.986722 446867 main.go:240] FileAccess: shared I0719 21:52:58.986753 446867 main.go:241] Directfs: true I0719 21:52:58.986779 446867 main.go:242] Overlay: none I0719 21:52:58.986812 446867 main.go:243] Network: sandbox, logging: false I0719 21:52:58.986846 446867 main.go:244] Strace: false, max size: 1024, syscalls: I0719 21:52:58.986879 446867 main.go:245] IOURING: false I0719 21:52:58.986948 446867 main.go:246] Debug: true I0719 21:52:58.986975 446867 main.go:247] Systemd: false I0719 21:52:58.987001 446867 main.go:248] *************************** W0719 21:52:58.987020 446867 main.go:253] Block the TERM signal. This is only safe in tests! D0719 21:52:58.987124 446867 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0719 21:52:58.987425 446867 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-race-0": file does not exist loading container "ci-gvisor-systrap-1-race-0": file does not exist W0719 21:52:58.987764 446867 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-race/current/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-num-network-channels=3" "-gso=false" "-net-raw" "-watchdog-action=panic" "-TESTONLY-unsafe-nonroot" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-race-0"]: exit status 128 I0719 21:52:58.986035 446867 main.go:230] *************************** I0719 21:52:58.986153 446867 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-0] I0719 21:52:58.986291 446867 main.go:232] Version 0.0.0 I0719 21:52:58.986352 446867 main.go:233] GOOS: linux I0719 21:52:58.986397 446867 main.go:234] GOARCH: amd64 I0719 21:52:58.986439 446867 main.go:235] PID: 446867 I0719 21:52:58.986535 446867 main.go:236] UID: 0, GID: 0 I0719 21:52:58.986590 446867 main.go:237] Configuration: I0719 21:52:58.986642 446867 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0719 21:52:58.986693 446867 main.go:239] Platform: systrap I0719 21:52:58.986722 446867 main.go:240] FileAccess: shared I0719 21:52:58.986753 446867 main.go:241] Directfs: true I0719 21:52:58.986779 446867 main.go:242] Overlay: none I0719 21:52:58.986812 446867 main.go:243] Network: sandbox, logging: false I0719 21:52:58.986846 446867 main.go:244] Strace: false, max size: 1024, syscalls: I0719 21:52:58.986879 446867 main.go:245] IOURING: false I0719 21:52:58.986948 446867 main.go:246] Debug: true I0719 21:52:58.986975 446867 main.go:247] Systemd: false I0719 21:52:58.987001 446867 main.go:248] *************************** W0719 21:52:58.987020 446867 main.go:253] Block the TERM signal. This is only safe in tests! D0719 21:52:58.987124 446867 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0719 21:52:58.987425 446867 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-race-0": file does not exist loading container "ci-gvisor-systrap-1-race-0": file does not exist W0719 21:52:58.987764 446867 main.go:274] Failure to execute command, err: 1 [394243.901995] exe[258822] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394243.920698] exe[254874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394243.942597] exe[254852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394249.672206] warn_bad_vsyscall: 66 callbacks suppressed [394249.672209] exe[182816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394249.718127] exe[182816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394249.762522] exe[182816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394263.396347] exe[181679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394263.442801] exe[181679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394263.446230] exe[230291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394263.513234] exe[181679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394277.599247] exe[181843] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394277.636108] exe[181799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394277.670960] exe[181843] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394277.690702] exe[181846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394282.957327] exe[300359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394283.063967] exe[168319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394283.181149] exe[300477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394299.330673] exe[182816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394299.395101] exe[182816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394299.464381] exe[181642] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394300.339932] exe[181642] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394300.417942] exe[182816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394300.443165] exe[181642] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394300.522421] exe[182816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394301.079386] exe[182226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394301.149550] exe[181642] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394301.150995] exe[182816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394311.317314] warn_bad_vsyscall: 4 callbacks suppressed [394311.317317] exe[266600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394311.365516] exe[267213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394311.429741] exe[267984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394316.928656] exe[254851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394316.975983] exe[182226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394317.035988] exe[181728] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394325.567667] exe[258822] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394325.625973] exe[254851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394325.669604] exe[181663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394325.688713] exe[254852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394325.707894] exe[254851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394325.730979] exe[258822] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394325.751751] exe[254874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394325.771206] exe[254851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394325.790407] exe[254874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394325.810804] exe[181663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394330.818890] warn_bad_vsyscall: 57 callbacks suppressed [394330.818893] exe[181650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394330.856996] exe[268350] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394330.899509] exe[268468] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394335.358364] exe[270985] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394335.430471] exe[181782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394335.493358] exe[181873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394335.515580] exe[271006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394338.566607] exe[311799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394338.610502] exe[311809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394338.629799] exe[181640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394338.675634] exe[311799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394338.969010] exe[311809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394339.008464] exe[311915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394339.032036] exe[181640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394339.052362] exe[311799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394339.076008] exe[311799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394339.095459] exe[311809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394345.363033] warn_bad_vsyscall: 61 callbacks suppressed [394345.363036] exe[183269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394345.409588] exe[183228] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394345.428333] exe[181684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394345.463313] exe[181697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394345.482623] exe[181696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394346.549308] exe[181684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394347.405673] exe[181684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394348.254562] exe[181684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394373.370475] exe[311809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394373.416242] exe[311915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394373.453556] exe[181640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394394.461032] exe[266338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394394.533925] exe[266338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394394.574334] exe[266312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394394.576038] exe[266338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394406.749927] exe[181697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394406.788052] exe[183228] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394406.857505] exe[183269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394406.876566] exe[181684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394407.804260] exe[183269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394407.844862] exe[181697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394407.880488] exe[181684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394420.150822] exe[311799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394420.217008] exe[311809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394420.284039] exe[311809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394424.496060] exe[314264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394424.559284] exe[266338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394424.601803] exe[314264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394431.417713] exe[266312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:200000c0 di:ffffffffff600000 [394431.460737] exe[314264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:200000c0 di:ffffffffff600000 [394431.510302] exe[266318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:200000c0 di:ffffffffff600000 [394451.328086] exe[181922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394451.401227] exe[181922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394451.428743] exe[181802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394451.485496] exe[181802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394453.533459] exe[242987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394453.580684] exe[181802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394453.618422] exe[181922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394475.253328] exe[278932] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394475.290648] exe[181648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394475.311215] exe[278933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394475.351787] exe[278932] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394481.435721] exe[181648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394481.479623] exe[278932] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394481.516835] exe[181724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394481.517275] exe[181648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394483.445946] exe[181648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394483.486481] exe[278933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394483.505608] exe[181724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394483.540771] exe[181724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394483.560170] exe[278933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394490.409754] exe[181625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394490.447452] exe[315888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394490.500091] exe[315888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394492.189419] exe[181650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394492.258688] exe[268468] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394492.313511] exe[268468] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394492.334072] exe[181650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394518.634449] exe[181724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394518.667717] exe[278933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394518.688329] exe[278932] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394518.726932] exe[278933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394555.718059] exe[182829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394555.787052] exe[182829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394555.843029] exe[241075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394555.843323] exe[182829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394564.685715] exe[182829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394564.737080] exe[181658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394564.785454] exe[241075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394568.210295] exe[181909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394568.268515] exe[181910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394568.312976] exe[181910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394579.020326] exe[181775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394579.060648] exe[181809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394579.107589] exe[181910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394580.569821] exe[235446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8097 di:ffffffffff600000 [394580.722809] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8097 di:ffffffffff600000 [394580.775844] exe[235446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8097 di:ffffffffff600000 [394580.782319] exe[181909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000100 di:ffffffffff600000 [394580.827711] exe[181910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000100 di:ffffffffff600000 [394580.848353] exe[181910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000100 di:ffffffffff600000 [394580.885633] exe[181909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000100 di:ffffffffff600000 [394593.442715] warn_bad_vsyscall: 1 callbacks suppressed [394593.442719] exe[181648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394593.529070] exe[278933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394593.573087] exe[181648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394605.539799] exe[181802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394605.582526] exe[181922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394605.621615] exe[181802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394630.127235] exe[314024] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394630.167774] exe[314024] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394630.186547] exe[181867] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394630.222571] exe[314024] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394630.223047] exe[181862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394634.313543] exe[181781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394634.363147] exe[312898] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394634.363197] exe[314024] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394634.424182] exe[181867] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394638.578427] exe[221226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8097 di:ffffffffff600000 [394638.785305] exe[222103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8097 di:ffffffffff600000 [394639.046862] exe[222103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8097 di:ffffffffff600000 [394639.262072] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8097 di:ffffffffff600000 [394639.470427] exe[222758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8097 di:ffffffffff600000 [394639.680141] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8097 di:ffffffffff600000 [394639.869423] exe[222103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394640.091574] exe[235441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394640.276892] exe[221267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394640.445881] exe[221267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394643.593284] warn_bad_vsyscall: 26 callbacks suppressed [394643.593287] exe[242621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394644.205579] exe[222753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394644.381825] exe[311156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394644.588347] exe[311156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394644.881727] exe[222758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394644.886861] exe[221267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394645.096381] exe[235446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394645.458907] exe[221267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394645.548691] exe[274752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394645.636547] exe[274289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394648.755692] warn_bad_vsyscall: 11 callbacks suppressed [394648.755695] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8097 di:ffffffffff600000 [394648.908869] exe[221226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8097 di:ffffffffff600000 [394649.039203] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8097 di:ffffffffff600000 [394649.278116] exe[222753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394649.511225] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7b3858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394649.679102] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394649.870086] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394650.123871] exe[222758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394650.286533] exe[222758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394651.045800] exe[235446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394653.960996] warn_bad_vsyscall: 43 callbacks suppressed [394653.961014] exe[221226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394654.164496] exe[221255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394654.214770] exe[221255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394654.577297] exe[221255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394654.861254] exe[222758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394655.765409] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394656.061766] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394656.061875] exe[221255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394656.381601] exe[235446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394656.615536] exe[242621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8097 di:ffffffffff600000 [394658.982664] warn_bad_vsyscall: 7 callbacks suppressed [394658.982668] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8097 di:ffffffffff600000 [394659.447168] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394660.550197] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394661.414568] exe[221222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394662.192017] exe[221267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394662.406880] exe[221255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394662.591947] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394662.639593] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7b3858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394662.861333] exe[242621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8070 di:ffffffffff600000 [394663.089514] exe[311156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8070 di:ffffffffff600000 [394664.288494] warn_bad_vsyscall: 5 callbacks suppressed [394664.288497] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8070 di:ffffffffff600000 [394664.426207] exe[221267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8070 di:ffffffffff600000 [394664.573339] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394664.760843] exe[221222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394664.768278] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394664.903244] exe[221222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394665.112170] exe[222753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394665.276993] exe[242621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394665.444604] exe[311156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394665.996352] exe[221222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394669.291743] warn_bad_vsyscall: 109 callbacks suppressed [394669.291746] exe[221255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394669.442739] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394669.598856] exe[311156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8070 di:ffffffffff600000 [394669.762095] exe[221255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8070 di:ffffffffff600000 [394670.015855] exe[221222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8070 di:ffffffffff600000 [394670.274029] exe[242621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394670.500206] exe[242621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394670.649669] exe[311156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394670.890767] exe[221267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394671.329722] exe[221222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394674.366388] warn_bad_vsyscall: 12 callbacks suppressed [394674.366391] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394674.616558] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394674.679235] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394674.875590] exe[235441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394675.055363] exe[222758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394675.343397] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394675.482497] exe[221255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394675.646552] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394675.816437] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394675.855147] exe[221222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394679.467566] warn_bad_vsyscall: 87 callbacks suppressed [394679.467570] exe[222758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394679.522388] exe[222103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394679.695485] exe[221222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394680.198643] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394680.354662] potentially unexpected fatal signal 11. [394680.359872] CPU: 45 PID: 311943 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [394680.370293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [394680.379777] RIP: 0033:0x7f3a21c46050 [394680.383618] Code: Unable to access opcode bytes at RIP 0x7f3a21c46026. [394680.390388] RSP: 002b:00007fb9d703b2d8 EFLAGS: 00010202 [394680.397411] RAX: 00007f3a21c46050 RBX: 0000000000000003 RCX: 0000001b2cd20000 [394680.406168] RDX: 0000001b2cd20004 RSI: 00007fb9d703b2f0 RDI: 0000000000000001 [394680.414935] RBP: 0000000000000001 R08: 0000001b2cd60000 R09: 0000000000000000 [394680.423719] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [394680.432495] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [394680.441251] FS: 000055e0abe7e480 GS: 0000000000000000 [394680.625758] exe[242621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394681.082344] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394681.395208] exe[242621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394681.567391] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394681.829275] exe[235441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8070 di:ffffffffff600000 [394681.971680] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8070 di:ffffffffff600000 [394684.629719] warn_bad_vsyscall: 9 callbacks suppressed [394684.629723] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394686.178973] exe[222753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394686.688305] exe[221222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394686.727101] exe[221222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394686.795423] exe[221222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394686.840447] exe[221222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394686.909831] exe[221222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394686.959771] exe[221222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394687.005585] exe[221222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394687.073514] exe[221222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394689.833713] warn_bad_vsyscall: 30 callbacks suppressed [394689.833716] exe[235441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394690.084123] exe[222753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394690.145088] exe[221255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7b3858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394690.437584] exe[235441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8070 di:ffffffffff600000 [394690.811867] exe[222758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8070 di:ffffffffff600000 [394691.021256] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8070 di:ffffffffff600000 [394691.063166] exe[242621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8070 di:ffffffffff600000 [394691.281034] exe[242621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394691.779217] exe[222753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394692.083997] exe[221255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394695.093463] warn_bad_vsyscall: 14 callbacks suppressed [394695.093466] exe[181781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394695.135979] exe[312898] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394695.155348] exe[221255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394695.179744] exe[181781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394695.199855] exe[312898] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394695.429194] exe[222753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394695.658102] exe[222103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394695.920806] exe[222103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8097 di:ffffffffff600000 [394696.169781] exe[222758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8097 di:ffffffffff600000 [394696.392129] exe[242621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8097 di:ffffffffff600000 [394700.290164] warn_bad_vsyscall: 19 callbacks suppressed [394700.290168] exe[221222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394700.646772] exe[222103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394700.694496] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394700.756085] exe[181724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394700.800425] exe[181724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000000 di:ffffffffff600000 [394700.877394] exe[181724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000000 di:ffffffffff600000 [394701.016177] exe[222758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394701.710915] exe[235441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394702.130720] exe[222753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394702.260073] exe[222758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394706.785734] warn_bad_vsyscall: 12 callbacks suppressed [394706.785737] exe[222103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394706.822092] exe[222103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394706.870419] exe[222103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394706.909031] exe[222103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394706.954660] exe[222103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394706.994483] exe[222103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394707.034258] exe[222103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394707.073055] exe[222103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394707.113720] exe[222103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394707.149445] exe[222103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394712.231557] warn_bad_vsyscall: 88 callbacks suppressed [394712.231560] exe[235441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394712.440842] exe[222758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394712.473785] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394712.617510] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394712.624478] exe[235441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394712.876743] exe[222103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394713.377712] exe[242621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394713.432091] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394713.553916] exe[222753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394713.749628] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394717.268192] warn_bad_vsyscall: 12 callbacks suppressed [394717.268195] exe[222758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394717.275303] exe[221267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394717.575100] exe[222753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394717.808644] exe[221267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394717.996639] exe[221267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394718.260866] exe[222753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394718.467900] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8097 di:ffffffffff600000 [394718.667638] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8097 di:ffffffffff600000 [394718.799961] exe[221267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8097 di:ffffffffff600000 [394719.016289] exe[221226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394722.291975] warn_bad_vsyscall: 72 callbacks suppressed [394722.291978] exe[222753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394722.496630] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394722.694620] exe[221226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394722.953340] exe[221229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394722.998383] exe[242621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394723.130926] exe[242621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394723.328543] exe[222758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8070 di:ffffffffff600000 [394723.534275] exe[221222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8070 di:ffffffffff600000 [394723.713240] exe[221267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7d4858 ax:0 si:55a233cb8070 di:ffffffffff600000 [394723.952684] exe[242621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394727.304768] warn_bad_vsyscall: 36 callbacks suppressed [394727.304772] exe[221267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394727.343434] exe[221267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394727.377725] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394727.407878] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394727.439811] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394727.469472] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394727.502023] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394727.533708] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394727.566656] exe[225929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394727.603257] exe[242621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a233c5f839 cs:33 sp:7f580c7f5858 ax:0 si:55a233cb8062 di:ffffffffff600000 [394733.967711] warn_bad_vsyscall: 48 callbacks suppressed [394733.967715] exe[274303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394734.064580] exe[274752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394734.124904] exe[175893] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394743.002158] exe[316266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394743.077589] exe[316025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394743.134390] exe[316025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394756.705039] exe[264864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394756.750257] exe[181764] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394756.793745] exe[181764] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394771.622027] exe[164697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394771.672841] exe[164711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394771.692620] exe[166755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394771.742584] exe[166755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000000 di:ffffffffff600000 [394771.743425] exe[164702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000000 di:ffffffffff600000 [394824.961095] exe[270985] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394825.021787] exe[181873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394825.087722] exe[181782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394827.024557] exe[325987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394827.075139] exe[325987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394827.115911] exe[325987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394831.485927] exe[271006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394831.546845] exe[270985] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394831.568049] exe[181873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394831.624707] exe[181782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394831.645450] exe[181782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394837.867856] exe[270985] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394837.925914] exe[181873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394837.965634] exe[181873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394842.854666] exe[281907] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394842.905353] exe[181688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394842.945307] exe[181688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394845.161763] exe[271006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394845.228205] exe[271006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394845.255038] exe[271006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394845.325308] exe[270985] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394845.350380] exe[181782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394859.022271] exe[281907] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394859.096625] exe[181626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394859.161563] exe[181626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394859.180543] exe[281892] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394955.248269] exe[333140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394955.284550] exe[181536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394955.320311] exe[333138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394956.327840] exe[181724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394956.371666] exe[181724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394956.408388] exe[278933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394956.428220] exe[278932] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394978.471338] exe[168303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394978.541403] exe[168303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394978.589503] exe[276941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394990.712841] exe[267213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394990.753537] exe[267213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394990.773012] exe[181636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394990.814005] exe[266566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394995.931679] exe[267213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394995.987476] exe[266566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [394996.026882] exe[266600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394996.047053] exe[267213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394999.531474] exe[267984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394999.564057] exe[266600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [394999.615463] exe[266600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395003.870186] exe[181636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395003.908379] exe[181636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395003.948486] exe[267213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395011.362101] exe[183269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395011.421930] exe[181684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395011.422414] exe[181696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [395011.517260] exe[181697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395011.542478] exe[183269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395011.562374] exe[181696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395011.584331] exe[181697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395011.605872] exe[183269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395011.625357] exe[183228] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395011.646832] exe[181696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395023.740384] warn_bad_vsyscall: 125 callbacks suppressed [395023.740388] exe[181697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395023.788312] exe[183269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395023.847681] exe[181684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395023.850043] exe[181697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [395030.360279] exe[181812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395030.408897] exe[181801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [395030.447237] exe[181842] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [395036.285652] exe[181812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395036.393701] exe[181812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395036.415719] exe[181801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ea4ee8 ax:0 si:20000080 di:ffffffffff600000 [395042.484284] exe[181684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395042.527134] exe[181684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395042.546300] exe[183269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395042.588646] exe[181697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395042.608254] exe[181696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395042.627829] exe[181697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395042.655992] exe[181684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395042.675948] exe[181696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395042.695455] exe[183228] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395042.714470] exe[181696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395071.655256] warn_bad_vsyscall: 26 callbacks suppressed [395071.655260] exe[252001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395071.741918] exe[252017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395071.761602] exe[252020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395071.807975] exe[252001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395072.966185] exe[252020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000040 di:ffffffffff600000 [395073.059115] exe[181604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000040 di:ffffffffff600000 [395073.110000] exe[252017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000040 di:ffffffffff600000 [395082.127787] exe[182139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395082.184243] exe[182849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395082.185226] exe[181771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [395082.267865] exe[181771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ec5ee8 ax:0 si:20000080 di:ffffffffff600000 [395083.922527] exe[182139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395084.008169] exe[266201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395084.076453] exe[182849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559317ff1839 cs:33 sp:7ec912ee6ee8 ax:0 si:20000080 di:ffffffffff600000 [395094.896763] potentially unexpected fatal signal 5. [395094.901873] CPU: 38 PID: 337227 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [395094.912391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [395094.922042] RIP: 0033:0x7fffffffe062 [395094.925881] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [395094.944935] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [395094.950414] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [395094.957814] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [395094.966523] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [395094.973906] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [395094.981375] R13: 000000000000003e R14: 000000c00058a4e0 R15: 0000000000028142 [395094.988947] FS: 0000000002285fb0 GS: 0000000000000000 [395105.077768] potentially unexpected fatal signal 5. [395105.082804] CPU: 70 PID: 219313 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [395105.093217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [395105.102674] RIP: 0033:0x7fffffffe062 [395105.106485] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [395105.125651] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [395105.131156] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [395105.139894] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [395105.148622] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [395105.155984] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [395105.164717] R13: 000000000000002e R14: 000000c0005016c0 R15: 0000000000028653 [395105.172163] FS: 000000c000130490 GS: 0000000000000000 [395105.212556] potentially unexpected fatal signal 5. [395105.217556] CPU: 58 PID: 337713 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [395105.229437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [395105.240374] RIP: 0033:0x7fffffffe062 [395105.245535] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [395105.266434] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [395105.273258] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [395105.281998] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [395105.290733] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [395105.299496] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [395105.308199] R13: 000000000000002e R14: 000000c0005016c0 R15: 0000000000028653 [395105.315647] FS: 000000c000130490 GS: 0000000000000000 [395105.679432] potentially unexpected fatal signal 5. [395105.684502] CPU: 80 PID: 225301 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [395105.695262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [395105.704789] RIP: 0033:0x7fffffffe062 [395105.708569] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [395105.727597] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [395105.733030] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [395105.740470] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [395105.747806] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [395105.755164] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [395105.762501] R13: 000000000000000c R14: 000000c000169860 R15: 000000000002864b [395105.769846] FS: 0000000001fb4cd0 GS: 0000000000000000 [395105.825186] potentially unexpected fatal signal 5. [395105.830288] CPU: 39 PID: 166897 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [395105.842162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [395105.853095] RIP: 0033:0x7fffffffe062 [395105.858196] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [395105.864236] potentially unexpected fatal signal 5. [395105.878588] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [395105.878590] RAX: 0000000000052738 RBX: 0000000000000000 RCX: 00007fffffffe05a [395105.878590] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [395105.878591] RBP: 000000c00018fe38 R08: 000000c0009426a0 R09: 0000000000000000 [395105.878592] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [395105.878592] R13: 000000000000000c R14: 000000c000169860 R15: 000000000002864b [395105.878593] FS: 0000000001fb4cd0 GS: 0000000000000000 [395105.891686] potentially unexpected fatal signal 5. [395105.899190] CPU: 42 PID: 316159 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [395105.899192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [395105.899196] RIP: 0033:0x7fffffffe062 [395105.899199] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [395105.899200] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [395105.899201] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [395105.899202] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [395105.899202] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [395105.899203] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [395105.899204] R13: 000000000000000c R14: 000000c000169860 R15: 000000000002864b [395105.899204] FS: 0000000001fb4cd0 GS: 0000000000000000 [395106.039645] CPU: 84 PID: 166916 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [395106.050074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [395106.060902] RIP: 0033:0x7fffffffe062 [395106.066066] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [395106.086543] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [395106.093352] RAX: 0000000000052737 RBX: 0000000000000000 RCX: 00007fffffffe05a [395106.100799] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [395106.109522] RBP: 000000c00018fe38 R08: 000000c0005b4d30 R09: 0000000000000000 [395106.116861] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [395106.124208] R13: 000000000000000c R14: 000000c000169860 R15: 000000000002864b [395106.131555] FS: 0000000001fb4cd0 GS: 0000000000000000 [395163.049980] potentially unexpected fatal signal 5. [395163.055141] CPU: 5 PID: 343740 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [395163.065458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [395163.074924] RIP: 0033:0x7fffffffe062 [395163.078836] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [395163.099265] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [395163.106074] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [395163.114824] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [395163.123683] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [395163.132404] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [395163.141143] R13: 000000000000003e R14: 000000c00017da00 R15: 000000000002a697 [395163.149906] FS: 000000c000180090 GS: 0000000000000000 [395386.380522] potentially unexpected fatal signal 5. [395386.385564] CPU: 1 PID: 358910 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [395386.395890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [395386.405340] RIP: 0033:0x7fffffffe062 [395386.409181] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [395386.428180] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [395386.433736] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [395386.441106] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [395386.449942] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [395386.457297] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [395386.464635] R13: 0000000000000036 R14: 000000c000154ea0 R15: 000000000002f10e [395386.473375] FS: 0000000001fb4cd0 GS: 0000000000000000 [395386.721320] potentially unexpected fatal signal 5. [395386.726446] CPU: 2 PID: 192928 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [395386.736777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [395386.747591] RIP: 0033:0x7fffffffe062 [395386.751412] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [395386.770461] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [395386.776038] RAX: 0000000000057a00 RBX: 0000000000000000 RCX: 00007fffffffe05a [395386.784768] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [395386.792117] RBP: 000000c00018fe38 R08: 000000c0004de5b0 R09: 0000000000000000 [395386.800944] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [395386.808340] R13: 0000000000000036 R14: 000000c000154ea0 R15: 000000000002f10e [395386.817091] FS: 0000000001fb4cd0 GS: 0000000000000000 [395758.091417] potentially unexpected fatal signal 5. [395758.096579] CPU: 92 PID: 375661 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [395758.106997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [395758.116516] RIP: 0033:0x7fffffffe062 [395758.120295] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [395758.139301] RSP: 002b:000000c0006e9cb0 EFLAGS: 00000297 [395758.144775] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [395758.153526] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [395758.160907] RBP: 000000c0006e9d40 R08: 0000000000000000 R09: 0000000000000000 [395758.169642] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0006e9bf8 [395758.178403] R13: 000000c000138c00 R14: 000000c00035c340 R15: 0000000000051d24 [395758.187205] FS: 00007f6294a886c0 GS: 0000000000000000 [396124.558331] exe[346792] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ce8076839 cs:33 sp:7ff15be49858 ax:0 si:559ce80cf070 di:ffffffffff600000 [396124.675564] exe[343286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ce8076839 cs:33 sp:7ff15be49858 ax:0 si:559ce80cf070 di:ffffffffff600000 [396124.716580] exe[346792] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ce8076839 cs:33 sp:7ff15be28858 ax:0 si:559ce80cf070 di:ffffffffff600000 [396124.825710] exe[350842] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ce8076839 cs:33 sp:7ff15be28858 ax:0 si:559ce80cf070 di:ffffffffff600000 [396326.241440] potentially unexpected fatal signal 11. [396326.246595] CPU: 13 PID: 287417 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [396326.257020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [396326.266447] RIP: 0033:0x557eb4c480e0 [396326.270225] Code: 48 89 c1 48 29 e8 48 c1 f8 02 48 85 c9 48 89 c2 48 89 d8 48 0f 45 c2 48 83 c4 08 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 <48> 8b 05 a1 b7 0f 00 48 85 c0 74 14 48 83 ec 08 ff d0 85 c0 75 1a [396326.289261] RSP: 002b:00007fd9f28a1538 EFLAGS: 00010202 [396326.294698] RAX: 0000000000000000 RBX: 0000000000000d10 RCX: 0000000000000000 [396326.302029] RDX: 0000000000000000 RSI: 00007fd9f28a15b0 RDI: 0000000000000001 [396326.309378] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [396326.316728] R10: 0000557eb589b750 R11: 0000000000000246 R12: 0000000000000000 [396326.324087] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [396326.331437] FS: 0000557eb589b480 GS: 0000000000000000 [396326.524810] potentially unexpected fatal signal 5. [396326.529948] CPU: 25 PID: 381767 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [396326.540363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [396326.549831] RIP: 0033:0x7fffffffe062 [396326.553630] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [396326.572718] RSP: 002b:000000c00063fcb0 EFLAGS: 00000297 [396326.579533] RAX: 0000556240258000 RBX: 0000000000000000 RCX: 00007fffffffe05a [396326.588293] RDX: 0000000000000003 RSI: 00000000000b7000 RDI: 0000556240258000 [396326.597057] RBP: 000000c00063fd40 R08: 0000000000000009 R09: 000000001dcd1000 [396326.604429] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00063fbd8 [396326.611889] R13: 0000000002856ce0 R14: 000000c0002b4680 R15: 000000000004377c [396326.620821] FS: 00000000049543c0 GS: 0000000000000000 [396479.342361] potentially unexpected fatal signal 5. [396479.347403] CPU: 44 PID: 388987 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [396479.357815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [396479.367283] RIP: 0033:0x7fffffffe062 [396479.370248] potentially unexpected fatal signal 5. [396479.371089] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [396479.376195] CPU: 41 PID: 389106 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [396479.395227] RSP: 002b:000000c000613cb0 EFLAGS: 00000297 [396479.395230] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [396479.395231] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [396479.395232] RBP: 000000c000613d40 R08: 0000000000000000 R09: 0000000000000000 [396479.395232] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000613bf8 [396479.395234] R13: 000000c000181000 R14: 000000c000642000 R15: 000000000005bc6d [396479.395234] FS: 00007f2f39abf6c0 GS: 0000000000000000 [396479.461909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [396479.472773] RIP: 0033:0x7fffffffe062 [396479.477954] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [396479.498333] RSP: 002b:000000c000613cb0 EFLAGS: 00000297 [396479.505170] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [396479.513924] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [396479.522666] RBP: 000000c000613d40 R08: 0000000000000000 R09: 0000000000000000 [396479.531438] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000613bf8 [396479.540169] R13: 000000c000181000 R14: 000000c000642000 R15: 000000000005bc6d [396479.548941] FS: 00007f2f39abf6c0 GS: 0000000000000000 [396579.173048] potentially unexpected fatal signal 5. [396579.178083] CPU: 31 PID: 410010 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [396579.188489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [396579.197982] RIP: 0033:0x7fffffffe062 [396579.201816] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [396579.222256] RSP: 002b:000000c0006f3cb0 EFLAGS: 00000297 [396579.229126] RAX: 00007f9af83fe000 RBX: 0000000000000000 RCX: 00007fffffffe05a [396579.237876] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007f9af83fe000 [396579.246760] RBP: 000000c0006f3d40 R08: 0000000000000009 R09: 00000000011fe000 [396579.254159] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0006f3bf8 [396579.262952] R13: 000000c000180400 R14: 000000c0004b04e0 R15: 000000000005ef7d [396579.271693] FS: 00007fe6effff6c0 GS: 0000000000000000 [396762.028998] potentially unexpected fatal signal 5. [396762.034247] CPU: 87 PID: 375743 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [396762.044660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [396762.054104] RIP: 0033:0x7fffffffe062 [396762.057903] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [396762.077012] RSP: 002b:000000c0006e5cb0 EFLAGS: 00000297 [396762.082539] RAX: 000055a91e400000 RBX: 0000000000000000 RCX: 00007fffffffe05a [396762.089926] RDX: 0000000000000001 RSI: 000000000007b000 RDI: 000055a91e400000 [396762.098796] RBP: 000000c0006e5d40 R08: 0000000000000009 R09: 0000000019a14000 [396762.107539] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0006e5bd8 [396762.116328] R13: 000000c000138800 R14: 000000c00017ba00 R15: 000000000004b68e [396762.125067] FS: 00007f8580d896c0 GS: 0000000000000000 [396822.420418] potentially unexpected fatal signal 11. [396822.425562] CPU: 31 PID: 338427 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [396822.435975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [396822.445524] RIP: 0033:0x55872331f3ee [396822.449325] Code: ff 0f 1f 00 8d 47 01 eb 16 0f 1f 00 48 83 c0 01 8b b4 85 5c 08 00 00 85 f6 0f 85 fd 00 00 00 89 c7 83 f8 04 75 e6 48 8b 4d 60 <48> 8b 41 08 48 83 e0 f8 48 39 85 88 08 00 00 0f 82 4a 02 00 00 48 [396822.468588] RSP: 002b:00007fa4adce32f0 EFLAGS: 00010246 [396822.474038] RAX: 0000000000000004 RBX: 0000000000008040 RCX: 0000558723f947d0 [396822.481445] RDX: 0000558723442e20 RSI: 0000000000000000 RDI: 0000000000000004 [396822.488812] RBP: 0000558723442660 R08: 000000003796a7e9 R09: 0000000000000d62 [396822.496205] R10: 0000000000001000 R11: 0000000000000802 R12: 0000000000008030 [396822.504967] R13: 0000000000000076 R14: 00005587234426c0 R15: 0000000000000000 [396822.512366] FS: 0000558723f93480 GS: 0000000000000000 [396949.228511] potentially unexpected fatal signal 11. [396949.233642] CPU: 33 PID: 363574 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [396949.233688] potentially unexpected fatal signal 5. [396949.244053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [396949.249100] CPU: 43 PID: 428256 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [396949.258627] RIP: 0033:0x5579b7cdeb27 [396949.269040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [396949.269044] RIP: 0033:0x7fffffffe062 [396949.269047] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [396949.269048] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [396949.269049] RAX: 000055a6abe7d000 RBX: 0000000000000000 RCX: 00007fffffffe05a [396949.269050] RDX: 0000000000000001 RSI: 00000000000b7000 RDI: 000055a6abe7d000 [396949.269050] RBP: 000000c000193e38 R08: 0000000000000009 R09: 000000001d613000 [396949.269051] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c000193e20 [396949.269051] R13: 000000000000002c R14: 000000c0004b1380 R15: 0000000000052ccf [396949.269052] FS: 000000c000130890 GS: 0000000000000000 [396949.355770] Code: 00 00 e9 8f e7 ff ff ba 01 00 00 00 e9 a9 ee ff ff 66 90 41 57 41 56 41 55 49 89 d5 41 54 55 53 48 89 fb 48 81 ec 18 05 00 00 <48> 89 74 24 08 89 4c 24 48 64 48 8b 04 25 28 00 00 00 48 89 84 24 [396949.374874] RSP: 002b:00007f75154a4c90 EFLAGS: 00010206 [396949.381725] RAX: 00007f75154a5500 RBX: 00007f75154a51f0 RCX: 0000000000000000 [396949.390491] RDX: 00007f75154a5370 RSI: 00005579b7d603d8 RDI: 00007f75154a51f0 [396949.399241] RBP: 00007f75154a52e0 R08: 0000000000000000 R09: 0000000000000000 [396949.406613] R10: 0000000000001000 R11: 0000000000000293 R12: 00005579b7d603d8 [396949.415358] R13: 00007f75154a5370 R14: 0000000000000000 R15: 00007f75154a51f0 [396949.422809] FS: 00005579b8965480 GS: 0000000000000000 [397026.163199] potentially unexpected fatal signal 5. [397026.168251] CPU: 16 PID: 452197 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [397026.178668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [397026.188146] RIP: 0033:0x7fffffffe062 [397026.192023] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [397026.212450] RSP: 002b:000000c0006d7cb0 EFLAGS: 00000297 [397026.217931] RAX: 00007effb3854000 RBX: 0000000000000000 RCX: 00007fffffffe05a [397026.225315] RDX: 0000000000000003 RSI: 0000000000020000 RDI: 00007effb3854000 [397026.234069] RBP: 000000c0006d7d40 R08: 0000000000000009 R09: 0000000020f92000 [397026.241447] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0006d7bd8 [397026.248792] R13: 000000c000138c00 R14: 000000c00017d860 R15: 0000000000052552 [397026.257554] FS: 00007f52adb886c0 GS: 0000000000000000 [397026.298610] potentially unexpected fatal signal 11. [397026.304466] CPU: 21 PID: 357038 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [397026.314874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [397026.325703] RIP: 0033:0x55f696ec093f [397026.330882] Code: 00 00 0f 05 48 85 c0 7c 18 74 01 c3 31 ed 48 83 e4 f0 4c 89 c7 ff d2 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 b0 ff ff ff f7 d8 <64> 89 01 48 83 c8 ff c3 66 0f 1f 84 00 00 00 00 00 b8 31 00 00 00 [397026.351272] RSP: 002b:00007f083a7d80f8 EFLAGS: 00010213 [397026.358069] RAX: 0000000000000026 RBX: 000055f696e69000 RCX: ffffffffffffffb0 [397026.365530] RDX: 000055f696e69000 RSI: 0000000000000058 RDI: 00007f083a7d8140 [397026.374270] RBP: 00007f3f1d6546c0 R08: 00007f3f1d6546c0 R09: 00007f083a7d8227 [397026.381645] R10: 0000000000000008 R11: 0000000000000206 R12: ffffffffffffffb0 [397026.390435] R13: 000000000000000b R14: 00007f083a7d8140 R15: 00007f083a7d8228 [397026.399176] FS: 000055f697ae4480 GS: 0000000000000000 [398475.149479] exe[499056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c10410839 cs:33 sp:7ff1f1f05858 ax:0 si:563c10469062 di:ffffffffff600000 [399013.844836] exe[469211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1112e5839 cs:33 sp:7f9fe5fc9858 ax:0 si:55c11133e062 di:ffffffffff600000 [399013.924490] exe[489116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1112e5839 cs:33 sp:7f9fe5fc9858 ax:0 si:55c11133e062 di:ffffffffff600000 [399014.011692] exe[474277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1112e5839 cs:33 sp:7f9fe5fc9858 ax:0 si:55c11133e062 di:ffffffffff600000 [399014.103954] exe[471241] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1112e5839 cs:33 sp:7f9fe5fc9858 ax:0 si:55c11133e062 di:ffffffffff600000 [399128.209069] exe[469096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4f7bbd839 cs:33 sp:7f3ef3bf9858 ax:0 si:55e4f7c16070 di:ffffffffff600000 [399128.310289] exe[528327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4f7bbd839 cs:33 sp:7f3ef3bf9858 ax:0 si:55e4f7c16070 di:ffffffffff600000 [399128.401546] exe[474208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4f7bbd839 cs:33 sp:7f3ef3bf9858 ax:0 si:55e4f7c16070 di:ffffffffff600000 [399128.419005] exe[499476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1112e5839 cs:33 sp:7f9fe5fc9858 ax:0 si:55c11133e070 di:ffffffffff600000 [399128.423047] exe[489257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56314bba3839 cs:33 sp:7fb0159fe858 ax:0 si:56314bbfc070 di:ffffffffff600000 [399128.485497] exe[486577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4f7bbd839 cs:33 sp:7f3ef3bf9858 ax:0 si:55e4f7c16070 di:ffffffffff600000 [399128.505953] exe[474234] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1112e5839 cs:33 sp:7f9fe5fc9858 ax:0 si:55c11133e070 di:ffffffffff600000 [399128.527532] exe[528294] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56314bba3839 cs:33 sp:7fb0159fe858 ax:0 si:56314bbfc070 di:ffffffffff600000 [399128.598825] exe[474234] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1112e5839 cs:33 sp:7f9fe5fc9858 ax:0 si:55c11133e070 di:ffffffffff600000 [399128.625907] exe[469004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56314bba3839 cs:33 sp:7fb0159fe858 ax:0 si:56314bbfc070 di:ffffffffff600000 [399724.447019] exe[502075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca4ff27839 cs:33 sp:7fd3d1f04858 ax:0 si:55ca4ff80070 di:ffffffffff600000 [400032.347699] potentially unexpected fatal signal 5. [400032.352874] CPU: 77 PID: 544250 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [400032.363327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [400032.372885] RIP: 0033:0x7fffffffe062 [400032.376748] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [400032.397144] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [400032.403978] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [400032.411352] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [400032.420122] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [400032.428871] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [400032.437626] R13: 000000000000000c R14: 000000c000171040 R15: 000000000006279c [400032.446461] FS: 000000c000130490 GS: 0000000000000000 [400251.233012] exe[549122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582dce5d839 cs:33 sp:7f4dde8bb858 ax:0 si:5582dceb6062 di:ffffffffff600000 [400251.522197] exe[549868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582dce5d839 cs:33 sp:7f4dde8bb858 ax:0 si:5582dceb6062 di:ffffffffff600000 [400251.604261] exe[546331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582dce5d839 cs:33 sp:7f4dde8bb858 ax:0 si:5582dceb6062 di:ffffffffff600000 [400251.675456] exe[542524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582dce5d839 cs:33 sp:7f4dde8bb858 ax:0 si:5582dceb6062 di:ffffffffff600000 [400515.313125] potentially unexpected fatal signal 5. [400515.318190] CPU: 11 PID: 559569 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [400515.328605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [400515.338067] RIP: 0033:0x7fffffffe062 [400515.341929] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [400515.362333] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [400515.367788] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [400515.375202] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [400515.382650] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [400515.391393] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [400515.400216] R13: 000000000000003e R14: 000000c000155380 R15: 000000000006cbfa [400515.408974] FS: 000000c000180090 GS: 0000000000000000 [400572.891716] exe[552368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0b761a839 cs:33 sp:7ede006ad858 ax:0 si:55a0b7673070 di:ffffffffff600000 [400572.944342] exe[554116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0b761a839 cs:33 sp:7ede006ad858 ax:0 si:55a0b7673070 di:ffffffffff600000 [400572.982777] exe[552362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0b761a839 cs:33 sp:7ede006ad858 ax:0 si:55a0b7673070 di:ffffffffff600000 [400573.117630] exe[552368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0b761a839 cs:33 sp:7ede006ad858 ax:0 si:55a0b7673070 di:ffffffffff600000 [401753.363113] exe[577055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c8a761839 cs:33 sp:7fe258844858 ax:0 si:559c8a7ba062 di:ffffffffff600000 [401834.607679] exe[594192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558c3744839 cs:33 sp:7edd40c37858 ax:0 si:5558c379d070 di:ffffffffff600000 [402865.816761] exe[544601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499e9d839 cs:33 sp:7f6ec53fe858 ax:0 si:55c499ef6070 di:ffffffffff600000 [403678.597187] potentially unexpected fatal signal 5. [403678.602324] CPU: 66 PID: 621720 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [403678.612733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [403678.622185] RIP: 0033:0x7fffffffe062 [403678.625970] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [403678.645021] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [403678.651885] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [403678.659271] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [403678.668106] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [403678.675468] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [403678.684238] R13: 000000000000003e R14: 000000c000509520 R15: 00000000000855a6 [403678.692984] FS: 0000000002285fb0 GS: 0000000000000000 [403678.709638] potentially unexpected fatal signal 5. [403678.714713] CPU: 93 PID: 621734 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [403678.725163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [403678.735979] RIP: 0033:0x7fffffffe062 [403678.741165] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [403678.760202] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [403678.767027] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [403678.775958] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [403678.784694] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [403678.792097] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [403678.800831] R13: 000000000000003e R14: 000000c000509520 R15: 00000000000855a6 [403678.809581] FS: 0000000002285fb0 GS: 0000000000000000 [403952.843853] potentially unexpected fatal signal 5. [403952.848921] CPU: 86 PID: 623320 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [403952.859774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [403952.869226] RIP: 0033:0x7fffffffe062 [403952.873022] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [403952.892026] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [403952.897587] RAX: 0000561a4bfd8000 RBX: 0000000000000000 RCX: 00007fffffffe05a [403952.905039] RDX: 0000000000000005 RSI: 00000000000a2000 RDI: 0000561a4bfd8000 [403952.912486] RBP: 000000c00018fe38 R08: 000000000000001e R09: 0000000000024000 [403952.919849] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00018fe20 [403952.927295] R13: 000000000000003e R14: 000000c000482b60 R15: 0000000000097f44 [403952.934653] FS: 000000c000130490 GS: 0000000000000000 [403952.982928] potentially unexpected fatal signal 5. [403952.988150] CPU: 75 PID: 623990 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [403952.998602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [403953.009438] RIP: 0033:0x7fffffffe062 [403953.013237] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [403953.033704] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [403953.039246] RAX: 000055ee917d9000 RBX: 0000000000000000 RCX: 00007fffffffe05a [403953.046710] RDX: 0000000000000005 RSI: 00000000000a2000 RDI: 000055ee917d9000 [403953.054059] RBP: 000000c00013de38 R08: 000000000000001e R09: 0000000000024000 [403953.061497] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00013de20 [403953.068932] R13: 0000000000000038 R14: 000000c000373d40 R15: 000000000008a12f [403953.076281] FS: 000000c000180090 GS: 0000000000000000 [403953.216880] potentially unexpected fatal signal 5. [403953.221999] CPU: 70 PID: 523940 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [403953.232421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [403953.241908] RIP: 0033:0x7fffffffe062 [403953.245710] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [403953.264817] RSP: 002b:000000c000363cb0 EFLAGS: 00000297 [403953.270276] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [403953.277905] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 00007f83e4a00000 [403953.285275] RBP: 000000c000363d40 R08: 0000000000000000 R09: 0000000000000000 [403953.292754] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000363bf8 [403953.300140] R13: 000000c00031a000 R14: 000000c000318b60 R15: 0000000000067e5d [403953.307524] FS: 00007f8ce5cfe6c0 GS: 0000000000000000 [403953.439021] potentially unexpected fatal signal 5. [403953.444156] CPU: 25 PID: 591668 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [403953.454585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [403953.464027] RIP: 0033:0x7fffffffe062 [403953.469225] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [403953.489885] RSP: 002b:000000c0007c1cb0 EFLAGS: 00000297 [403953.495336] RAX: 00007fb4488bf000 RBX: 0000000000000000 RCX: 00007fffffffe05a [403953.502704] RDX: 0000000000000001 RSI: 0000000000002000 RDI: 00007fb4488bf000 [403953.510146] RBP: 000000c0007c1d40 R08: 0000000000000009 R09: 0000000005d94000 [403953.517582] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0007c1bf8 [403953.524936] R13: 000000c000180000 R14: 000000c000178820 R15: 0000000000079c09 [403953.532293] FS: 00007f3d9ad876c0 GS: 0000000000000000 [403953.865891] potentially unexpected fatal signal 11. [403953.871240] CPU: 18 PID: 532541 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [403953.881773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [403953.892604] RIP: 0033:0x55ebed15b800 [403953.897773] Code: 75 d8 4c 89 e7 e8 10 68 fd ff 48 8b 80 88 00 00 00 48 c7 00 00 00 00 00 48 c7 40 08 00 00 00 00 eb b8 0f 1f 84 00 00 00 00 00 <48> 83 05 58 0f c5 00 04 48 8b 05 d9 1a c5 00 66 0f ef c0 48 c7 05 [403953.916797] RSP: 002b:00007f83e4aed440 EFLAGS: 00010246 [403953.923625] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000055ebed15bb8d [403953.931200] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 000055ebeddae760 [403953.938674] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [403953.946048] R10: 000055ebeddae750 R11: 0000000000000246 R12: 0000000000000000 [403953.953728] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000001 [403953.962461] FS: 000055ebeddae480 GS: 0000000000000000 [405359.128466] exe[725349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598295d6839 cs:33 sp:7f1a291fe858 ax:0 si:55982962f070 di:ffffffffff600000 [405359.236558] exe[719772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598295d6839 cs:33 sp:7f1a291fe858 ax:0 si:55982962f070 di:ffffffffff600000 [405359.326603] exe[725211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ab25d3839 cs:33 sp:7fefa39d6858 ax:0 si:562ab262c070 di:ffffffffff600000 [405359.340054] exe[705977] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fac84e8839 cs:33 sp:7fd6360c0858 ax:0 si:55fac8541070 di:ffffffffff600000 [405359.366825] exe[719414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598295d6839 cs:33 sp:7f1a291fe858 ax:0 si:55982962f070 di:ffffffffff600000 [405359.418771] exe[721530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55910a8a7839 cs:33 sp:7fed53317858 ax:0 si:55910a900070 di:ffffffffff600000 [405359.419561] exe[719772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ab25d3839 cs:33 sp:7fefa39d6858 ax:0 si:562ab262c070 di:ffffffffff600000 [405359.438093] exe[725208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fac84e8839 cs:33 sp:7fd6360c0858 ax:0 si:55fac8541070 di:ffffffffff600000 [405359.467009] exe[721559] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598295d6839 cs:33 sp:7f1a291fe858 ax:0 si:55982962f070 di:ffffffffff600000 [405359.517245] exe[705977] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55910a8a7839 cs:33 sp:7fed53317858 ax:0 si:55910a900070 di:ffffffffff600000 [407575.208578] potentially unexpected fatal signal 5. [407575.213620] CPU: 37 PID: 764645 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [407575.224277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [407575.233999] RIP: 0033:0x7fffffffe062 [407575.237800] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [407575.256812] RSP: 002b:000000c00058fd98 EFLAGS: 00000297 [407575.262267] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [407575.269713] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [407575.277095] RBP: 000000c00058fe38 R08: 0000000000000000 R09: 0000000000000000 [407575.285836] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00058fe20 [407575.294591] R13: 000000000000003e R14: 000000c000582680 R15: 000000000009d66b [407575.302689] FS: 000000c00048a090 GS: 0000000000000000 [407575.667567] potentially unexpected fatal signal 5. [407575.672627] CPU: 39 PID: 764636 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [407575.683057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [407575.692520] RIP: 0033:0x7fffffffe062 [407575.696319] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [407575.715311] RSP: 002b:000000c00058fd98 EFLAGS: 00000297 [407575.720748] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [407575.728213] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [407575.735577] RBP: 000000c00058fe38 R08: 0000000000000000 R09: 0000000000000000 [407575.744325] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00058fe20 [407575.753161] R13: 000000000000003e R14: 000000c000582680 R15: 000000000009d66b [407575.760524] FS: 000000c00048a090 GS: 0000000000000000 [407575.956610] potentially unexpected fatal signal 5. [407575.961648] CPU: 87 PID: 764644 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [407575.972146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [407575.981617] RIP: 0033:0x7fffffffe062 [407575.985469] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [407576.006103] RSP: 002b:000000c00058fd98 EFLAGS: 00000297 [407576.011552] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [407576.018932] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [407576.026296] RBP: 000000c00058fe38 R08: 0000000000000000 R09: 0000000000000000 [407576.035033] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00058fe20 [407576.042393] R13: 000000000000003e R14: 000000c000582680 R15: 000000000009d66b [407576.049785] FS: 000000c00048a090 GS: 0000000000000000 [407576.336414] potentially unexpected fatal signal 5. [407576.341460] CPU: 59 PID: 764713 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [407576.351878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [407576.361348] RIP: 0033:0x7fffffffe062 [407576.365146] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [407576.384245] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [407576.389699] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [407576.397076] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [407576.404488] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [407576.413231] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [407576.421988] R13: 000000000000003e R14: 000000c0004b5520 R15: 000000000009d8bf [407576.430715] FS: 000000c000131490 GS: 0000000000000000 [407576.634189] potentially unexpected fatal signal 5. [407576.639245] CPU: 17 PID: 667072 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [407576.649668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [407576.659209] RIP: 0033:0x7fffffffe062 [407576.663055] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [407576.683634] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [407576.690443] RAX: 00000000000bab48 RBX: 0000000000000000 RCX: 00007fffffffe05a [407576.699176] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [407576.707913] RBP: 000000c00018fe38 R08: 000000c009c8ff00 R09: 0000000000000000 [407576.716753] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [407576.725590] R13: 000000000000003e R14: 000000c0004b5520 R15: 000000000009d8bf [407576.733004] potentially unexpected fatal signal 5. [407576.734319] FS: 000000c000131490 GS: 0000000000000000 [407576.739330] CPU: 54 PID: 668536 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [407576.739332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [407576.739338] RIP: 0033:0x7fffffffe062 [407576.739343] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [407576.773147] potentially unexpected fatal signal 5. [407576.791533] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [407576.797920] CPU: 17 PID: 764703 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [407576.797922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [407576.797927] RIP: 0033:0x7fffffffe062 [407576.797929] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [407576.797930] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [407576.815171] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [407576.815173] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [407576.815174] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [407576.815175] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [407576.815175] R13: 000000000000003e R14: 000000c0004b5520 R15: 000000000009d8bf [407576.815176] FS: 000000c000131490 GS: 0000000000000000 [407576.904089] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [407576.911475] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [407576.920204] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [407576.928947] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [407576.937677] R13: 000000000000003e R14: 000000c0004b5520 R15: 000000000009d8bf [407576.946411] FS: 000000c000131490 GS: 0000000000000000 [407577.277492] potentially unexpected fatal signal 5. [407577.282733] CPU: 65 PID: 667077 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [407577.294513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [407577.305467] RIP: 0033:0x7fffffffe062 [407577.310662] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [407577.331021] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [407577.337919] RAX: 00000000000bab46 RBX: 0000000000000000 RCX: 00007fffffffe05a [407577.346682] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [407577.355468] RBP: 000000c00018fe38 R08: 000000c008868010 R09: 0000000000000000 [407577.364241] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [407577.372994] R13: 000000000000003e R14: 000000c0004b5520 R15: 000000000009d8bf [407577.381778] FS: 000000c000131490 GS: 0000000000000000 [407584.687551] potentially unexpected fatal signal 5. [407584.692590] CPU: 53 PID: 765725 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [407584.703103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [407584.712618] RIP: 0033:0x7fffffffe062 [407584.716426] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [407584.735511] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [407584.742287] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [407584.749628] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [407584.758348] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [407584.765935] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [407584.774605] R13: 000000000000003e R14: 000000c000602680 R15: 000000000009dd37 [407584.783392] FS: 0000000002285fb0 GS: 0000000000000000 [407584.989684] potentially unexpected fatal signal 5. [407584.994730] CPU: 52 PID: 669416 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [407585.006511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [407585.016038] RIP: 0033:0x7fffffffe062 [407585.019945] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [407585.038953] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [407585.045771] RAX: 00000000000baf25 RBX: 0000000000000000 RCX: 00007fffffffe05a [407585.053114] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [407585.061852] RBP: 000000c00013de38 R08: 000000c02f1f25b0 R09: 0000000000000000 [407585.070699] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [407585.079435] R13: 000000000000003e R14: 000000c000602680 R15: 000000000009dd37 [407585.086788] FS: 0000000002285fb0 GS: 0000000000000000 [407585.422849] potentially unexpected fatal signal 5. [407585.427870] CPU: 59 PID: 699000 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [407585.438270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [407585.447797] RIP: 0033:0x7fffffffe062 [407585.451574] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [407585.470747] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [407585.476192] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [407585.483546] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [407585.490901] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [407585.498439] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [407585.507179] R13: 000000000000003e R14: 000000c000602680 R15: 000000000009dd37 [407585.514545] FS: 0000000002285fb0 GS: 0000000000000000 [407599.668346] potentially unexpected fatal signal 5. [407599.673418] CPU: 81 PID: 768352 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [407599.683840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [407599.693399] RIP: 0033:0x7fffffffe062 [407599.696643] potentially unexpected fatal signal 5. [407599.697217] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [407599.699873] potentially unexpected fatal signal 5. [407599.699879] CPU: 22 PID: 698032 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [407599.699881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [407599.699886] RIP: 0033:0x7fffffffe062 [407599.699890] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [407599.699892] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [407599.699894] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [407599.699895] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [407599.699896] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [407599.699897] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [407599.699898] R13: 000000000000001e R14: 000000c000582ea0 R15: 000000000009e968 [407599.699900] FS: 000000c000608090 GS: 0000000000000000 [407599.702221] CPU: 72 PID: 704444 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [407599.702223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [407599.721304] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [407599.721306] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [407599.721307] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [407599.721308] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [407599.721308] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [407599.721309] R13: 000000000000001e R14: 000000c000582ea0 R15: 000000000009e968 [407599.721310] FS: 000000c000608090 GS: 0000000000000000 [407599.891528] RIP: 0033:0x7fffffffe062 [407599.895468] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [407599.915946] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [407599.922819] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [407599.931694] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [407599.940456] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [407599.947848] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [407599.956592] R13: 000000000000001e R14: 000000c000582ea0 R15: 000000000009e968 [407599.965387] FS: 000000c000608090 GS: 0000000000000000 [408400.547268] warn_bad_vsyscall: 3 callbacks suppressed [408400.547272] exe[785384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558924745839 cs:33 sp:7ede2d7ec858 ax:0 si:55892479e070 di:ffffffffff600000 [408400.596236] exe[785384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558924745839 cs:33 sp:7ede2d7ec858 ax:0 si:55892479e070 di:ffffffffff600000 [408400.661843] exe[790741] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558924745839 cs:33 sp:7ede2d7ec858 ax:0 si:55892479e070 di:ffffffffff600000 [408400.709764] exe[785128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558924745839 cs:33 sp:7ede2d7ec858 ax:0 si:55892479e070 di:ffffffffff600000 [408563.453107] exe[775085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a95d7e839 cs:33 sp:7f408fd01858 ax:0 si:563a95dd7062 di:ffffffffff600000 [408563.497774] exe[796564] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a95d7e839 cs:33 sp:7f408fcbf858 ax:0 si:563a95dd7062 di:ffffffffff600000 [408563.540200] exe[784008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a95d7e839 cs:33 sp:7f408fce0858 ax:0 si:563a95dd7062 di:ffffffffff600000 [408583.519596] exe[767613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a95d7e839 cs:33 sp:7f408fd01858 ax:0 si:563a95dd7062 di:ffffffffff600000 [408583.576269] exe[769145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a95d7e839 cs:33 sp:7f408fd01858 ax:0 si:563a95dd7062 di:ffffffffff600000 [408583.616109] exe[769145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a95d7e839 cs:33 sp:7f408fd01858 ax:0 si:563a95dd7062 di:ffffffffff600000 [408716.922222] exe[793873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc71382839 cs:33 sp:7fd2f0a32858 ax:0 si:55bc713db097 di:ffffffffff600000 [408717.082760] exe[804843] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc71382839 cs:33 sp:7fd2f0a32858 ax:0 si:55bc713db097 di:ffffffffff600000 [408717.206598] exe[789087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc71382839 cs:33 sp:7fd2f0a32858 ax:0 si:55bc713db097 di:ffffffffff600000 [409735.241523] exe[796036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56392a31f839 cs:33 sp:7ef89039b858 ax:0 si:56392a378070 di:ffffffffff600000 [410344.339498] exe[835195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fc8cf1839 cs:33 sp:7f7610098858 ax:0 si:562fc8d4a062 di:ffffffffff600000 [410344.438486] exe[835095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fc8cf1839 cs:33 sp:7f7610098858 ax:0 si:562fc8d4a062 di:ffffffffff600000 [410344.537649] exe[833927] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fc8cf1839 cs:33 sp:7f7610098858 ax:0 si:562fc8d4a062 di:ffffffffff600000 [410344.638087] exe[835097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fc8cf1839 cs:33 sp:7f7610098858 ax:0 si:562fc8d4a062 di:ffffffffff600000 [411188.866434] potentially unexpected fatal signal 5. [411188.871469] CPU: 16 PID: 809505 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [411188.881993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [411188.891449] RIP: 0033:0x7fffffffe062 [411188.895245] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [411188.914320] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [411188.921172] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [411188.928522] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [411188.935909] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [411188.943258] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [411188.950608] R13: 000000000000003e R14: 000000c0006801a0 R15: 00000000000bb082 [411188.959437] FS: 000000c000130890 GS: 0000000000000000 [411189.020130] potentially unexpected fatal signal 5. [411189.025339] CPU: 71 PID: 808457 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [411189.037212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [411189.048149] RIP: 0033:0x7fffffffe062 [411189.053302] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [411189.073688] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [411189.079152] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [411189.086513] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [411189.093959] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [411189.102712] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [411189.111545] R13: 000000000000003e R14: 000000c0006801a0 R15: 00000000000bb082 [411189.120284] FS: 000000c000130890 GS: 0000000000000000 [411196.079783] potentially unexpected fatal signal 5. [411196.084930] CPU: 21 PID: 805414 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [411196.095337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [411196.104796] RIP: 0033:0x7fffffffe062 [411196.108598] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [411196.127607] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [411196.133039] RAX: 00000000000ced0d RBX: 0000000000000000 RCX: 00007fffffffe05a [411196.140391] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [411196.147768] RBP: 000000c00018fe38 R08: 000000c01b2263d0 R09: 0000000000000000 [411196.155141] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [411196.163882] R13: 0000000000000038 R14: 000000c0004df520 R15: 00000000000bb41e [411196.172629] FS: 000000c000130890 GS: 0000000000000000 [411204.484128] potentially unexpected fatal signal 5. [411204.489171] CPU: 3 PID: 829418 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [411204.499506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [411204.508957] RIP: 0033:0x7fffffffe062 [411204.512755] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [411204.531894] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [411204.538706] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [411204.547456] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [411204.554919] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [411204.562285] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [411204.571126] R13: 000000000000000c R14: 000000c000508820 R15: 00000000000bc0e5 [411204.579900] FS: 000000c000180490 GS: 0000000000000000 [411210.087568] potentially unexpected fatal signal 5. [411210.092629] CPU: 40 PID: 786331 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [411210.103052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [411210.112744] RIP: 0033:0x7fffffffe062 [411210.116528] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [411210.135642] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [411210.141105] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [411210.148471] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [411210.155833] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [411210.163278] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [411210.170661] R13: 0000000000000004 R14: 000000c0004931e0 R15: 00000000000bc70d [411210.178016] FS: 000000c000130890 GS: 0000000000000000 [411280.526369] exe[862074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e602a7839 cs:33 sp:7fb5e810e858 ax:0 si:555e60300062 di:ffffffffff600000 [411531.956650] exe[860447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602a871db31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:30001000 [411532.767532] exe[875769] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602a871db31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:30001000 [411532.899955] exe[875994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602a871db31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:30001000 [413547.682649] exe[866439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560426ae0839 cs:33 sp:7feb8e56cee8 ax:0 si:20000180 di:ffffffffff600000 [413740.971087] exe[919834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc20053839 cs:33 sp:7ff79a344858 ax:0 si:55bc200ac062 di:ffffffffff600000 [413827.968443] exe[918665] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cb6688c839 cs:33 sp:7f1c645fe858 ax:0 si:55cb668e5062 di:ffffffffff600000 [414703.508341] exe[896454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cfcba9839 cs:33 sp:7ff564bfe858 ax:0 si:558cfcc02070 di:ffffffffff600000 [414800.614966] potentially unexpected fatal signal 5. [414800.620015] CPU: 31 PID: 847693 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [414800.630429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [414800.639902] RIP: 0033:0x7fffffffe062 [414800.643702] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [414800.662880] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [414800.669719] RAX: 00000000000e4edf RBX: 0000000000000000 RCX: 00007fffffffe05a [414800.678480] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [414800.687281] RBP: 000000c00013de38 R08: 000000c000227690 R09: 0000000000000000 [414800.696020] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [414800.704771] R13: 000000000000003c R14: 000000c000580820 R15: 00000000000cee4c [414800.712170] FS: 0000000002285fb0 GS: 0000000000000000 [414801.739075] potentially unexpected fatal signal 5. [414801.744127] CPU: 8 PID: 858473 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [414801.754525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [414801.763971] RIP: 0033:0x7fffffffe062 [414801.767775] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [414801.786789] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [414801.792305] RAX: 00000000000e4eef RBX: 0000000000000000 RCX: 00007fffffffe05a [414801.801053] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [414801.808422] RBP: 000000c00013de38 R08: 000000c005a330f0 R09: 0000000000000000 [414801.815782] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [414801.823152] R13: 000000000000003e R14: 000000c0005004e0 R15: 00000000000cee45 [414801.830521] FS: 0000000002285fb0 GS: 0000000000000000 [414808.593941] potentially unexpected fatal signal 5. [414808.598984] CPU: 69 PID: 907766 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [414808.609509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [414808.618957] RIP: 0033:0x7fffffffe062 [414808.622755] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [414808.641849] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [414808.647400] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [414808.654840] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [414808.662284] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [414808.669639] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [414808.677048] R13: 000000000000002e R14: 000000c000488680 R15: 00000000000cf218 [414808.684471] FS: 0000000001fb4cd0 GS: 0000000000000000 [414809.595481] potentially unexpected fatal signal 5. [414809.600562] CPU: 37 PID: 906942 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [414809.610998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [414809.620442] RIP: 0033:0x7fffffffe062 [414809.624281] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [414809.644700] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [414809.650147] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [414809.657526] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [414809.666249] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [414809.673707] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [414809.681074] R13: 000000000000002e R14: 000000c000488680 R15: 00000000000cf218 [414809.688438] FS: 0000000001fb4cd0 GS: 0000000000000000 [414809.818003] potentially unexpected fatal signal 5. [414809.823078] CPU: 89 PID: 902131 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [414809.833504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [414809.842952] RIP: 0033:0x7fffffffe062 [414809.846750] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [414809.865770] RSP: 002b:000000c000593d98 EFLAGS: 00000297 [414809.871328] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [414809.880059] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [414809.887412] RBP: 000000c000593e38 R08: 0000000000000000 R09: 0000000000000000 [414809.894776] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000593e20 [414809.903652] R13: 000000000000003e R14: 000000c0004d9860 R15: 00000000000cf233 [414809.911010] FS: 0000000002285fb0 GS: 0000000000000000 [415516.855776] exe[958092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c8121d839 cs:33 sp:7f60ad775858 ax:0 si:564c81276062 di:ffffffffff600000 [415516.945827] exe[958092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c8121d839 cs:33 sp:7f60ad775858 ax:0 si:564c81276062 di:ffffffffff600000 [415517.054080] exe[959133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c8121d839 cs:33 sp:7f60ad754858 ax:0 si:564c81276062 di:ffffffffff600000 [415517.054248] exe[958092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c8121d839 cs:33 sp:7f60ad775858 ax:0 si:564c81276062 di:ffffffffff600000 [415596.739408] exe[975603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d5dfb8cb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2580000 [415596.858458] exe[988242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d5dfb8cb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2580000 [415596.886044] exe[990842] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d5dfb8cb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2580000 [415596.990421] exe[987356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d5dfb8cb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2580000 [415709.153779] exe[994478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56476673e839 cs:33 sp:7eb32db5b858 ax:0 si:564766797062 di:ffffffffff600000 [415709.446844] exe[994308] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56476673e839 cs:33 sp:7eb32db5b858 ax:0 si:564766797062 di:ffffffffff600000 [415709.663983] exe[994479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56476673e839 cs:33 sp:7eb32db5b858 ax:0 si:564766797062 di:ffffffffff600000 [415709.701918] exe[972707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56476673e839 cs:33 sp:7eb32db5b858 ax:0 si:564766797062 di:ffffffffff600000 [415782.622819] exe[958709] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f6b06b40a cs:33 sp:7f88da8ceee8 ax:12 si:ffffffffff600000 di:563f6b0d7ff2 [415782.687990] exe[951447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f6b06b40a cs:33 sp:7f88da8adee8 ax:12 si:ffffffffff600000 di:563f6b0d7ff2 [415782.738582] exe[941171] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f6b06b40a cs:33 sp:7f88da8ceee8 ax:12 si:ffffffffff600000 di:563f6b0d7ff2 [416980.957594] exe[957543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c283f2e839 cs:33 sp:7f41cd101858 ax:0 si:55c283f87097 di:ffffffffff600000 [416981.006352] exe[949865] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c283f2e839 cs:33 sp:7f41cd101858 ax:0 si:55c283f87097 di:ffffffffff600000 [416981.054761] exe[944779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c283f2e839 cs:33 sp:7f41cd101858 ax:0 si:55c283f87097 di:ffffffffff600000 [417741.789001] exe[7750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e565764839 cs:33 sp:7fa06b49f858 ax:0 si:55e5657bd070 di:ffffffffff600000 [417741.857224] exe[995474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e565764839 cs:33 sp:7fa06b49f858 ax:0 si:55e5657bd070 di:ffffffffff600000 [417741.952962] exe[957456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e565764839 cs:33 sp:7fa06b47e858 ax:0 si:55e5657bd070 di:ffffffffff600000 [418412.443089] potentially unexpected fatal signal 5. [418412.448169] CPU: 88 PID: 11813 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [418412.458496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [418412.468009] RIP: 0033:0x7fffffffe062 [418412.471786] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [418412.491400] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [418412.496880] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [418412.504242] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [418412.511621] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [418412.520394] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [418412.529159] R13: 000000000000003e R14: 000000c00015c4e0 R15: 00000000000e52d9 [418412.536505] FS: 000000c000130c90 GS: 0000000000000000 [418412.681906] potentially unexpected fatal signal 5. [418412.687015] CPU: 64 PID: 951315 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [418412.697516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [418412.706967] RIP: 0033:0x7fffffffe062 [418412.710756] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [418412.729773] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [418412.736592] RAX: 0000000000009675 RBX: 0000000000000000 RCX: 00007fffffffe05a [418412.743988] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [418412.751343] RBP: 000000c000193e38 R08: 000000c003ce1b40 R09: 0000000000000000 [418412.758714] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [418412.766072] R13: 000000000000003e R14: 000000c0004976c0 R15: 00000000000e52ef [418412.773438] FS: 0000000002285fb0 GS: 0000000000000000 [418413.200694] potentially unexpected fatal signal 5. [418413.205750] CPU: 18 PID: 970454 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [418413.216176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [418413.225611] RIP: 0033:0x7fffffffe062 [418413.229402] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [418413.248382] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [418413.253844] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [418413.261197] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [418413.268551] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [418413.275917] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [418413.283274] R13: 000000000000003e R14: 000000c0004976c0 R15: 00000000000e52ef [418413.292022] FS: 0000000002285fb0 GS: 0000000000000000 [418413.362052] potentially unexpected fatal signal 5. [418413.368045] CPU: 49 PID: 965648 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [418413.378573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [418413.378700] potentially unexpected fatal signal 5. [418413.389374] RIP: 0033:0x7fffffffe062 [418413.395754] CPU: 4 PID: 975388 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [418413.395756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [418413.395762] RIP: 0033:0x7fffffffe062 [418413.395770] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [418413.400925] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [418413.400927] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [418413.400928] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [418413.400929] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [418413.400930] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [418413.400930] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [418413.400931] R13: 000000000000003e R14: 000000c0004976c0 R15: 00000000000e52ef [418413.400932] FS: 0000000002285fb0 GS: 0000000000000000 [418413.443542] potentially unexpected fatal signal 5. [418413.446528] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [418413.446531] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [418413.446535] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [418413.466914] CPU: 21 PID: 20467 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [418413.466916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [418413.466922] RIP: 0033:0x7fffffffe062 [418413.466926] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [418413.473716] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [418413.473717] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [418413.473719] R13: 000000000000003e R14: 000000c0004976c0 R15: 00000000000e52ef [418413.473720] FS: 0000000002285fb0 GS: 0000000000000000 [418413.620972] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [418413.626430] RAX: 000000000000966b RBX: 0000000000000000 RCX: 00007fffffffe05a [418413.635139] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [418413.643883] RBP: 000000c000193e38 R08: 000000c011740f10 R09: 0000000000000000 [418413.652602] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [418413.660058] R13: 000000000000003e R14: 000000c0004976c0 R15: 00000000000e52ef [418413.668626] potentially unexpected fatal signal 5. [418413.668815] FS: 0000000002285fb0 GS: 0000000000000000 [418413.673856] CPU: 38 PID: 38468 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [418413.690972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [418413.701861] RIP: 0033:0x7fffffffe062 [418413.707010] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [418413.726105] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [418413.732947] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [418413.741686] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [418413.750426] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [418413.757792] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [418413.766554] R13: 000000000000003e R14: 000000c00015c4e0 R15: 00000000000e52d9 [418413.775280] FS: 000000c000130c90 GS: 0000000000000000 [418440.326377] exe[42859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5248e9839 cs:33 sp:7f1f41e34ee8 ax:0 si:20002dc0 di:ffffffffff600000 [418440.464249] exe[42928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5248e9839 cs:33 sp:7f1f41e34ee8 ax:0 si:20002dc0 di:ffffffffff600000 [418440.466290] exe[43051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5248e9839 cs:33 sp:7f1f419feee8 ax:0 si:20002dc0 di:ffffffffff600000 [418440.602449] exe[43077] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556b828fb839 cs:33 sp:7fbb103d0ee8 ax:0 si:20002dc0 di:ffffffffff600000 [418440.642942] exe[42976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5248e9839 cs:33 sp:7f1f419feee8 ax:0 si:20002dc0 di:ffffffffff600000 [418440.642949] exe[42905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5248e9839 cs:33 sp:7f1f41e34ee8 ax:0 si:20002dc0 di:ffffffffff600000 [421294.298410] potentially unexpected fatal signal 5. [421294.303460] CPU: 13 PID: 115702 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [421294.313866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [421294.323339] RIP: 0033:0x7fffffffe062 [421294.327200] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [421294.347855] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [421294.354703] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [421294.363479] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [421294.372251] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [421294.380989] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [421294.389790] R13: 000000000000003e R14: 000000c000501380 R15: 000000000001c27c [421294.398550] FS: 0000000002285fb0 GS: 0000000000000000 [421708.976814] potentially unexpected fatal signal 5. [421708.981844] CPU: 55 PID: 119933 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [421708.982693] potentially unexpected fatal signal 5. [421708.990656] potentially unexpected fatal signal 5. [421708.990661] CPU: 58 PID: 128061 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [421708.990663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [421708.990671] RIP: 0033:0x7fffffffe062 [421708.990674] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [421708.990676] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [421708.990679] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [421708.990680] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [421708.990681] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [421708.990682] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [421708.990683] R13: 0000000000000034 R14: 000000c0001c2820 R15: 000000000001b59c [421708.990685] FS: 000000c000180090 GS: 0000000000000000 [421708.992409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [421708.992412] RIP: 0033:0x7fffffffe062 [421708.992414] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [421708.992415] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [421708.992416] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [421708.992416] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [421708.992417] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [421708.992417] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [421708.992418] R13: 0000000000000034 R14: 000000c0001c2820 R15: 000000000001b59c [421708.992418] FS: 000000c000180090 GS: 0000000000000000 [421709.183957] CPU: 60 PID: 119552 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [421709.195787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [421709.206613] RIP: 0033:0x7fffffffe062 [421709.211789] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [421709.232168] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [421709.238990] RAX: 000000000001f43f RBX: 0000000000000000 RCX: 00007fffffffe05a [421709.247843] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [421709.256587] RBP: 000000c00013de38 R08: 000000c0004304c0 R09: 0000000000000000 [421709.265310] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [421709.274051] R13: 0000000000000034 R14: 000000c0001c2820 R15: 000000000001b59c [421709.282783] FS: 000000c000180090 GS: 0000000000000000 [421745.332227] potentially unexpected fatal signal 5. [421745.337271] CPU: 34 PID: 121020 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [421745.347699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [421745.357212] RIP: 0033:0x7fffffffe062 [421745.361093] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [421745.381522] RSP: 002b:000000c00064fcb0 EFLAGS: 00000297 [421745.388350] RAX: 000000000001fae0 RBX: 0000000000000000 RCX: 00007fffffffe05a [421745.397094] RDX: 0000000000000000 RSI: 000000c000650000 RDI: 0000000000012f00 [421745.405846] RBP: 000000c00064fd40 R08: 000000c00002a5b0 R09: 0000000000000000 [421745.414602] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00064fbd8 [421745.423355] R13: 000000c000138c00 R14: 000000c0004fdba0 R15: 000000000001c0df [421745.432099] FS: 00007f5a725886c0 GS: 0000000000000000 [423560.156778] exe[144113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5596086d8839 cs:33 sp:7f20b06f1858 ax:0 si:559608731070 di:ffffffffff600000 [423560.199314] exe[182277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5596086d8839 cs:33 sp:7f20b06d0858 ax:0 si:559608731070 di:ffffffffff600000 [423560.243274] exe[143910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5596086d8839 cs:33 sp:7f20b06f1858 ax:0 si:559608731070 di:ffffffffff600000 [423649.583916] exe[201638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6c330f40a cs:33 sp:7ee145b31ee8 ax:12 si:ffffffffff600000 di:55a6c337bff2 [423649.654479] exe[191987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6c330f40a cs:33 sp:7ee145b31ee8 ax:12 si:ffffffffff600000 di:55a6c337bff2 [423649.860754] exe[193111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6c330f40a cs:33 sp:7ee145b31ee8 ax:12 si:ffffffffff600000 di:55a6c337bff2 [425051.943081] exe[238817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6339a9839 cs:33 sp:7ff6f09dd858 ax:0 si:55d633a02062 di:ffffffffff600000 [425052.842829] exe[239635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6339a9839 cs:33 sp:7ff6f09bc858 ax:0 si:55d633a02062 di:ffffffffff600000 [425052.843447] exe[239671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6339a9839 cs:33 sp:7ff6f099b858 ax:0 si:55d633a02062 di:ffffffffff600000 [425053.625286] exe[238133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6339a9839 cs:33 sp:7ff6f099b858 ax:0 si:55d633a02062 di:ffffffffff600000 [425053.650454] exe[238133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6339a9839 cs:33 sp:7ff6f099b858 ax:0 si:55d633a02062 di:ffffffffff600000 [425053.675639] exe[238133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6339a9839 cs:33 sp:7ff6f099b858 ax:0 si:55d633a02062 di:ffffffffff600000 [425053.697664] exe[238133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6339a9839 cs:33 sp:7ff6f099b858 ax:0 si:55d633a02062 di:ffffffffff600000 [425053.719565] exe[238882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6339a9839 cs:33 sp:7ff6f099b858 ax:0 si:55d633a02062 di:ffffffffff600000 [425053.748460] exe[238882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6339a9839 cs:33 sp:7ff6f099b858 ax:0 si:55d633a02062 di:ffffffffff600000 [425053.770275] exe[238882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6339a9839 cs:33 sp:7ff6f099b858 ax:0 si:55d633a02062 di:ffffffffff600000 [425175.130343] warn_bad_vsyscall: 26 callbacks suppressed [425175.130350] exe[169396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b58f5140a cs:33 sp:7f9c64ebbee8 ax:12 si:ffffffffff600000 di:560b58fbdff2 [425175.349907] exe[136039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b58f5140a cs:33 sp:7f9c64ebbee8 ax:12 si:ffffffffff600000 di:560b58fbdff2 [425176.081027] exe[202653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b58f5140a cs:33 sp:7f9c64ebbee8 ax:12 si:ffffffffff600000 di:560b58fbdff2 [425273.521689] exe[211414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be5dbb0839 cs:33 sp:7fdd5b968858 ax:0 si:55be5dc09062 di:ffffffffff600000 [425273.696622] exe[175883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be5dbb0839 cs:33 sp:7fdd5b968858 ax:0 si:55be5dc09062 di:ffffffffff600000 [425274.458363] exe[172006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be5dbb0839 cs:33 sp:7fdd5b926858 ax:0 si:55be5dc09062 di:ffffffffff600000 [425344.288024] potentially unexpected fatal signal 5. [425344.293066] CPU: 53 PID: 158404 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [425344.303465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [425344.312903] RIP: 0033:0x7fffffffe062 [425344.316689] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [425344.335687] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [425344.341146] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [425344.348556] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [425344.357396] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [425344.366129] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [425344.373478] R13: 000000000000000a R14: 000000c000472340 R15: 000000000001f9fa [425344.380850] FS: 000000c000130c90 GS: 0000000000000000 [425384.405341] potentially unexpected fatal signal 5. [425384.410390] CPU: 48 PID: 252771 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [425384.420809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [425384.430247] RIP: 0033:0x7fffffffe062 [425384.434084] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [425384.453081] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [425384.459912] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [425384.467350] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [425384.476070] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [425384.483423] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [425384.492141] R13: 000000000000000c R14: 000000c00016f040 R15: 0000000000020894 [425384.499514] FS: 0000000001fb4cd0 GS: 0000000000000000 [425573.207745] exe[266265] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a254b3d40a cs:33 sp:7ec1527b7ee8 ax:12 si:ffffffffff600000 di:55a254ba9ff2 [425573.249558] exe[267032] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a254b3d40a cs:33 sp:7ec1527b7ee8 ax:12 si:ffffffffff600000 di:55a254ba9ff2 [425573.271390] exe[266671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a254b3d40a cs:33 sp:7ec1527b7ee8 ax:12 si:ffffffffff600000 di:55a254ba9ff2 [425573.311981] exe[266265] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a254b3d40a cs:33 sp:7ec1527b7ee8 ax:12 si:ffffffffff600000 di:55a254ba9ff2 [425636.098780] potentially unexpected fatal signal 5. [425636.103827] CPU: 67 PID: 207245 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [425636.114232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [425636.123694] RIP: 0033:0x7fffffffe062 [425636.127645] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [425636.148093] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [425636.153545] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [425636.162296] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [425636.171042] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [425636.179769] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [425636.187314] R13: 0000000000000012 R14: 000000c00048eea0 R15: 0000000000024692 [425636.194672] FS: 000000c000130490 GS: 0000000000000000 [425636.361961] potentially unexpected fatal signal 5. [425636.367038] CPU: 70 PID: 177226 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [425636.377470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [425636.386941] RIP: 0033:0x7fffffffe062 [425636.390779] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [425636.409956] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [425636.416886] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [425636.425720] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [425636.434505] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [425636.443213] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [425636.451970] R13: 0000000000000012 R14: 000000c00048eea0 R15: 0000000000024692 [425636.460715] FS: 000000c000130490 GS: 0000000000000000 [425642.744436] potentially unexpected fatal signal 5. [425642.749610] CPU: 14 PID: 272545 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [425642.760066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [425642.769570] RIP: 0033:0x7fffffffe062 [425642.773351] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [425642.792501] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [425642.797977] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [425642.805348] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [425642.812729] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [425642.821546] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [425642.830321] R13: 000000000000003e R14: 000000c000182ea0 R15: 0000000000024850 [425642.837270] potentially unexpected fatal signal 5. [425642.839095] FS: 0000000002285fb0 GS: 0000000000000000 [425642.844095] CPU: 17 PID: 272544 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [425642.844097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [425642.844101] RIP: 0033:0x7fffffffe062 [425642.873135] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [425642.892694] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [425642.898166] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [425642.906890] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [425642.914249] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [425642.921680] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [425642.930446] R13: 000000000000003e R14: 000000c000182ea0 R15: 0000000000024850 [425642.939191] FS: 0000000002285fb0 GS: 0000000000000000 [425900.990989] potentially unexpected fatal signal 5. [425900.996049] CPU: 62 PID: 288822 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [425901.006470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [425901.015939] RIP: 0033:0x7fffffffe062 [425901.019757] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [425901.038772] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [425901.044335] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [425901.053068] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [425901.061902] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [425901.070655] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [425901.079406] R13: 0000000000000020 R14: 000000c0005811e0 R15: 0000000000028e97 [425901.088128] FS: 000000c000130890 GS: 0000000000000000 [426734.700547] exe[264332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9fc2db839 cs:33 sp:7eaec0f88858 ax:0 si:55f9fc334097 di:ffffffffff600000 [426734.834506] exe[263993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9fc2db839 cs:33 sp:7eaec0f88858 ax:0 si:55f9fc334097 di:ffffffffff600000 [426735.023655] exe[303766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9fc2db839 cs:33 sp:7eaec0f88858 ax:0 si:55f9fc334097 di:ffffffffff600000 [426762.704541] exe[303766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b173efd839 cs:33 sp:7ea8b0ffe858 ax:0 si:55b173f56097 di:ffffffffff600000 [426762.863825] exe[264332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b173efd839 cs:33 sp:7ea8b0ffe858 ax:0 si:55b173f56097 di:ffffffffff600000 [426763.006157] exe[295713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b173efd839 cs:33 sp:7ea8b0ffe858 ax:0 si:55b173f56097 di:ffffffffff600000 [426763.130763] exe[265593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b173efd839 cs:33 sp:7ea8b0ffe858 ax:0 si:55b173f56097 di:ffffffffff600000 [426763.252717] exe[283167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b173efd839 cs:33 sp:7ea8b0ffe858 ax:0 si:55b173f56097 di:ffffffffff600000 [426763.344793] exe[295713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b173efd839 cs:33 sp:7ea8b0ffe858 ax:0 si:55b173f56097 di:ffffffffff600000 [426763.453193] exe[295713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b173efd839 cs:33 sp:7ea8b0ffe858 ax:0 si:55b173f56097 di:ffffffffff600000 [426763.594733] exe[266026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b173efd839 cs:33 sp:7ea8b0ffe858 ax:0 si:55b173f56097 di:ffffffffff600000 [426763.714816] exe[254390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b173efd839 cs:33 sp:7ea8b0ffe858 ax:0 si:55b173f56097 di:ffffffffff600000 [426763.964847] exe[254346] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b173efd839 cs:33 sp:7ea8b0ffe858 ax:0 si:55b173f56097 di:ffffffffff600000 [426913.857849] warn_bad_vsyscall: 12 callbacks suppressed [426913.857853] exe[282742] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a254b4fb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2002000 [426914.009574] exe[283933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a254b4fb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2002000 [426914.012574] exe[274622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a254b4fb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2002000 [426914.015894] exe[276876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a254b4fb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2002000 [426914.016027] exe[269062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a254b4fb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2002000 [426914.016069] exe[327633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a254b4fb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2002000 [426914.017760] exe[292683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a254b4fb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2002000 [426914.018737] exe[327643] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a254b4fb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2002000 [426914.019840] exe[292538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a254b4fb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2002000 [426914.021520] exe[276920] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a254b4fb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2002000 [427030.318685] warn_bad_vsyscall: 25 callbacks suppressed [427030.318689] exe[323985] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592f69f8839 cs:33 sp:7efb61786858 ax:0 si:5592f6a51062 di:ffffffffff600000 [427034.901664] exe[313728] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dbb7585839 cs:33 sp:7eb14e883858 ax:0 si:55dbb75de062 di:ffffffffff600000 [427035.016268] exe[323839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6b5998839 cs:33 sp:7f2f2a4c6858 ax:0 si:55a6b59f1062 di:ffffffffff600000 [427178.263246] exe[216965] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ac8711839 cs:33 sp:7fb0b1665858 ax:0 si:561ac876a062 di:ffffffffff600000 [427182.109709] exe[291613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556cfe026839 cs:33 sp:7f841a947858 ax:0 si:556cfe07f062 di:ffffffffff600000 [427182.855476] exe[323127] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cab05be839 cs:33 sp:7f7b291b6858 ax:0 si:55cab0617062 di:ffffffffff600000 [427182.957175] exe[307616] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cab05be839 cs:33 sp:7f7b29195858 ax:0 si:55cab0617062 di:ffffffffff600000 [427183.063472] exe[322865] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cab05be839 cs:33 sp:7f7b29153858 ax:0 si:55cab0617062 di:ffffffffff600000 [427201.438666] exe[307199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7b707a839 cs:33 sp:7f786c08d858 ax:0 si:55a7b70d3062 di:ffffffffff600000 [427238.972713] exe[285500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d84056c839 cs:33 sp:7fa442fb6858 ax:0 si:55d8405c5062 di:ffffffffff600000 [427245.768597] exe[215598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f7780c0839 cs:33 sp:7f37ef6d3858 ax:0 si:55f778119062 di:ffffffffff600000 [427304.166113] exe[217849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bf5b1fc839 cs:33 sp:7eeafbba1858 ax:0 si:55bf5b255062 di:ffffffffff600000 [427320.515678] exe[313862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa42f36839 cs:33 sp:7f00d7bfe858 ax:0 si:55aa42f8f062 di:ffffffffff600000 [427337.753173] exe[296585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae007c4b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000000 [427337.850810] exe[291908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae007c4b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000000 [427337.892621] exe[254647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae007c4b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000000 [427338.024601] exe[295547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae007c4b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000000 [427483.419884] exe[315420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561903b0b839 cs:33 sp:7f5f361fe858 ax:0 si:561903b64062 di:ffffffffff600000 [427520.054276] exe[320205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb3a322839 cs:33 sp:7fb0b7064858 ax:0 si:55eb3a37b062 di:ffffffffff600000 [427580.353317] exe[304496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cab05be839 cs:33 sp:7f7b291b6858 ax:0 si:55cab0617062 di:ffffffffff600000 [427762.815713] exe[315709] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c82858e839 cs:33 sp:7ee341aa9858 ax:0 si:55c8285e7070 di:ffffffffff600000 [427762.879552] exe[339694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c82858e839 cs:33 sp:7ee341a88858 ax:0 si:55c8285e7070 di:ffffffffff600000 [427765.806430] exe[313905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c82858e839 cs:33 sp:7ee341a88858 ax:0 si:55c8285e7070 di:ffffffffff600000 [427915.731394] exe[266026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55808ce8b839 cs:33 sp:7ee8520ed858 ax:0 si:55808cee4062 di:ffffffffff600000 [427915.925753] exe[333161] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55808ce8b839 cs:33 sp:7ee8520ed858 ax:0 si:55808cee4062 di:ffffffffff600000 [427915.957851] exe[332040] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55808ce8b839 cs:33 sp:7ee8520ed858 ax:0 si:55808cee4062 di:ffffffffff600000 [427916.064737] exe[332037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55808ce8b839 cs:33 sp:7ee8520ed858 ax:0 si:55808cee4062 di:ffffffffff600000 [427916.067446] exe[332040] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55808ce8b839 cs:33 sp:7ee8520cc858 ax:0 si:55808cee4062 di:ffffffffff600000 [428034.110124] exe[256471] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571920ec839 cs:33 sp:7f86c1bd9858 ax:0 si:557192145062 di:ffffffffff600000 [428957.257004] potentially unexpected fatal signal 5. [428957.262052] CPU: 89 PID: 302571 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [428957.272469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [428957.281924] RIP: 0033:0x7fffffffe062 [428957.285693] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [428957.304719] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [428957.310147] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [428957.317487] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [428957.324927] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [428957.332307] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [428957.339712] R13: 000000000000000a R14: 000000c0001c1d40 R15: 000000000003d186 [428957.347089] FS: 0000000001fb4cd0 GS: 0000000000000000 [429013.976251] potentially unexpected fatal signal 5. [429013.981367] CPU: 21 PID: 307410 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [429013.991802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [429014.001264] RIP: 0033:0x7fffffffe062 [429014.005679] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [429014.024803] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [429014.031704] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [429014.040517] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [429014.049333] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [429014.058062] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [429014.066904] R13: 000000000000003e R14: 000000c000602340 R15: 000000000003e6d8 [429014.075745] FS: 000000c000130890 GS: 0000000000000000 [429014.274291] potentially unexpected fatal signal 5. [429014.279366] CPU: 33 PID: 267136 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [429014.291154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [429014.301983] RIP: 0033:0x7fffffffe062 [429014.307175] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [429014.327565] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [429014.334490] RAX: 000000000005b70f RBX: 0000000000000000 RCX: 00007fffffffe05a [429014.343236] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [429014.351976] RBP: 000000c00013de38 R08: 000000c00413f3c0 R09: 0000000000000000 [429014.360713] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [429014.368070] R13: 000000000000003e R14: 000000c000602340 R15: 000000000003e6d8 [429014.376835] FS: 000000c000130890 GS: 0000000000000000 [429246.572942] potentially unexpected fatal signal 5. [429246.578009] CPU: 34 PID: 391504 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [429246.588429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [429246.597878] RIP: 0033:0x7fffffffe062 [429246.601681] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [429246.620786] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [429246.626281] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [429246.633729] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [429246.641086] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [429246.649831] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [429246.658565] R13: 000000000000003e R14: 000000c000182b60 R15: 000000000004293e [429246.667308] FS: 000000c000130890 GS: 0000000000000000 [429246.807504] potentially unexpected fatal signal 5. [429246.813561] CPU: 22 PID: 391507 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [429246.825362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [429246.836171] RIP: 0033:0x7fffffffe062 [429246.839978] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [429246.859069] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [429246.864548] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [429246.872001] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [429246.879367] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [429246.886732] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [429246.894184] R13: 000000000000003e R14: 000000c000182b60 R15: 000000000004293e [429246.901560] FS: 000000c000130890 GS: 0000000000000000 [429512.468901] potentially unexpected fatal signal 5. [429512.473963] CPU: 13 PID: 405597 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [429512.484371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [429512.493905] RIP: 0033:0x7fffffffe062 [429512.497720] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [429512.516896] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [429512.523726] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [429512.531132] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [429512.539878] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [429512.547279] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [429512.551915] potentially unexpected fatal signal 5. [429512.554816] R13: 000000000000003e R14: 000000c00048eb60 R15: 00000000000469a0 [429512.559881] CPU: 47 PID: 333050 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [429512.567245] FS: 000000c000180090 GS: 0000000000000000 [429512.577649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [429512.577655] RIP: 0033:0x7fffffffe062 [429512.577658] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [429512.577660] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [429512.577661] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [429512.577662] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [429512.577663] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [429512.577664] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [429512.577664] R13: 000000000000003e R14: 000000c00048eb60 R15: 00000000000469a0 [429512.577665] FS: 000000c000180090 GS: 0000000000000000 [429769.432811] exe[414319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b68799839 cs:33 sp:7fa6d157f858 ax:0 si:559b687f2070 di:ffffffffff600000 [429769.549652] exe[416719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b68799839 cs:33 sp:7fa6d157f858 ax:0 si:559b687f2070 di:ffffffffff600000 [429769.699545] exe[410510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b68799839 cs:33 sp:7fa6d157f858 ax:0 si:559b687f2070 di:ffffffffff600000 [430951.043140] exe[438972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575d3b5f839 cs:33 sp:7efd3c065858 ax:0 si:5575d3bb8070 di:ffffffffff600000 [430951.922680] exe[439206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575d3b5f839 cs:33 sp:7efd3c065858 ax:0 si:5575d3bb8070 di:ffffffffff600000 [430952.811671] exe[390180] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575d3b5f839 cs:33 sp:7efd3c065858 ax:0 si:5575d3bb8070 di:ffffffffff600000 [430952.812044] exe[390161] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575d3b5f839 cs:33 sp:7efd3c044858 ax:0 si:5575d3bb8070 di:ffffffffff600000 [430953.512457] exe[429330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1d627d839 cs:33 sp:7ec980ea5858 ax:0 si:55e1d62d6097 di:ffffffffff600000 [430953.741506] exe[402888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1d627d839 cs:33 sp:7ec980e84858 ax:0 si:55e1d62d6097 di:ffffffffff600000 [430953.749696] exe[427511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1d627d839 cs:33 sp:7ec980e63858 ax:0 si:55e1d62d6097 di:ffffffffff600000 [430954.638372] exe[429330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1d627d839 cs:33 sp:7ec980ec6858 ax:0 si:55e1d62d6097 di:ffffffffff600000 [431345.040712] exe[453048] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a21fdfe839 cs:33 sp:7fb72be2d858 ax:0 si:55a21fe57062 di:ffffffffff600000 [431345.134462] exe[453623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a21fdfe839 cs:33 sp:7fb72b9fe858 ax:0 si:55a21fe57062 di:ffffffffff600000 [431345.274246] exe[453048] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a21fdfe839 cs:33 sp:7fb72be2d858 ax:0 si:55a21fe57062 di:ffffffffff600000 [432477.018382] exe[478802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed4ae48839 cs:33 sp:7ebee69f1858 ax:0 si:55ed4aea1062 di:ffffffffff600000 [432477.180150] exe[476225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed4ae48839 cs:33 sp:7ebee69d0858 ax:0 si:55ed4aea1062 di:ffffffffff600000 [432477.268057] exe[480158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed4ae48839 cs:33 sp:7ebee69f1858 ax:0 si:55ed4aea1062 di:ffffffffff600000 [432477.290527] exe[476067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed4ae48839 cs:33 sp:7ebee69f1858 ax:0 si:55ed4aea1062 di:ffffffffff600000 [432568.125696] potentially unexpected fatal signal 5. [432568.130733] CPU: 69 PID: 448604 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [432568.141393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [432568.150829] RIP: 0033:0x7fffffffe062 [432568.154610] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [432568.173694] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [432568.179119] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [432568.186476] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [432568.193910] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [432568.201330] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [432568.208686] R13: 000000000000000e R14: 000000c0001b1a00 R15: 000000000005a8bc [432568.216107] FS: 000000c000180090 GS: 0000000000000000 [432606.542301] potentially unexpected fatal signal 5. [432606.547366] CPU: 56 PID: 481087 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [432606.557766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [432606.567216] RIP: 0033:0x7fffffffe062 [432606.571127] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [432606.590110] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [432606.595543] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [432606.604285] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [432606.611721] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [432606.619080] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [432606.626436] R13: 000000000000000c R14: 000000c000007860 R15: 000000000005b316 [432606.635205] FS: 000000c00027b890 GS: 0000000000000000 [432624.584814] potentially unexpected fatal signal 5. [432624.589846] CPU: 67 PID: 486711 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [432624.600277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [432624.609705] RIP: 0033:0x7fffffffe062 [432624.613676] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [432624.632753] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [432624.638190] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [432624.645527] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [432624.652977] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [432624.660357] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [432624.667741] R13: 000000000000003e R14: 000000c0001d5040 R15: 000000000005ba7d [432624.676476] FS: 000000c0002d2890 GS: 0000000000000000 [432625.249112] potentially unexpected fatal signal 5. [432625.254139] CPU: 65 PID: 435298 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [432625.264535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [432625.273994] RIP: 0033:0x7fffffffe062 [432625.277789] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [432625.296790] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [432625.302394] RAX: 0000000000076d3c RBX: 0000000000000000 RCX: 00007fffffffe05a [432625.309803] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [432625.317141] RBP: 000000c00018fe38 R08: 000000c00972e970 R09: 0000000000000000 [432625.324540] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [432625.331914] R13: 000000000000003e R14: 000000c0001d5040 R15: 000000000005ba7d [432625.339262] FS: 000000c0002d2890 GS: 0000000000000000 [432625.596725] potentially unexpected fatal signal 5. [432625.601755] CPU: 67 PID: 486699 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [432625.612155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [432625.621591] RIP: 0033:0x7fffffffe062 [432625.625389] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [432625.644364] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [432625.649799] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [432625.657237] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [432625.664582] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [432625.671929] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [432625.679293] R13: 000000000000003e R14: 000000c0001d5040 R15: 000000000005ba7d [432625.688021] FS: 000000c0002d2890 GS: 0000000000000000 [432625.697764] potentially unexpected fatal signal 5. [432625.704009] CPU: 58 PID: 486695 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [432625.714423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [432625.723873] RIP: 0033:0x7fffffffe062 [432625.727656] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [432625.746650] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [432625.747791] potentially unexpected fatal signal 5. [432625.753482] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [432625.758495] CPU: 68 PID: 382554 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [432625.765842] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [432625.765844] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [432625.765845] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [432625.765846] R13: 000000000000003e R14: 000000c0001d5040 R15: 000000000005ba7d [432625.765846] FS: 000000c0002d2890 GS: 0000000000000000 [432625.811082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [432625.820539] RIP: 0033:0x7fffffffe062 [432625.825737] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [432625.844726] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [432625.851555] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [432625.860375] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [432625.869098] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [432625.876435] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [432625.885332] R13: 000000000000003e R14: 000000c0001d5040 R15: 000000000005ba7d [432625.892678] FS: 000000c0002d2890 GS: 0000000000000000 [432626.034604] potentially unexpected fatal signal 5. [432626.039674] CPU: 0 PID: 382661 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [432626.049998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [432626.060888] RIP: 0033:0x7fffffffe062 [432626.064688] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [432626.084198] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [432626.089628] RAX: 0000000000076d48 RBX: 0000000000000000 RCX: 00007fffffffe05a [432626.097067] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [432626.105779] RBP: 000000c00013de38 R08: 000000c0009bf4b0 R09: 0000000000000000 [432626.113132] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [432626.120473] R13: 000000000000003e R14: 000000c000006ea0 R15: 000000000005baab [432626.127824] FS: 000000c000180090 GS: 0000000000000000 [432626.130860] potentially unexpected fatal signal 5. [432626.138269] CPU: 55 PID: 432469 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [432626.148652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [432626.149328] potentially unexpected fatal signal 5. [432626.156375] potentially unexpected fatal signal 5. [432626.156379] CPU: 2 PID: 458820 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [432626.156380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [432626.156384] RIP: 0033:0x7fffffffe062 [432626.156387] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [432626.156388] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [432626.156389] RAX: 0000000000076d53 RBX: 0000000000000000 RCX: 00007fffffffe05a [432626.156390] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [432626.156390] RBP: 000000c00013de38 R08: 000000c006a60a60 R09: 0000000000000000 [432626.156391] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [432626.156392] R13: 000000000000003e R14: 000000c000006ea0 R15: 000000000005baab [432626.156392] FS: 000000c000180090 GS: 0000000000000000 [432626.158144] RIP: 0033:0x7fffffffe062 [432626.163096] CPU: 7 PID: 486719 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [432626.163098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [432626.163099] RIP: 0033:0x7fffffffe062 [432626.163103] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [432626.168101] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [432626.178425] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [432626.187952] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [432626.191737] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [432626.191738] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [432626.191739] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [432626.191739] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [432626.191740] R13: 000000000000003e R14: 000000c000006ea0 R15: 000000000005baab [432626.191741] FS: 000000c000180090 GS: 0000000000000000 [432626.225849] potentially unexpected fatal signal 5. [432626.232664] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [432626.232664] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [432626.232667] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [432626.240020] CPU: 54 PID: 418152 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [432626.240022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [432626.240024] RIP: 0033:0x7fffffffe062 [432626.240026] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [432626.240027] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [432626.240028] RAX: 0000000000076d55 RBX: 0000000000000000 RCX: 00007fffffffe05a [432626.240029] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [432626.240029] RBP: 000000c00013de38 R08: 000000c00b225c30 R09: 0000000000000000 [432626.240030] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [432626.240030] R13: 000000000000003e R14: 000000c000006ea0 R15: 000000000005baab [432626.240031] FS: 000000c000180090 GS: 0000000000000000 [432626.502538] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [432626.509901] R13: 000000000000003e R14: 000000c000006ea0 R15: 000000000005baab [432626.517257] FS: 000000c000180090 GS: 0000000000000000 [432626.687052] potentially unexpected fatal signal 5. [432626.693381] CPU: 1 PID: 486720 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [432626.693988] potentially unexpected fatal signal 5. [432626.703733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [432626.710136] CPU: 63 PID: 486733 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [432626.710138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [432626.710146] RIP: 0033:0x7fffffffe062 [432626.719588] RIP: 0033:0x7fffffffe062 [432626.719592] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [432626.719593] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [432626.719595] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [432626.719596] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [432626.719597] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [432626.719598] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [432626.719598] R13: 000000000000003e R14: 000000c000006ea0 R15: 000000000005baab [432626.719599] FS: 000000c000180090 GS: 0000000000000000 [432626.758055] potentially unexpected fatal signal 5. [432626.766105] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [432626.766110] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [432626.772923] CPU: 64 PID: 441162 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [432626.772925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [432626.772931] RIP: 0033:0x7fffffffe062 [432626.772934] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [432626.772935] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [432626.772937] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [432626.772938] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [432626.772939] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [432626.772940] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [432626.772940] R13: 000000000000003e R14: 000000c000006ea0 R15: 000000000005baab [432626.772941] FS: 000000c000180090 GS: 0000000000000000 [432626.945414] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [432626.954146] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [432626.962904] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [432626.971715] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [432626.979150] R13: 000000000000003e R14: 000000c000006ea0 R15: 000000000005baab [432626.986573] FS: 000000c000180090 GS: 0000000000000000 [432675.074514] potentially unexpected fatal signal 5. [432675.079550] CPU: 49 PID: 383070 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [432675.090242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [432675.099685] RIP: 0033:0x7fffffffe062 [432675.103466] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [432675.122762] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [432675.128213] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [432675.135552] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [432675.142904] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [432675.151649] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [432675.159020] R13: 000000000000003e R14: 000000c00049e680 R15: 000000000005ce34 [432675.166371] FS: 000000c000518090 GS: 0000000000000000 [432858.605679] potentially unexpected fatal signal 5. [432858.610718] CPU: 63 PID: 480453 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [432858.621323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [432858.630799] RIP: 0033:0x7fffffffe062 [432858.634686] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [432858.655131] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [432858.660603] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [432858.669373] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [432858.678073] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [432858.686834] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [432858.695551] R13: 000000000000003e R14: 000000c000502820 R15: 000000000005fb24 [432858.702931] FS: 000000c000130490 GS: 0000000000000000 [433057.831502] potentially unexpected fatal signal 5. [433057.836555] CPU: 82 PID: 449915 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [433057.846961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [433057.856415] RIP: 0033:0x7fffffffe062 [433057.860197] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [433057.879222] RSP: 002b:000000c0006cdcb0 EFLAGS: 00000297 [433057.884732] RAX: 000000000007ca64 RBX: 0000000000000000 RCX: 00007fffffffe05a [433057.893453] RDX: 0000000000000000 RSI: 000000c0006ce000 RDI: 0000000000012f00 [433057.900819] RBP: 000000c0006cdd40 R08: 000000c00dd4e100 R09: 0000000000000000 [433057.909561] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0006cdbd8 [433057.918394] R13: 000000c000180000 R14: 000000c000007d40 R15: 0000000000061f1c [433057.927146] FS: 00007fc332ffd6c0 GS: 0000000000000000 [433135.145995] exe[514992] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a206ba640a cs:33 sp:7f863990bee8 ax:12 si:ffffffffff600000 di:55a206c12ff2 [433136.009388] exe[494155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a206ba640a cs:33 sp:7f86398eaee8 ax:12 si:ffffffffff600000 di:55a206c12ff2 [433136.012892] exe[492758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a206ba640a cs:33 sp:7f863990bee8 ax:12 si:ffffffffff600000 di:55a206c12ff2 [433136.857311] exe[493305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a206ba640a cs:33 sp:7f86398eaee8 ax:12 si:ffffffffff600000 di:55a206c12ff2 [433136.857629] exe[514911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a206ba640a cs:33 sp:7f863990bee8 ax:12 si:ffffffffff600000 di:55a206c12ff2 [435323.090900] exe[520460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b62c5dd40a cs:33 sp:7fd299996ee8 ax:12 si:ffffffffff600000 di:55b62c649ff2 [435323.139932] exe[520460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b62c5dd40a cs:33 sp:7fd299996ee8 ax:12 si:ffffffffff600000 di:55b62c649ff2 [436180.666005] exe[536282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cbdc5f839 cs:33 sp:7f96e6c8a858 ax:0 si:564cbdcb8062 di:ffffffffff600000 [436236.351665] potentially unexpected fatal signal 5. [436236.356814] CPU: 93 PID: 577859 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [436236.367241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [436236.376698] RIP: 0033:0x7fffffffe062 [436236.380480] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [436236.399468] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [436236.404919] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [436236.412277] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [436236.419645] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [436236.426996] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [436236.434514] R13: 000000000000003e R14: 000000c000169a00 R15: 0000000000077017 [436236.441885] FS: 000000c000180090 GS: 0000000000000000 [436236.510516] potentially unexpected fatal signal 5. [436236.516892] CPU: 10 PID: 577864 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [436236.528714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [436236.539536] RIP: 0033:0x7fffffffe062 [436236.544736] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [436236.565126] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [436236.570579] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [436236.577953] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [436236.585424] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [436236.594376] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [436236.603102] R13: 000000000000003e R14: 000000c000169a00 R15: 0000000000077017 [436236.611849] FS: 000000c000180090 GS: 0000000000000000 [436236.724103] potentially unexpected fatal signal 5. [436236.729940] CPU: 50 PID: 489478 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [436236.740538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [436236.750006] RIP: 0033:0x7fffffffe062 [436236.753913] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [436236.773157] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [436236.778731] RAX: 000000000008d15f RBX: 0000000000000000 RCX: 00007fffffffe05a [436236.786190] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [436236.793603] RBP: 000000c00013de38 R08: 000000c002100970 R09: 0000000000000000 [436236.802339] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [436236.809695] R13: 000000000000003e R14: 000000c000166680 R15: 000000000007701c [436236.817063] FS: 000000c000130490 GS: 0000000000000000 [436286.483660] potentially unexpected fatal signal 5. [436286.488773] CPU: 65 PID: 491883 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [436286.499184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [436286.508658] RIP: 0033:0x7fffffffe062 [436286.512445] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [436286.531539] RSP: 002b:000000c00043fd98 EFLAGS: 00000297 [436286.537121] RAX: 000000000008e4b3 RBX: 0000000000000000 RCX: 00007fffffffe05a [436286.544493] RDX: 0000000000000000 RSI: 000000c000440000 RDI: 0000000000012f00 [436286.551886] RBP: 000000c00043fe38 R08: 000000c0009f64c0 R09: 0000000000000000 [436286.560734] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00043fe20 [436286.569460] R13: 000000000000003e R14: 000000c00041da00 R15: 0000000000078060 [436286.576938] FS: 0000000002285fb0 GS: 0000000000000000 [436475.096689] potentially unexpected fatal signal 5. [436475.101823] CPU: 6 PID: 500314 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [436475.112163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [436475.121795] RIP: 0033:0x7fffffffe062 [436475.125644] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [436475.146288] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [436475.153123] RAX: 0000000000091b5b RBX: 0000000000000000 RCX: 00007fffffffe05a [436475.161959] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [436475.170683] RBP: 000000c00018fe38 R08: 000000c000690880 R09: 0000000000000000 [436475.173155] potentially unexpected fatal signal 5. [436475.179546] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [436475.184596] CPU: 2 PID: 506284 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [436475.184598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [436475.184604] RIP: 0033:0x7fffffffe062 [436475.184609] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [436475.193414] R13: 000000000000003e R14: 000000c0001661a0 R15: 000000000007a180 [436475.193416] FS: 0000000002285fb0 GS: 0000000000000000 [436475.253072] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [436475.259915] RAX: 0000000000091b59 RBX: 0000000000000000 RCX: 00007fffffffe05a [436475.268749] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [436475.277522] RBP: 000000c00018fe38 R08: 000000c000bac970 R09: 0000000000000000 [436475.286495] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [436475.295220] R13: 000000000000003e R14: 000000c0001661a0 R15: 000000000007a180 [436475.303956] FS: 0000000002285fb0 GS: 0000000000000000 [436574.848300] exe[584933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5590e32e240a cs:33 sp:7edb77fbbee8 ax:12 si:ffffffffff600000 di:5590e334eff2 [436574.894314] exe[584933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5590e32e240a cs:33 sp:7edb77fbbee8 ax:12 si:ffffffffff600000 di:5590e334eff2 [436574.942753] exe[584933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5590e32e240a cs:33 sp:7edb77fbbee8 ax:12 si:ffffffffff600000 di:5590e334eff2 [438318.866573] exe[619633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b148deb839 cs:33 sp:7fcc8ed09ee8 ax:0 si:20001080 di:ffffffffff600000 [438318.993169] exe[617697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b148deb839 cs:33 sp:7fcc8ed09ee8 ax:0 si:20001080 di:ffffffffff600000 [438319.134114] exe[615829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b148deb839 cs:33 sp:7fcc8ed09ee8 ax:0 si:20001080 di:ffffffffff600000 [440249.260274] exe[608774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a956006839 cs:33 sp:7fafcc120858 ax:0 si:55a95605f097 di:ffffffffff600000 [440250.092997] exe[608783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a956006839 cs:33 sp:7fafcc120858 ax:0 si:55a95605f097 di:ffffffffff600000 [440250.186059] exe[613069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a956006839 cs:33 sp:7fafcc120858 ax:0 si:55a95605f097 di:ffffffffff600000 [440795.950221] exe[710117] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fd256f40a cs:33 sp:7feceb599ee8 ax:12 si:ffffffffff600000 di:559fd25dbff2 [440796.045805] exe[681605] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fd256f40a cs:33 sp:7feceb578ee8 ax:12 si:ffffffffff600000 di:559fd25dbff2 [440798.978618] exe[678391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fd256f40a cs:33 sp:7feceb557ee8 ax:12 si:ffffffffff600000 di:559fd25dbff2 [440798.999127] exe[689801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fd256f40a cs:33 sp:7feceb557ee8 ax:12 si:ffffffffff600000 di:559fd25dbff2 [440799.021524] exe[689801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fd256f40a cs:33 sp:7feceb557ee8 ax:12 si:ffffffffff600000 di:559fd25dbff2 [440799.041583] exe[689801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fd256f40a cs:33 sp:7feceb557ee8 ax:12 si:ffffffffff600000 di:559fd25dbff2 [440799.062164] exe[689801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fd256f40a cs:33 sp:7feceb557ee8 ax:12 si:ffffffffff600000 di:559fd25dbff2 [440799.083223] exe[689801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fd256f40a cs:33 sp:7feceb557ee8 ax:12 si:ffffffffff600000 di:559fd25dbff2 [440799.103480] exe[689801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fd256f40a cs:33 sp:7feceb557ee8 ax:12 si:ffffffffff600000 di:559fd25dbff2 [440799.124325] exe[689801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fd256f40a cs:33 sp:7feceb557ee8 ax:12 si:ffffffffff600000 di:559fd25dbff2 [441672.597131] warn_bad_vsyscall: 57 callbacks suppressed [441672.597134] exe[730130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b98c62240a cs:33 sp:7f35708d0ee8 ax:12 si:ffffffffff600000 di:55b98c68eff2 [441672.688297] exe[732253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b98c62240a cs:33 sp:7f35708d0ee8 ax:12 si:ffffffffff600000 di:55b98c68eff2 [441672.786581] exe[732257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b98c62240a cs:33 sp:7f35708afee8 ax:12 si:ffffffffff600000 di:55b98c68eff2 [442184.946063] exe[734766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b36baa839 cs:33 sp:7fecc4159858 ax:0 si:555b36c03097 di:ffffffffff600000 [442185.017311] exe[734756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b36baa839 cs:33 sp:7fecc4138858 ax:0 si:555b36c03097 di:ffffffffff600000 [442185.095619] exe[734766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b36baa839 cs:33 sp:7fecc4159858 ax:0 si:555b36c03097 di:ffffffffff600000 [442185.129899] exe[734756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b36baa839 cs:33 sp:7fecc4117858 ax:0 si:555b36c03097 di:ffffffffff600000 [443400.229418] potentially unexpected fatal signal 5. [443400.234468] CPU: 23 PID: 759334 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [443400.245075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [443400.254575] RIP: 0033:0x7fffffffe062 [443400.258432] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [443400.279078] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [443400.285951] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [443400.294735] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [443400.303504] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [443400.312240] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [443400.320970] R13: 0000000000000026 R14: 000000c0003801a0 R15: 00000000000a13aa [443400.328341] FS: 0000000001fb4cd0 GS: 0000000000000000 [443400.432946] potentially unexpected fatal signal 5. [443400.439257] CPU: 74 PID: 759326 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [443400.449679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [443400.460538] RIP: 0033:0x7fffffffe062 [443400.465675] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [443400.484684] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [443400.490145] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [443400.497511] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [443400.506252] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [443400.513637] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [443400.522344] R13: 0000000000000034 R14: 000000c0001836c0 R15: 00000000000a13a7 [443400.529706] FS: 000000c000130890 GS: 0000000000000000 [443400.763325] potentially unexpected fatal signal 5. [443400.768369] CPU: 87 PID: 703897 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [443400.778770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [443400.788231] RIP: 0033:0x7fffffffe062 [443400.792219] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [443400.811284] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [443400.818218] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [443400.826958] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [443400.834302] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [443400.841648] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [443400.850379] R13: 0000000000000034 R14: 000000c0001836c0 R15: 00000000000a13a7 [443400.857733] FS: 000000c000130890 GS: 0000000000000000 [443508.341687] potentially unexpected fatal signal 5. [443508.346744] CPU: 74 PID: 767026 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [443508.357146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [443508.366714] RIP: 0033:0x7fffffffe062 [443508.370618] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [443508.389913] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [443508.395417] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [443508.402818] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [443508.410200] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [443508.417588] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [443508.424975] R13: 000000000000003e R14: 000000c0005d24e0 R15: 00000000000a3d7e [443508.432369] FS: 0000000002285fb0 GS: 0000000000000000 [443509.030298] potentially unexpected fatal signal 5. [443509.035334] CPU: 0 PID: 672476 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [443509.045733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [443509.055319] RIP: 0033:0x7fffffffe062 [443509.059128] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [443509.078141] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [443509.084968] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [443509.092345] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [443509.101077] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [443509.108432] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [443509.111853] potentially unexpected fatal signal 5. [443509.117189] R13: 000000000000000a R14: 000000c000183d40 R15: 00000000000a3d99 [443509.123623] CPU: 23 PID: 767022 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [443509.123626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [443509.123634] RIP: 0033:0x7fffffffe062 [443509.130990] FS: 000000c000130890 GS: 0000000000000000 [443509.160074] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [443509.179096] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [443509.185907] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [443509.194762] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [443509.202133] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [443509.210863] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [443509.219596] R13: 000000000000000a R14: 000000c000183d40 R15: 00000000000a3d99 [443509.228434] FS: 000000c000130890 GS: 0000000000000000 [443961.889838] exe[775719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bb1aa3839 cs:33 sp:7efcb2137858 ax:0 si:555bb1afc097 di:ffffffffff600000 [443961.976695] exe[779616] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bb1aa3839 cs:33 sp:7efcb2116858 ax:0 si:555bb1afc097 di:ffffffffff600000 [443962.035724] exe[779595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bb1aa3839 cs:33 sp:7efcb2137858 ax:0 si:555bb1afc097 di:ffffffffff600000 [444256.919615] potentially unexpected fatal signal 5. [444256.924663] CPU: 46 PID: 817398 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [444256.935106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [444256.944577] RIP: 0033:0x7fffffffe062 [444256.948381] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [444256.967619] RSP: 002b:000000c00054dcb0 EFLAGS: 00000297 [444256.973139] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [444256.980515] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [444256.989283] RBP: 000000c00054dd40 R08: 0000000000000000 R09: 0000000000000000 [444256.996674] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00054dbd8 [444257.005434] R13: 000000c000180000 R14: 000000c0004dc4e0 R15: 00000000000c719a [444257.012809] FS: 00007fcceb7fe6c0 GS: 0000000000000000 [444595.745904] potentially unexpected fatal signal 5. [444595.750970] CPU: 76 PID: 831611 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [444595.761388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [444595.770867] RIP: 0033:0x7fffffffe062 [444595.774773] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [444595.795171] RSP: 002b:000000c000837cb0 EFLAGS: 00000297 [444595.802046] RAX: 00007f27e009e000 RBX: 0000000000000000 RCX: 00007fffffffe05a [444595.810814] RDX: 0000000000000001 RSI: 0000000000002000 RDI: 00007f27e009e000 [444595.819555] RBP: 000000c000837d40 R08: 0000000000000009 R09: 0000000001578000 [444595.828304] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c000837bf8 [444595.837045] R13: 0000000002a21960 R14: 000000c0004d0340 R15: 00000000000c7276 [444595.845799] FS: 00000000053823c0 GS: 0000000000000000 [444732.645294] potentially unexpected fatal signal 11. [444732.650583] CPU: 77 PID: 832214 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [444732.661031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [444732.670484] RIP: 0033:0x562b0e355970 [444732.674278] Code: ff f7 d8 64 89 02 48 c7 c0 ff ff ff ff c3 0f 1f 40 00 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 <48> 8b 05 61 f6 0f 00 48 85 c0 74 01 c3 50 48 8d 0d fb 22 07 00 ba [444732.693332] RSP: 002b:00007ff4ed80c2f8 EFLAGS: 00010202 [444732.698938] RAX: 0000000000000000 RBX: 00007ff4ed80c470 RCX: 0000562b0e355b29 [444732.706302] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007ff4ed80c470 [444732.715060] RBP: 0000000000000000 R08: 0000562b0e474f8c R09: 0000562b0e474f8c [444732.722542] R10: 00007fd39fe00030 R11: 0000000000000246 R12: 0000562b0e474f80 [444732.731262] R13: 00007ff4ed80c470 R14: 0000562b0e474f80 R15: 0000562b0e30c940 [444732.738643] FS: 0000562b0efa5480 GS: 0000000000000000 [445837.017480] exe[904887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647d594f4b1 cs:33 sp:7eaaa2ffc568 ax:8 si:1 di:7eaaa2ffc660 [445837.914283] exe[904897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647d594f4b1 cs:33 sp:7eaaa2ffc568 ax:8 si:1 di:7eaaa2ffc660 [445838.742026] exe[839689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647d594f4b1 cs:33 sp:7eaaa2f99568 ax:8 si:1 di:7eaaa2f99660 [446097.384826] potentially unexpected fatal signal 5. [446097.389891] CPU: 27 PID: 911005 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [446097.400357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [446097.409929] RIP: 0033:0x7fffffffe062 [446097.413766] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [446097.432797] RSP: 002b:000000c0001d3cb0 EFLAGS: 00000297 [446097.439665] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [446097.448459] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [446097.457221] RBP: 000000c0001d3d40 R08: 0000000000000000 R09: 0000000000000000 [446097.465987] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0001d3bd8 [446097.474758] R13: 0000000002856ce0 R14: 000000c000512340 R15: 00000000000ddfb6 [446097.483589] FS: 00000000056203c0 GS: 0000000000000000 [446102.864962] potentially unexpected fatal signal 5. [446102.870023] CPU: 75 PID: 873594 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [446102.880950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [446102.890405] RIP: 0033:0x7fffffffe062 [446102.894198] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [446102.913337] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [446102.918843] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [446102.926235] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [446102.933595] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [446102.942353] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [446102.951103] R13: 000000000000000c R14: 000000c000177a00 R15: 00000000000d0e23 [446102.959851] FS: 000000c00027b090 GS: 0000000000000000 [446109.339920] potentially unexpected fatal signal 5. [446109.345080] CPU: 87 PID: 910959 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [446109.355477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [446109.365016] RIP: 0033:0x7fffffffe062 [446109.368830] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [446109.387877] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [446109.393343] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [446109.402100] RDX: 0000000000000007 RSI: 0000000000b36000 RDI: 0000000020000000 [446109.410865] RBP: 000000c00013de38 R08: 0000000000000009 R09: 0000000011000000 [446109.419631] R10: 0000000000008011 R11: 0000000000000206 R12: 000000c00013de20 [446109.428397] R13: 0000000000000004 R14: 000000c0004a0ea0 R15: 00000000000de43d [446109.437145] FS: 000000c000130490 GS: 0000000000000000 [446134.925672] potentially unexpected fatal signal 5. [446134.930797] CPU: 89 PID: 915118 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [446134.941434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [446134.950910] RIP: 0033:0x7fffffffe062 [446134.954753] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [446134.973899] RSP: 002b:000000c000547cb0 EFLAGS: 00000297 [446134.980769] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [446134.989549] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [446134.998335] RBP: 000000c000547d40 R08: 0000000000000000 R09: 0000000000000000 [446135.007089] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000547bd8 [446135.015858] R13: 000000c000138c00 R14: 000000c0004d9040 R15: 00000000000deee1 [446135.024637] FS: 00007fa7eb7fe6c0 GS: 0000000000000000 [446152.978861] exe[849193] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56343e9c2839 cs:33 sp:7fb706250858 ax:0 si:56343ea1b070 di:ffffffffff600000 [446153.160826] exe[851508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56343e9c2839 cs:33 sp:7fb706250858 ax:0 si:56343ea1b070 di:ffffffffff600000 [446153.381363] exe[850623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56343e9c2839 cs:33 sp:7fb706250858 ax:0 si:56343ea1b070 di:ffffffffff600000 [446244.240841] exe[829886] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d6c809839 cs:33 sp:7f62cd776858 ax:0 si:560d6c862062 di:ffffffffff600000 [446244.334871] exe[918491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d6c809839 cs:33 sp:7f62cd776858 ax:0 si:560d6c862062 di:ffffffffff600000 [446244.335358] exe[918674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d6c809839 cs:33 sp:7f62cd755858 ax:0 si:560d6c862062 di:ffffffffff600000 [446244.449082] exe[919162] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d6c809839 cs:33 sp:7f62cd776858 ax:0 si:560d6c862062 di:ffffffffff600000 [446467.201237] potentially unexpected fatal signal 5. [446467.206307] CPU: 79 PID: 926903 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [446467.216748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [446467.226309] RIP: 0033:0x7fffffffe062 [446467.230089] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [446467.249442] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [446467.254926] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [446467.262290] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [446467.269656] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [446467.277003] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [446467.285742] R13: 000000000000003e R14: 000000c00048e820 R15: 00000000000cb5b4 [446467.293111] FS: 000000c000130490 GS: 0000000000000000 [446502.438525] potentially unexpected fatal signal 5. [446502.443386] potentially unexpected fatal signal 5. [446502.443586] CPU: 69 PID: 913089 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [446502.448628] CPU: 37 PID: 928612 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [446502.448629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [446502.448634] RIP: 0033:0x7fffffffe062 [446502.448637] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [446502.448638] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [446502.448639] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [446502.448640] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [446502.448640] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [446502.448641] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [446502.448641] R13: 0000000000000008 R14: 000000c000182680 R15: 00000000000dee7b [446502.448642] FS: 000000c000180090 GS: 0000000000000000 [446502.470840] potentially unexpected fatal signal 5. [446502.478938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [446502.478946] RIP: 0033:0x7fffffffe062 [446502.482805] CPU: 25 PID: 917134 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [446502.482807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [446502.482811] RIP: 0033:0x7fffffffe062 [446502.482813] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [446502.482814] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [446502.482816] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [446502.482817] RDX: 0000000000000007 RSI: 0000000000b36000 RDI: 0000000020000000 [446502.482818] RBP: 000000c00013de38 R08: 0000000000000009 R09: 0000000020800000 [446502.482822] R10: 0000000000008011 R11: 0000000000000206 R12: 000000c00013de20 [446502.501944] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [446502.501945] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [446502.501947] RAX: 00000000000e2b66 RBX: 0000000000000000 RCX: 00007fffffffe05a [446502.501948] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [446502.501949] RBP: 000000c00013de38 R08: 000000c0001f8010 R09: 0000000000000000 [446502.501949] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [446502.501950] R13: 0000000000000008 R14: 000000c000182680 R15: 00000000000dee7b [446502.501951] FS: 000000c000180090 GS: 0000000000000000 [446502.728241] R13: 0000000000000008 R14: 000000c000182680 R15: 00000000000dee7b [446502.737039] FS: 000000c000180090 GS: 0000000000000000 [446620.073483] potentially unexpected fatal signal 5. [446620.078517] CPU: 7 PID: 939274 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [446620.088829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [446620.098303] RIP: 0033:0x7fffffffe062 [446620.102142] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [446620.121152] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [446620.127984] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [446620.135532] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [446620.142897] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [446620.150308] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [446620.157669] R13: 000000000000003e R14: 000000c0004644e0 R15: 00000000000ccc26 [446620.165126] FS: 000000c00048c090 GS: 0000000000000000 [446924.740291] exe[930883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564874645839 cs:33 sp:7ff49295b858 ax:0 si:56487469e070 di:ffffffffff600000 [446924.860321] exe[948567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564874645839 cs:33 sp:7ff49295b858 ax:0 si:56487469e070 di:ffffffffff600000 [446924.905854] exe[957009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564874645839 cs:33 sp:7ff49293a858 ax:0 si:56487469e070 di:ffffffffff600000 [446925.483925] exe[952217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564874645839 cs:33 sp:7ff49293a858 ax:0 si:56487469e070 di:ffffffffff600000 [447209.534873] raid6: avx2x4 gen() 26240 MB/s [447209.606854] raid6: avx2x4 xor() 4942 MB/s [447209.678855] raid6: avx2x2 gen() 26476 MB/s [447209.750861] raid6: avx2x2 xor() 21519 MB/s [447209.822855] raid6: avx2x1 gen() 17098 MB/s [447209.894854] raid6: avx2x1 xor() 17272 MB/s [447209.966863] raid6: sse2x4 gen() 15258 MB/s [447210.038858] raid6: sse2x4 xor() 3681 MB/s [447210.110864] raid6: sse2x2 gen() 5761 MB/s [447210.182858] raid6: sse2x2 xor() 11642 MB/s [447210.254868] raid6: sse2x1 gen() 1092 MB/s [447210.326859] raid6: sse2x1 xor() 7931 MB/s [447210.331384] raid6: using algorithm avx2x2 gen() 26476 MB/s [447210.337112] raid6: .... xor() 21519 MB/s, rmw enabled [447210.342411] raid6: using avx2x2 recovery algorithm [447210.371135] xor: automatically using best checksumming function avx [447210.837587] Btrfs loaded, crc32c=crc32c-intel [447210.879301] fuse: init (API version 7.32) [447213.222955] loop: module loaded [447213.249416] Non-volatile memory driver v1.3 [447213.289979] tun: Universal TUN/TAP device driver, 1.6 [447213.309344] VFIO - User Level meta-driver version: 0.3 [447213.372263] NET: Registered protocol family 40 [447213.864152] NET: Registered protocol family 38 [447213.986672] sctp: Hash tables configured (bind 16384/16384) [447214.157731] NET: Registered protocol family 43 [447214.222506] NET: Registered protocol family 15 [447214.502632] l2tp_core: L2TP core driver, V2.0 [447214.527232] l2tp_ip: L2TP IP encapsulation support (L2TPv3) [447214.561571] l2tp_ip6: L2TP IP encapsulation support for IPv6 (L2TPv3) [447219.052656] mmap: host.test (990868) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [447219.276955] host.test[990971] bad frame in rt_sigreturn frame:000000008e442c10 ip:ffffffffffffd8ef sp:ffffffffffffd8ef orax:ffffffffffffffff [447219.290132] potentially unexpected fatal signal 11. [447219.295276] CPU: 46 PID: 990971 Comm: host.test Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [447219.306303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [447219.317184] RIP: d8ef:0xffffffffffffd8ef [447219.322715] Code: Unable to access opcode bytes at RIP 0xffffffffffffd8c5. [447219.331218] RSP: ffff:ffffffffffffd8ef EFLAGS: 00050ac7 [447219.338067] RAX: 0000000000000000 RBX: 000000c00003800f RCX: ffffffffffffd8ef [447219.346831] RDX: 0000000000000002 RSI: 000000000000000e RDI: 0000000000b24eb7 [447219.355597] RBP: 0001000000000030 R08: 00000000004696fd R09: 00000000004847f6 [447219.364361] R10: 000000c00046fc50 R11: 000000c00046fcc8 R12: 000000000048481e [447219.373137] R13: 000000000047a8f8 R14: 0000000000a1fa00 R15: 000000c0001a2840 [447219.381925] FS: 00007f3b9f110740 GS: 0000000000000000 [447262.372007] potentially unexpected fatal signal 11. [447262.377133] CPU: 91 PID: 987050 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [447262.387647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [447262.397211] RIP: 0033:0x5612090c1078 [447262.401029] Code: ff 48 8d 3d ea 07 c5 00 e8 55 6a fd ff e9 1f ff ff ff 41 57 89 f1 49 89 d7 41 56 41 89 fe 41 55 41 54 55 53 31 db 48 83 ec 18 <48> 8b 3d e1 07 c5 00 48 8b 15 ea 07 c5 00 48 85 ff 0f 84 a1 01 00 [447262.420019] RSP: 002b:00007fe48713f3f0 EFLAGS: 00010206 [447262.427080] RAX: 0000000000000361 RBX: 0000000000000000 RCX: 0000000000000000 [447262.429855] potentially unexpected fatal signal 11. [447262.434470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002 [447262.439578] CPU: 90 PID: 988823 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [447262.439580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [447262.439585] RIP: 0033:0x5612090c0813 [447262.439587] Code: 00 00 00 00 00 48 c7 40 08 00 00 00 00 eb b8 0f 1f 84 00 00 00 00 00 48 83 05 58 0f c5 00 04 48 8b 05 d9 1a c5 00 66 0f ef c0 <48> c7 05 a2 27 10 00 00 00 00 00 4c 8d 0d fb 1a c5 00 0f 11 05 84 [447262.448353] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [447262.448354] R10: 0000561209d13750 R11: 0000000000000246 R12: 0000000000000361 [447262.448356] R13: ffffffffffffffb0 R14: 0000000000000002 R15: 0000000000000000 [447262.460103] RSP: 002b:00007fe48713f440 EFLAGS: 00010202 [447262.460105] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00005612090c0b8d [447262.460106] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 0000561209d13760 [447262.460106] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [447262.460107] R10: 0000561209d13750 R11: 0000000000000246 R12: 0000000000000000 [447262.460107] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000001 [447262.460108] FS: 0000561209d13480 GS: 0000000000000000 [447262.513990] potentially unexpected fatal signal 11. [447262.515955] FS: 0000561209d13480 GS: 0000000000000000 [447262.522876] CPU: 21 PID: 998573 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [447262.522878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [447262.522886] RIP: 0033:0x55abeb013d58 [447262.526430] potentially unexpected fatal signal 5. [447262.526437] CPU: 6 PID: 952933 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [447262.526439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [447262.526446] RIP: 0033:0x7fffffffe062 [447262.526449] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [447262.526451] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [447262.526454] RAX: 0000557635a00000 RBX: 0000000000000000 RCX: 00007fffffffe05a [447262.526455] RDX: 0000000000000003 RSI: 00000000000ee000 RDI: 0000557635a00000 [447262.526456] RBP: 000000c00018fe38 R08: 0000000000000009 R09: 00000000150b5000 [447262.526457] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00018fe20 [447262.526458] R13: 0000000000000030 R14: 000000c000182680 R15: 00000000000e3bac [447262.526460] FS: 0000000001fb4cd0 GS: 0000000000000000 [447262.674237] potentially unexpected fatal signal 11. [447262.680772] Code: 48 89 84 24 90 00 00 00 48 89 9c 24 98 00 00 00 4c 8b 35 3b 7c 16 00 4d 8d ae 00 00 40 00 4d 39 ec 0f 83 98 06 00 00 4c 89 eb <4d> 8b 2c 24 4d 8d 7c 24 08 4c 89 bc 24 08 01 00 00 49 83 fd ff 0f [447262.680776] RSP: 002b:00007f9c070e1310 EFLAGS: 00010287 [447262.688167] CPU: 53 PID: 999040 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [447262.695513] RAX: 00007f9c070e1418 RBX: 00007ff51a400000 RCX: 0000000000033c20 [447262.695514] RDX: 0000000000000000 RSI: 00007f9c070e12f0 RDI: 0000000000000000 [447262.695514] RBP: 0000000000000001 R08: 000000002d04a049 R09: 00000000000001aa [447262.695515] R10: 00039345fc6b308a R11: 00000000861c4b5b R12: 00007ff51a000000 [447262.695516] R13: 00007ff51a400000 R14: 00007ff51a000000 R15: 0000000000000000 [447262.695517] FS: 000055abebcaa480 GS: 0000000000000000 [447262.701054] potentially unexpected fatal signal 5. [447262.707520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [447262.726675] CPU: 18 PID: 941589 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [447262.726679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [447262.732137] RIP: 0033:0x55c39d6b4813 [447262.732142] Code: 00 00 00 00 00 48 c7 40 08 00 00 00 00 eb b8 0f 1f 84 00 00 00 00 00 48 83 05 58 0f c5 00 04 48 8b 05 d9 1a c5 00 66 0f ef c0 <48> c7 05 a2 27 10 00 00 00 00 00 4c 8d 0d fb 1a c5 00 0f 11 05 84 [447262.742557] RIP: 0033:0x7fffffffe062 [447262.742561] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [447262.742563] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [447262.742565] RAX: 000055562e795000 RBX: 0000000000000000 RCX: 00007fffffffe05a [447262.742565] RDX: 0000000000000001 RSI: 000000000006b000 RDI: 000055562e795000 [447262.742566] RBP: 000000c00013de38 R08: 0000000000000009 R09: 000000000fb04000 [447262.742567] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00013de20 [447262.742568] R13: 000000000000001c R14: 000000c0004d56c0 R15: 00000000000e3bb3 [447262.742571] FS: 000000c00050a090 GS: 0000000000000000 [447262.744303] RSP: 002b:00007f8407f61440 EFLAGS: 00010202 [447262.744319] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000055c39d6b4b8d [447262.744321] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 000055c39e307760 [447262.744322] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [447262.744323] R10: 000055c39e307750 R11: 0000000000000246 R12: 0000000000000000 [447262.744324] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [447262.744328] FS: 000055c39e307480 GS: 0000000000000000 [447262.815573] potentially unexpected fatal signal 5. [447262.979394] CPU: 57 PID: 965666 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [447262.991188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [447263.001992] RIP: 0033:0x7fffffffe062 [447263.005802] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [447263.026201] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [447263.033012] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [447263.041748] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [447263.049117] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [447263.056479] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [447263.063930] R13: 000000000000003e R14: 000000c000507380 R15: 00000000000e96af [447263.072661] FS: 000000c000130490 GS: 0000000000000000 [450810.370766] exe[132739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56322fc00839 cs:33 sp:7eb849143858 ax:0 si:56322fc59070 di:ffffffffff600000 [450810.788298] exe[209045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56322fc00839 cs:33 sp:7eb849143858 ax:0 si:56322fc59070 di:ffffffffff600000 [450810.833865] exe[132739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56322fc00839 cs:33 sp:7eb849143858 ax:0 si:56322fc59070 di:ffffffffff600000 [450811.551820] exe[126750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56322fc00839 cs:33 sp:7eb849143858 ax:0 si:56322fc59070 di:ffffffffff600000 [451421.394023] potentially unexpected fatal signal 5. [451421.399083] CPU: 7 PID: 171989 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [451421.409409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [451421.419001] RIP: 0033:0x7fffffffe062 [451421.422777] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [451421.441777] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [451421.447250] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [451421.456063] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [451421.464791] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [451421.473512] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [451421.482263] R13: 0000000000000004 R14: 000000c000502680 R15: 0000000000011855 [451421.489701] FS: 000000c000130890 GS: 0000000000000000 [451872.428246] potentially unexpected fatal signal 5. [451872.433405] CPU: 83 PID: 254341 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [451872.438954] potentially unexpected fatal signal 5. [451872.443823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [451872.448889] CPU: 24 PID: 254338 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [451872.458480] RIP: 0033:0x7fffffffe062 [451872.458484] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [451872.458485] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [451872.458486] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [451872.458486] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [451872.458487] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [451872.458487] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [451872.458488] R13: 0000000000000012 R14: 000000c000476d00 R15: 0000000000020690 [451872.458489] FS: 0000000001fb4cd0 GS: 0000000000000000 [451872.467799] potentially unexpected fatal signal 5. [451872.468934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [451872.472787] CPU: 71 PID: 254344 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [451872.472789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [451872.472795] RIP: 0033:0x7fffffffe062 [451872.472798] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [451872.472800] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [451872.472807] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [451872.472811] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [451872.491907] RIP: 0033:0x7fffffffe062 [451872.491911] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [451872.491912] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [451872.491914] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [451872.491915] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [451872.491915] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [451872.491916] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [451872.491917] R13: 0000000000000012 R14: 000000c000476d00 R15: 0000000000020690 [451872.491918] FS: 0000000001fb4cd0 GS: 0000000000000000 [451872.693068] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [451872.700439] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [451872.709159] R13: 0000000000000012 R14: 000000c000476d00 R15: 0000000000020690 [451872.716503] FS: 0000000001fb4cd0 GS: 0000000000000000 [451992.237265] exe[248899] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569345c2839 cs:33 sp:7f7b9e5fe858 ax:0 si:55693461b062 di:ffffffffff600000 [451992.819220] exe[242897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569345c2839 cs:33 sp:7f7b9e5fe858 ax:0 si:55693461b062 di:ffffffffff600000 [451992.907185] exe[248336] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569345c2839 cs:33 sp:7f7b9e5fe858 ax:0 si:55693461b062 di:ffffffffff600000 [451993.009548] exe[245150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569345c2839 cs:33 sp:7f7b9e5fe858 ax:0 si:55693461b062 di:ffffffffff600000 [452135.852813] potentially unexpected fatal signal 5. [452135.857851] CPU: 1 PID: 264150 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [452135.868602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [452135.878060] RIP: 0033:0x7fffffffe062 [452135.881839] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [452135.901089] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [452135.906732] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [452135.915555] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [452135.923031] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [452135.931863] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [452135.939213] R13: 0000000000000004 R14: 000000c0005024e0 R15: 0000000000026f0e [452135.947968] FS: 000000c000500090 GS: 0000000000000000 [452145.060527] potentially unexpected fatal signal 5. [452145.065568] CPU: 3 PID: 165666 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [452145.075975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [452145.085428] RIP: 0033:0x7fffffffe062 [452145.089216] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [452145.108217] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [452145.113707] RAX: 0000000000040875 RBX: 0000000000000000 RCX: 00007fffffffe05a [452145.122423] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [452145.131171] RBP: 000000c00013de38 R08: 000000c00099b0f0 R09: 0000000000000000 [452145.139920] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [452145.148650] R13: 0000000000000008 R14: 000000c0001a2820 R15: 00000000000275a2 [452145.157552] FS: 00000000022860f0 GS: 0000000000000000 [452145.171916] potentially unexpected fatal signal 5. [452145.177701] CPU: 11 PID: 264305 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [452145.189558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [452145.200346] RIP: 0033:0x7fffffffe062 [452145.205497] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [452145.225874] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [452145.232691] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [452145.241410] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [452145.250139] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [452145.258952] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [452145.267699] R13: 0000000000000008 R14: 000000c0001a2820 R15: 00000000000275a2 [452145.276452] FS: 00000000022860f0 GS: 0000000000000000 [453037.601104] exe[282764] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd7ab42839 cs:33 sp:7f3e0cd82858 ax:0 si:55fd7ab9b070 di:ffffffffff600000 [453037.697687] exe[292735] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd7ab42839 cs:33 sp:7f3e0cd82858 ax:0 si:55fd7ab9b070 di:ffffffffff600000 [453037.756862] exe[287473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed91155839 cs:33 sp:7fd41e18e858 ax:0 si:55ed911ae070 di:ffffffffff600000 [453037.798796] exe[293431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd7ab42839 cs:33 sp:7f3e0cd82858 ax:0 si:55fd7ab9b070 di:ffffffffff600000 [453037.860605] exe[292836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed91155839 cs:33 sp:7fd41e18e858 ax:0 si:55ed911ae070 di:ffffffffff600000 [453037.864873] exe[263852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab18d1e839 cs:33 sp:7fe135bde858 ax:0 si:55ab18d77070 di:ffffffffff600000 [453037.892096] exe[293367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd7ab42839 cs:33 sp:7f3e0cd82858 ax:0 si:55fd7ab9b070 di:ffffffffff600000 [453037.977929] exe[282764] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed91155839 cs:33 sp:7fd41e18e858 ax:0 si:55ed911ae070 di:ffffffffff600000 [453037.996932] exe[293424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab18d1e839 cs:33 sp:7fe135bde858 ax:0 si:55ab18d77070 di:ffffffffff600000 [453038.114252] exe[276134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab18d1e839 cs:33 sp:7fe135bde858 ax:0 si:55ab18d77070 di:ffffffffff600000 [453928.112940] exe[253356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623f76a0839 cs:33 sp:7ed621aeb858 ax:0 si:5623f76f9070 di:ffffffffff600000 [455161.907027] exe[260221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f2b466b31 cs:33 sp:ffffffffff600040 ax:0 si:ffffffffff600040 di:80000 [455161.967816] exe[259943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f2b466b31 cs:33 sp:ffffffffff600040 ax:0 si:ffffffffff600040 di:80000 [455161.987638] exe[284411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f2b466b31 cs:33 sp:ffffffffff600040 ax:0 si:ffffffffff600040 di:80000 [455161.989160] exe[322396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f2b466b31 cs:33 sp:ffffffffff600040 ax:0 si:ffffffffff600040 di:80000 [455161.989891] exe[258847] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f2b466b31 cs:33 sp:ffffffffff600040 ax:0 si:ffffffffff600040 di:80000 [455161.997914] exe[259105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f2b466b31 cs:33 sp:ffffffffff600040 ax:0 si:ffffffffff600040 di:80000 [455161.999875] exe[307657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f2b466b31 cs:33 sp:ffffffffff600040 ax:0 si:ffffffffff600040 di:80000 [455162.001400] exe[284527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f2b466b31 cs:33 sp:ffffffffff600040 ax:0 si:ffffffffff600040 di:80000 [455162.008808] exe[308627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f2b466b31 cs:33 sp:ffffffffff600040 ax:0 si:ffffffffff600040 di:80000 [455162.009946] exe[260001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f2b466b31 cs:33 sp:ffffffffff600040 ax:0 si:ffffffffff600040 di:80000 [455285.245121] potentially unexpected fatal signal 5. [455285.250259] CPU: 70 PID: 242474 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [455285.260792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [455285.270223] RIP: 0033:0x7fffffffe062 [455285.274009] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [455285.293002] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [455285.298455] RAX: 000000000004fb2d RBX: 0000000000000000 RCX: 00007fffffffe05a [455285.305811] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [455285.313235] RBP: 000000c00013de38 R08: 000000c00093a100 R09: 0000000000000000 [455285.320617] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [455285.327962] R13: 0000000000000004 R14: 000000c000514820 R15: 000000000003b238 [455285.335330] FS: 000000c000180490 GS: 0000000000000000 [455473.449679] potentially unexpected fatal signal 5. [455473.454725] CPU: 13 PID: 335703 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [455473.465136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [455473.474655] RIP: 0033:0x7fffffffe062 [455473.478423] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [455473.497489] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [455473.502918] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [455473.510378] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [455473.517735] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [455473.525141] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [455473.532485] R13: 0000000000000030 R14: 000000c000552ea0 R15: 000000000003e19a [455473.541317] FS: 0000000001fb4cd0 GS: 0000000000000000 [455473.638930] potentially unexpected fatal signal 5. [455473.644274] CPU: 14 PID: 335700 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [455473.656059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [455473.666966] RIP: 0033:0x7fffffffe062 [455473.672208] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [455473.691207] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [455473.698030] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [455473.705392] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [455473.714133] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [455473.722870] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [455473.731619] R13: 0000000000000030 R14: 000000c000552ea0 R15: 000000000003e19a [455473.740353] FS: 0000000001fb4cd0 GS: 0000000000000000 [455483.763054] potentially unexpected fatal signal 5. [455483.768104] CPU: 72 PID: 255326 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [455483.778653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [455483.788143] RIP: 0033:0x7fffffffe062 [455483.791962] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [455483.811036] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [455483.817821] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [455483.825192] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [455483.832648] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [455483.840202] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [455483.849196] R13: 0000000000000004 R14: 000000c00049f040 R15: 000000000003e49b [455483.857948] FS: 0000000001fb4cd0 GS: 0000000000000000 [455681.397097] potentially unexpected fatal signal 5. [455681.402155] CPU: 27 PID: 299872 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [455681.412566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [455681.422014] RIP: 0033:0x7fffffffe062 [455681.425808] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [455681.444870] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [455681.451708] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [455681.460451] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [455681.467818] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [455681.475257] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [455681.484016] R13: 000000000000003e R14: 000000c0004ca820 R15: 000000000003fcb8 [455681.492764] FS: 000000c000130890 GS: 0000000000000000 [455689.962974] potentially unexpected fatal signal 5. [455689.968124] CPU: 77 PID: 343545 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [455689.978561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [455689.988020] RIP: 0033:0x7fffffffe062 [455689.991815] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [455690.010825] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [455690.016297] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [455690.023799] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [455690.032548] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [455690.041399] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [455690.050156] R13: 000000000000000e R14: 000000c0001a8ea0 R15: 000000000003feb8 [455690.058929] FS: 0000000001fb4cd0 GS: 0000000000000000 [455761.463287] potentially unexpected fatal signal 5. [455761.468332] CPU: 54 PID: 313657 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [455761.478741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [455761.488187] RIP: 0033:0x7fffffffe062 [455761.491969] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [455761.510968] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [455761.516507] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [455761.523908] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [455761.531270] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [455761.538737] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [455761.546092] R13: 0000000000000004 R14: 000000c0001b7520 R15: 0000000000040d6d [455761.553549] FS: 000000c000180490 GS: 0000000000000000 [456331.759497] potentially unexpected fatal signal 5. [456331.764576] CPU: 37 PID: 367013 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [456331.775018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [456331.784499] RIP: 0033:0x7fffffffe062 [456331.788300] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [456331.807358] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [456331.812877] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [456331.820330] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [456331.829227] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [456331.838137] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [456331.846864] R13: 0000000000000036 R14: 000000c0000076c0 R15: 000000000005977e [456331.855652] FS: 0000000001fb4cd0 GS: 0000000000000000 [456605.977484] potentially unexpected fatal signal 5. [456605.977850] potentially unexpected fatal signal 5. [456605.982535] CPU: 28 PID: 292694 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [456605.982540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [456605.987592] CPU: 60 PID: 292550 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [456605.987596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [456605.987602] RIP: 0033:0x7fffffffe062 [456605.987607] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [456605.998041] RIP: 0033:0x7fffffffe062 [456605.998047] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [456605.998049] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [456605.998053] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [456606.007530] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [456606.007532] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [456606.007533] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [456606.007534] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [456606.007535] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [456606.007536] R13: 0000000000000004 R14: 000000c000182ea0 R15: 0000000000047619 [456606.007536] FS: 00000000022860f0 GS: 0000000000000000 [456606.141951] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [456606.149437] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [456606.156828] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [456606.164190] R13: 0000000000000004 R14: 000000c000182ea0 R15: 0000000000047619 [456606.171553] FS: 00000000022860f0 GS: 0000000000000000 [456853.017163] warn_bad_vsyscall: 57 callbacks suppressed [456853.017166] exe[377092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcc763b839 cs:33 sp:7ee42a092858 ax:0 si:55fcc7694062 di:ffffffffff600000 [456892.829457] exe[320293] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fa49b540a cs:33 sp:7f38701b9ee8 ax:12 si:ffffffffff600000 di:562fa4a21ff2 [456893.292929] exe[320293] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fa49b540a cs:33 sp:7f38701b9ee8 ax:12 si:ffffffffff600000 di:562fa4a21ff2 [456893.682300] exe[319145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fa49b540a cs:33 sp:7f38701b9ee8 ax:12 si:ffffffffff600000 di:562fa4a21ff2 [456893.773192] exe[318805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fa49b540a cs:33 sp:7f38701b9ee8 ax:12 si:ffffffffff600000 di:562fa4a21ff2 [458547.037461] exe[403485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56096fce3839 cs:33 sp:7f732fa25858 ax:0 si:56096fd3c062 di:ffffffffff600000 [458713.981972] exe[392121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55808da0840a cs:33 sp:7fdea23aeee8 ax:12 si:ffffffffff600000 di:55808da74ff2 [458714.071106] exe[406168] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55808da0840a cs:33 sp:7fdea23aeee8 ax:12 si:ffffffffff600000 di:55808da74ff2 [458714.110128] exe[387605] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55808da0840a cs:33 sp:7fdea234bee8 ax:12 si:ffffffffff600000 di:55808da74ff2 [458714.202713] exe[387639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55808da0840a cs:33 sp:7fdea238dee8 ax:12 si:ffffffffff600000 di:55808da74ff2 [458809.417619] potentially unexpected fatal signal 5. [458809.422824] CPU: 79 PID: 409786 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [458809.433247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [458809.442788] RIP: 0033:0x7fffffffe062 [458809.446568] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [458809.465562] RSP: 002b:000000c0006d5cb0 EFLAGS: 00000297 [458809.471015] RAX: 00007f824a9e7000 RBX: 0000000000000000 RCX: 00007fffffffe05a [458809.478377] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007f824a9e7000 [458809.485733] RBP: 000000c0006d5d40 R08: 0000000000000009 R09: 000000000e2bc000 [458809.493156] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0006d5bd8 [458809.500586] R13: 000000c000139000 R14: 000000c00048b860 R15: 000000000004f294 [458809.509343] FS: 00007efcad8856c0 GS: 0000000000000000 [458885.368120] exe[388870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55856e3de839 cs:33 sp:7f54f77bb858 ax:0 si:55856e437062 di:ffffffffff600000 [458886.132109] exe[387552] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55856e3de839 cs:33 sp:7f54f77bb858 ax:0 si:55856e437062 di:ffffffffff600000 [458886.226835] exe[388869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55856e3de839 cs:33 sp:7f54f7779858 ax:0 si:55856e437062 di:ffffffffff600000 [458896.504083] potentially unexpected fatal signal 5. [458896.509177] CPU: 48 PID: 328918 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [458896.519629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [458896.529096] RIP: 0033:0x7fffffffe062 [458896.532894] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [458896.551971] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [458896.558760] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [458896.566114] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [458896.574975] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [458896.583709] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [458896.591064] R13: 0000000000000004 R14: 000000c0001661a0 R15: 000000000004fd3b [458896.599800] FS: 00000000022860f0 GS: 0000000000000000 [458896.680946] potentially unexpected fatal signal 5. [458896.686035] CPU: 45 PID: 348962 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [458896.697833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [458896.707395] RIP: 0033:0x7fffffffe062 [458896.711205] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [458896.730245] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [458896.733097] potentially unexpected fatal signal 5. [458896.737047] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [458896.742092] CPU: 60 PID: 429219 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [458896.742094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [458896.742100] RIP: 0033:0x7fffffffe062 [458896.742104] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [458896.749459] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [458896.749461] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [458896.749462] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [458896.749463] R13: 0000000000000004 R14: 000000c00041a1a0 R15: 000000000004fd3e [458896.749463] FS: 000000c000130490 GS: 0000000000000000 [458896.831215] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [458896.838042] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [458896.846774] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [458896.847087] potentially unexpected fatal signal 5. [458896.855512] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [458896.861950] CPU: 13 PID: 340156 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [458896.861952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [458896.861956] RIP: 0033:0x7fffffffe062 [458896.861959] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [458896.861960] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [458896.861961] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [458896.861962] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [458896.861962] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [458896.861963] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [458896.861963] R13: 0000000000000004 R14: 000000c00041a1a0 R15: 000000000004fd3e [458896.861964] FS: 000000c000130490 GS: 0000000000000000 [458896.963797] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [458896.971271] R13: 0000000000000004 R14: 000000c00041a1a0 R15: 000000000004fd3e [458896.980062] FS: 000000c000130490 GS: 0000000000000000 [458964.047763] potentially unexpected fatal signal 5. [458964.052821] CPU: 88 PID: 432116 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [458964.063722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [458964.073188] RIP: 0033:0x7fffffffe062 [458964.077009] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [458964.096150] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [458964.101641] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [458964.109006] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [458964.116374] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [458964.123734] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [458964.131110] R13: 000000000000001e R14: 000000c0001ad860 R15: 00000000000509b8 [458964.139839] FS: 000000c000180090 GS: 0000000000000000 [459372.146255] potentially unexpected fatal signal 5. [459372.151331] CPU: 50 PID: 447856 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [459372.161823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [459372.171292] RIP: 0033:0x7fffffffe062 [459372.175250] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [459372.195759] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [459372.202607] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [459372.211332] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [459372.220086] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [459372.228849] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [459372.236239] R13: 0000000000000004 R14: 000000c000533040 R15: 0000000000054f4e [459372.244977] FS: 00000000022860f0 GS: 0000000000000000 [459432.121065] exe[430320] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b5cde4f839 cs:33 sp:7fe7f695e858 ax:0 si:55b5cdea8070 di:ffffffffff600000 [459610.681123] exe[457631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559788ea1839 cs:33 sp:7fe65d9c8858 ax:0 si:559788efa062 di:ffffffffff600000 [459610.757607] exe[456704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559788ea1839 cs:33 sp:7fe65d9c8858 ax:0 si:559788efa062 di:ffffffffff600000 [459611.491978] exe[456419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559788ea1839 cs:33 sp:7fe65d9c8858 ax:0 si:559788efa062 di:ffffffffff600000 [459747.007152] exe[451499] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c596ae839 cs:33 sp:7ecd0c52a858 ax:0 si:560c59707062 di:ffffffffff600000 [460217.549813] potentially unexpected fatal signal 5. [460217.554865] CPU: 73 PID: 469785 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [460217.565317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [460217.574747] RIP: 0033:0x7fffffffe062 [460217.578611] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [460217.597684] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [460217.603182] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [460217.610548] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [460217.617998] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [460217.625364] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [460217.632723] R13: 0000000000000004 R14: 000000c00047c680 R15: 000000000005be91 [460217.640071] FS: 000000c000180090 GS: 0000000000000000 [460337.713248] potentially unexpected fatal signal 5. [460337.718304] CPU: 20 PID: 402238 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [460337.728718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [460337.738186] RIP: 0033:0x7fffffffe062 [460337.741974] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [460337.761054] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [460337.766508] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [460337.773857] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [460337.781223] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [460337.788586] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [460337.797314] R13: 0000000000000010 R14: 000000c0005389c0 R15: 000000000005ca5b [460337.806052] FS: 0000000001fb4cd0 GS: 0000000000000000 [460338.946981] potentially unexpected fatal signal 5. [460338.952260] CPU: 37 PID: 483100 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [460338.962764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [460338.972296] RIP: 0033:0x7fffffffe062 [460338.976124] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [460338.995146] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [460339.002076] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [460339.010826] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [460339.019658] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [460339.028514] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [460339.037314] R13: 0000000000000004 R14: 000000c00049f6c0 R15: 000000000005ca52 [460339.046057] FS: 0000000001fb4cd0 GS: 0000000000000000 [460506.074101] exe[492126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56216cc10839 cs:33 sp:7fd9b82ab858 ax:0 si:56216cc69097 di:ffffffffff600000 [460506.154829] exe[492662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56216cc10839 cs:33 sp:7fd9b82ab858 ax:0 si:56216cc69097 di:ffffffffff600000 [460506.195423] exe[492660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56216cc10839 cs:33 sp:7fd9b828a858 ax:0 si:56216cc69097 di:ffffffffff600000 [460506.267043] exe[491458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56216cc10839 cs:33 sp:7fd9b82ab858 ax:0 si:56216cc69097 di:ffffffffff600000 [460846.447720] exe[474356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fdb709740a cs:33 sp:7f2e7ff17ee8 ax:12 si:ffffffffff600000 di:55fdb7103ff2 [460847.327227] exe[503746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fdb709740a cs:33 sp:7f2e7ff17ee8 ax:12 si:ffffffffff600000 di:55fdb7103ff2 [460848.207417] exe[470043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fdb709740a cs:33 sp:7f2e7ff17ee8 ax:12 si:ffffffffff600000 di:55fdb7103ff2 [462428.124523] potentially unexpected fatal signal 5. [462428.129788] CPU: 43 PID: 493720 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [462428.140333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [462428.150192] RIP: 0033:0x7fffffffe062 [462428.154017] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [462428.173115] RSP: 002b:000000c0006cbcb0 EFLAGS: 00000297 [462428.178575] RAX: 000000000008d3c4 RBX: 0000000000000000 RCX: 00007fffffffe05a [462428.185949] RDX: 0000000000000000 RSI: 000000c0006cc000 RDI: 0000000000012f00 [462428.193311] RBP: 000000c0006cbd40 R08: 000000c002417e10 R09: 0000000000000000 [462428.200734] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0006cbbd8 [462428.209436] R13: 000000c000180000 R14: 000000c0001a21a0 R15: 0000000000068463 [462428.216911] FS: 00007fa51d4876c0 GS: 0000000000000000 [462429.121631] potentially unexpected fatal signal 5. [462429.126693] CPU: 43 PID: 543064 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [462429.137112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [462429.146570] RIP: 0033:0x7fffffffe062 [462429.150388] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [462429.169413] RSP: 002b:000000c0006cbcb0 EFLAGS: 00000297 [462429.174877] RAX: 000000000008d3c7 RBX: 0000000000000000 RCX: 00007fffffffe05a [462429.182238] RDX: 0000000000000000 RSI: 000000c0006cc000 RDI: 0000000000012f00 [462429.189612] RBP: 000000c0006cbd40 R08: 000000c00a917690 R09: 0000000000000000 [462429.196967] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0006cbbd8 [462429.204413] R13: 000000c000180000 R14: 000000c0001a21a0 R15: 0000000000068463 [462429.211777] FS: 00007fa51d4876c0 GS: 0000000000000000 [462430.430175] potentially unexpected fatal signal 5. [462430.435219] CPU: 36 PID: 578489 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [462430.445697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [462430.455139] RIP: 0033:0x7fffffffe062 [462430.458927] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [462430.477935] RSP: 002b:000000c0006cbcb0 EFLAGS: 00000297 [462430.483652] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [462430.490997] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [462430.498357] RBP: 000000c0006cbd40 R08: 0000000000000000 R09: 0000000000000000 [462430.505730] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0006cbbd8 [462430.513083] R13: 000000c000180000 R14: 000000c0001a21a0 R15: 0000000000068463 [462430.520483] FS: 00007fa51d4876c0 GS: 0000000000000000 [462507.830022] potentially unexpected fatal signal 5. [462507.835085] CPU: 54 PID: 581667 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [462507.845488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [462507.854941] RIP: 0033:0x7fffffffe062 [462507.858719] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [462507.861033] potentially unexpected fatal signal 5. [462507.877756] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [462507.882773] CPU: 48 PID: 444774 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [462507.882775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [462507.882783] RIP: 0033:0x7fffffffe062 [462507.882786] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [462507.882787] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [462507.882789] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [462507.882790] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [462507.882790] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [462507.882791] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [462507.882791] R13: 0000000000000004 R14: 000000c0005d09c0 R15: 0000000000068eb2 [462507.882795] FS: 00000000022860f0 GS: 0000000000000000 [462507.888258] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [462507.888259] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [462507.888260] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [462507.888260] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [462507.888261] R13: 0000000000000004 R14: 000000c0005d09c0 R15: 0000000000068eb2 [462507.888262] FS: 00000000022860f0 GS: 0000000000000000 [462511.946265] potentially unexpected fatal signal 5. [462511.951332] CPU: 85 PID: 581952 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [462511.961829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [462511.971284] RIP: 0033:0x7fffffffe062 [462511.975130] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [462511.994128] RSP: 002b:000000c00029dcb0 EFLAGS: 00000297 [462511.999575] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [462512.007014] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [462512.014408] RBP: 000000c00029dd40 R08: 0000000000000000 R09: 0000000000000000 [462512.023098] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00029dbd8 [462512.030463] R13: 0000000002857820 R14: 000000c000595860 R15: 0000000000068ea9 [462512.037825] FS: 0000000003ba33c0 GS: 0000000000000000 [462514.409892] potentially unexpected fatal signal 5. [462514.414951] CPU: 88 PID: 550068 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [462514.425356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [462514.434807] RIP: 0033:0x7fffffffe062 [462514.438627] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [462514.457822] RSP: 002b:000000c00029dcb0 EFLAGS: 00000297 [462514.463308] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [462514.470694] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [462514.479455] RBP: 000000c00029dd40 R08: 0000000000000000 R09: 0000000000000000 [462514.488216] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00029dbd8 [462514.497009] R13: 0000000002857820 R14: 000000c000595860 R15: 0000000000068ea9 [462514.505722] FS: 0000000003ba33c0 GS: 0000000000000000 [462514.543852] potentially unexpected fatal signal 5. [462514.549552] CPU: 24 PID: 558326 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [462514.561345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [462514.572324] RIP: 0033:0x7fffffffe062 [462514.576144] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [462514.596640] RSP: 002b:000000c00029dcb0 EFLAGS: 00000297 [462514.603583] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [462514.612328] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [462514.619713] RBP: 000000c00029dd40 R08: 0000000000000000 R09: 0000000000000000 [462514.627067] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00029dbd8 [462514.634560] R13: 0000000002857820 R14: 000000c000595860 R15: 0000000000068ea9 [462514.643298] FS: 0000000003ba33c0 GS: 0000000000000000 [463163.802158] potentially unexpected fatal signal 5. [463163.807208] CPU: 61 PID: 464013 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [463163.810933] potentially unexpected fatal signal 5. [463163.817694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [463163.822799] CPU: 89 PID: 610870 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [463163.822801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [463163.822806] RIP: 0033:0x7fffffffe062 [463163.822808] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [463163.822812] RSP: 002b:000000c00048fd98 EFLAGS: 00000297 [463163.832266] RIP: 0033:0x7fffffffe062 [463163.832270] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [463163.832272] RSP: 002b:000000c00048fd98 EFLAGS: 00000297 [463163.844246] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [463163.844247] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [463163.844248] RBP: 000000c00048fe38 R08: 0000000000000000 R09: 0000000000000000 [463163.844248] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00048fe20 [463163.844249] R13: 0000000000000020 R14: 000000c0004a5040 R15: 000000000006ebe0 [463163.844250] FS: 000000c000130890 GS: 0000000000000000 [463163.955496] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [463163.963035] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [463163.970420] RBP: 000000c00048fe38 R08: 0000000000000000 R09: 0000000000000000 [463163.979144] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00048fe20 [463163.986585] R13: 0000000000000020 R14: 000000c0004a5040 R15: 000000000006ebe0 [463163.994001] FS: 000000c000130890 GS: 0000000000000000 [463164.146299] potentially unexpected fatal signal 5. [463164.151364] CPU: 28 PID: 610869 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [463164.156706] potentially unexpected fatal signal 5. [463164.163209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [463164.169581] CPU: 90 PID: 576109 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [463164.169582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [463164.169586] RIP: 0033:0x7fffffffe062 [463164.169589] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [463164.179034] RIP: 0033:0x7fffffffe062 [463164.179037] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [463164.179038] RSP: 002b:000000c00048fd98 EFLAGS: 00000297 [463164.179040] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [463164.179042] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [463164.189432] RSP: 002b:000000c00048fd98 EFLAGS: 00000297 [463164.189433] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [463164.189434] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [463164.189435] RBP: 000000c00048fe38 R08: 0000000000000000 R09: 0000000000000000 [463164.189435] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00048fe20 [463164.189436] R13: 0000000000000020 R14: 000000c0004a5040 R15: 000000000006ebe0 [463164.189437] FS: 000000c000130890 GS: 0000000000000000 [463164.215571] potentially unexpected fatal signal 5. [463164.223120] RBP: 000000c00048fe38 R08: 0000000000000000 R09: 0000000000000000 [463164.223122] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00048fe20 [463164.223122] R13: 0000000000000020 R14: 000000c0004a5040 R15: 000000000006ebe0 [463164.223123] FS: 000000c000130890 GS: 0000000000000000 [463164.349732] CPU: 38 PID: 456945 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [463164.360133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [463164.370984] RIP: 0033:0x7fffffffe062 [463164.374775] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [463164.393770] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [463164.399266] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [463164.407950] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [463164.415315] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [463164.424154] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [463164.431514] R13: 0000000000000004 R14: 000000c0003f71e0 R15: 000000000006ebdd [463164.440255] FS: 000000c000130c90 GS: 0000000000000000 [463164.777003] potentially unexpected fatal signal 5. [463164.783241] CPU: 34 PID: 602420 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [463164.795051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [463164.805901] RIP: 0033:0x7fffffffe062 [463164.809689] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [463164.828686] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [463164.835529] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [463164.842917] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [463164.850323] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [463164.859089] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [463164.866481] R13: 0000000000000004 R14: 000000c0003f71e0 R15: 000000000006ebdd [463164.875218] FS: 000000c000130c90 GS: 0000000000000000 [463827.891465] potentially unexpected fatal signal 5. [463827.896513] CPU: 49 PID: 504762 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [463827.907368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [463827.916793] RIP: 0033:0x7fffffffe062 [463827.920569] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [463827.939585] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [463827.945078] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [463827.952446] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [463827.959803] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [463827.968528] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [463827.975881] R13: 0000000000000004 R14: 000000c000490ea0 R15: 0000000000074572 [463827.983311] FS: 000000c000180090 GS: 0000000000000000 [463948.159809] potentially unexpected fatal signal 5. [463948.165052] CPU: 92 PID: 571546 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [463948.175455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [463948.184931] RIP: 0033:0x7fffffffe062 [463948.188733] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [463948.208230] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [463948.213697] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [463948.221144] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [463948.228501] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [463948.229836] potentially unexpected fatal signal 5. [463948.235973] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [463948.241013] CPU: 34 PID: 483887 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [463948.241016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [463948.248357] R13: 000000000000001a R14: 000000c000515380 R15: 000000000007621a [463948.248359] FS: 0000000001fb4cd0 GS: 0000000000000000 [463948.281042] RIP: 0033:0x7fffffffe062 [463948.284859] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [463948.305246] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [463948.310695] RAX: 000000000009e11e RBX: 0000000000000000 RCX: 00007fffffffe05a [463948.319443] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [463948.326884] RBP: 000000c00013de38 R08: 000000c00073a2e0 R09: 0000000000000000 [463948.334230] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [463948.341593] R13: 000000000000001a R14: 000000c000515380 R15: 000000000007621a [463948.348935] FS: 0000000001fb4cd0 GS: 0000000000000000 [463948.591108] potentially unexpected fatal signal 5. [463948.597370] CPU: 47 PID: 487465 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [463948.607886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [463948.618845] RIP: 0033:0x7fffffffe062 [463948.624056] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [463948.644517] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [463948.649977] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [463948.657340] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [463948.664798] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [463948.673569] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [463948.682352] R13: 000000000000001a R14: 000000c000515380 R15: 000000000007621a [463948.691193] FS: 0000000001fb4cd0 GS: 0000000000000000 [463948.957576] potentially unexpected fatal signal 5. [463948.962713] CPU: 95 PID: 647461 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [463948.973147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [463948.982632] RIP: 0033:0x7fffffffe062 [463948.986416] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [463949.005525] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [463949.010990] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [463949.018423] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [463949.027298] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [463949.036043] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [463949.044755] R13: 000000000000000e R14: 000000c0001af040 R15: 0000000000076212 [463949.052121] FS: 000000c000130890 GS: 0000000000000000 [464453.367636] exe[613984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527630a839 cs:33 sp:7f19541dbee8 ax:0 si:20000640 di:ffffffffff600000 [464454.155373] exe[655994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527630a839 cs:33 sp:7f19541dbee8 ax:0 si:20000640 di:ffffffffff600000 [464454.321202] exe[655923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527630a839 cs:33 sp:7f1954199ee8 ax:0 si:20000640 di:ffffffffff600000 [465398.778296] exe[704623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bba0444839 cs:33 sp:7fe1177eeee8 ax:0 si:20000080 di:ffffffffff600000 [465398.844802] exe[704613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bba0444839 cs:33 sp:7fe1177cdee8 ax:0 si:20000080 di:ffffffffff600000 [465398.924619] exe[704500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bba0444839 cs:33 sp:7fe1177eeee8 ax:0 si:20000080 di:ffffffffff600000 [465906.433058] exe[722324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56080e31b839 cs:33 sp:7ecfee88bee8 ax:0 si:20002380 di:ffffffffff600000 [465906.490846] exe[677416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56080e31b839 cs:33 sp:7ecfee849ee8 ax:0 si:20002380 di:ffffffffff600000 [465906.511152] exe[677413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56080e31b839 cs:33 sp:7ecfee849ee8 ax:0 si:20002380 di:ffffffffff600000 [465906.530835] exe[677412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56080e31b839 cs:33 sp:7ecfee849ee8 ax:0 si:20002380 di:ffffffffff600000 [465906.550894] exe[677416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56080e31b839 cs:33 sp:7ecfee849ee8 ax:0 si:20002380 di:ffffffffff600000 [465906.571005] exe[677412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56080e31b839 cs:33 sp:7ecfee849ee8 ax:0 si:20002380 di:ffffffffff600000 [465906.591605] exe[677413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56080e31b839 cs:33 sp:7ecfee849ee8 ax:0 si:20002380 di:ffffffffff600000 [465906.612414] exe[677412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56080e31b839 cs:33 sp:7ecfee849ee8 ax:0 si:20002380 di:ffffffffff600000 [465906.631584] exe[673169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56080e31b839 cs:33 sp:7ecfee849ee8 ax:0 si:20002380 di:ffffffffff600000 [465906.650780] exe[677413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56080e31b839 cs:33 sp:7ecfee849ee8 ax:0 si:20002380 di:ffffffffff600000 [466120.369330] potentially unexpected fatal signal 5. [466120.374375] CPU: 91 PID: 594858 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [466120.384794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [466120.394276] RIP: 0033:0x7fffffffe062 [466120.398102] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [466120.417365] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [466120.424223] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [466120.431704] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [466120.440452] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [466120.449194] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [466120.457933] R13: 0000000000000012 R14: 000000c0001c2b60 R15: 000000000008e2a1 [466120.465320] FS: 000000c000130490 GS: 0000000000000000 [466594.373466] potentially unexpected fatal signal 5. [466594.378536] CPU: 20 PID: 605817 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [466594.388948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [466594.398392] RIP: 0033:0x7fffffffe062 [466594.402292] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [466594.421376] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [466594.426816] RAX: 00000000000b3f48 RBX: 0000000000000000 RCX: 00007fffffffe05a [466594.433865] potentially unexpected fatal signal 5. [466594.434237] RDX: 0000000000000000 RSI: 000000c00018e000 RDI: 0000000000012f00 [466594.439234] CPU: 21 PID: 670044 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [466594.446671] RBP: 000000c00018de38 R08: 000000c003532a60 R09: 0000000000000000 [466594.457048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [466594.464487] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018de20 [466594.473901] RIP: 0033:0x7fffffffe062 [466594.473903] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [466594.473905] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [466594.473906] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [466594.473907] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [466594.473908] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [466594.473908] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018de20 [466594.473909] R13: 0000000000000004 R14: 000000c0004eeb60 R15: 0000000000093887 [466594.473910] FS: 000000c000130490 GS: 0000000000000000 [466594.551885] R13: 0000000000000004 R14: 000000c0004eeb60 R15: 0000000000093887 [466594.559252] FS: 000000c000130490 GS: 0000000000000000 [466594.582070] potentially unexpected fatal signal 5. [466594.588275] CPU: 12 PID: 605370 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [466594.598687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [466594.608126] RIP: 0033:0x7fffffffe062 [466594.611908] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [466594.630928] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [466594.636385] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [466594.643744] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [466594.651256] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [466594.658740] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018de20 [466594.666102] R13: 0000000000000004 R14: 000000c0004eeb60 R15: 0000000000093887 [466594.673458] FS: 000000c000130490 GS: 0000000000000000 [466594.895280] potentially unexpected fatal signal 5. [466594.900340] CPU: 60 PID: 705643 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [466594.910854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [466594.920314] RIP: 0033:0x7fffffffe062 [466594.925511] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [466594.945897] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [466594.951345] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [466594.958690] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [466594.966124] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [466594.973468] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018de20 [466594.980816] R13: 0000000000000004 R14: 000000c0004eeb60 R15: 0000000000093887 [466594.988177] FS: 000000c000130490 GS: 0000000000000000 [466595.020742] potentially unexpected fatal signal 5. [466595.025892] CPU: 16 PID: 737092 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [466595.037684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [466595.048547] RIP: 0033:0x7fffffffe062 [466595.052337] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [466595.071342] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [466595.076781] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [466595.084211] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [466595.091549] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [466595.098898] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [466595.106249] R13: 0000000000000012 R14: 000000c0004eeb60 R15: 0000000000093888 [466595.113598] FS: 00000000022860f0 GS: 0000000000000000 [466595.197028] potentially unexpected fatal signal 5. [466595.202060] CPU: 16 PID: 606897 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [466595.212458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [466595.221889] RIP: 0033:0x7fffffffe062 [466595.225781] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [466595.244797] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [466595.250225] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [466595.257659] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [466595.265009] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [466595.272347] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018de20 [466595.279702] R13: 0000000000000004 R14: 000000c0004eeb60 R15: 0000000000093887 [466595.287062] FS: 000000c000130490 GS: 0000000000000000 [466595.419889] potentially unexpected fatal signal 5. [466595.425043] CPU: 56 PID: 626727 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [466595.435450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [466595.444974] RIP: 0033:0x7fffffffe062 [466595.448846] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [466595.467847] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [466595.473278] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [466595.481157] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [466595.488520] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [466595.495861] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018de20 [466595.503204] R13: 0000000000000004 R14: 000000c0004eeb60 R15: 0000000000093887 [466595.510650] FS: 000000c000130490 GS: 0000000000000000 [466775.025108] potentially unexpected fatal signal 5. [466775.030247] CPU: 9 PID: 741571 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [466775.040599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [466775.050065] RIP: 0033:0x7fffffffe062 [466775.053888] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [466775.072996] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [466775.078482] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [466775.087247] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [466775.095979] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [466775.103327] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [466775.111380] R13: 0000000000000010 R14: 000000c00015a340 R15: 00000000000955fa [466775.118732] FS: 0000000001fb4cd0 GS: 0000000000000000 [466775.481778] potentially unexpected fatal signal 5. [466775.487775] CPU: 66 PID: 716861 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [466775.498194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [466775.507739] RIP: 0033:0x7fffffffe062 [466775.511538] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [466775.530546] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [466775.535988] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [466775.543345] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [466775.550687] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [466775.558038] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [466775.565403] R13: 0000000000000012 R14: 000000c000501ba0 R15: 00000000000955fb [466775.572752] FS: 000000c000181490 GS: 0000000000000000 [466776.021382] potentially unexpected fatal signal 5. [466776.026426] CPU: 78 PID: 741564 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [466776.036833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [466776.046268] RIP: 0033:0x7fffffffe062 [466776.050088] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [466776.069353] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [466776.074789] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [466776.082141] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [466776.089601] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [466776.096945] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [466776.101144] potentially unexpected fatal signal 5. [466776.104307] R13: 0000000000000010 R14: 000000c00015a340 R15: 00000000000955fa [466776.104312] FS: 0000000001fb4cd0 GS: 0000000000000000 [466776.109412] CPU: 16 PID: 682484 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [466776.132600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [466776.142076] RIP: 0033:0x7fffffffe062 [466776.145885] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [466776.165000] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [466776.170447] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [466776.177803] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [466776.185163] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [466776.192533] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [466776.203634] R13: 0000000000000004 R14: 000000c000480b60 R15: 000000000009560f [466776.210997] FS: 000000c000181c90 GS: 0000000000000000 [466777.317941] potentially unexpected fatal signal 5. [466777.323121] CPU: 15 PID: 619950 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [466777.333525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [466777.342975] RIP: 0033:0x7fffffffe062 [466777.346764] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [466777.365740] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [466777.371187] RAX: 00000000000b511c RBX: 0000000000000000 RCX: 00007fffffffe05a [466777.378529] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [466777.385875] RBP: 000000c00018fe38 R08: 000000c009019000 R09: 0000000000000000 [466777.393242] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [466777.400595] R13: 0000000000000004 R14: 000000c000480b60 R15: 000000000009560f [466777.409740] FS: 000000c000181c90 GS: 0000000000000000 [466777.504483] potentially unexpected fatal signal 5. [466777.509889] CPU: 2 PID: 634555 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [466777.521966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [466777.532560] RIP: 0033:0x7fffffffe062 [466777.537721] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [466777.556787] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [466777.563627] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [466777.571061] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [466777.578415] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [466777.585772] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [466777.593123] R13: 0000000000000012 R14: 000000c000501ba0 R15: 00000000000955fb [466777.601861] FS: 000000c000181490 GS: 0000000000000000 [467439.161641] potentially unexpected fatal signal 5. [467439.166752] CPU: 43 PID: 765635 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [467439.177276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [467439.186716] RIP: 0033:0x7fffffffe062 [467439.190506] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [467439.209523] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [467439.215183] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [467439.224023] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [467439.231388] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [467439.240127] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [467439.247491] R13: 0000000000000004 R14: 000000c000496680 R15: 000000000009c700 [467439.254853] FS: 00000000022860f0 GS: 0000000000000000 [467439.342740] potentially unexpected fatal signal 5. [467439.347863] CPU: 89 PID: 654006 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [467439.358271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [467439.369098] RIP: 0033:0x7fffffffe062 [467439.372895] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [467439.392001] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [467439.398913] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [467439.406273] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [467439.415018] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [467439.422388] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [467439.429791] R13: 0000000000000004 R14: 000000c000496680 R15: 000000000009c700 [467439.437163] FS: 00000000022860f0 GS: 0000000000000000 [467558.985694] potentially unexpected fatal signal 5. [467558.990805] CPU: 79 PID: 703861 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [467559.001321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [467559.010785] RIP: 0033:0x7fffffffe062 [467559.014644] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [467559.033770] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [467559.040625] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [467559.049372] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [467559.056745] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [467559.064096] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [467559.068920] potentially unexpected fatal signal 5. [467559.071440] R13: 000000000000003e R14: 000000c000463860 R15: 000000000009e40a [467559.071441] FS: 0000000001fb4cd0 GS: 0000000000000000 [467559.090929] CPU: 28 PID: 696706 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [467559.101347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [467559.110895] RIP: 0033:0x7fffffffe062 [467559.114691] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [467559.133789] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [467559.139241] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [467559.146604] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [467559.154178] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [467559.161567] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [467559.170393] R13: 000000000000003e R14: 000000c000463860 R15: 000000000009e40a [467559.177847] FS: 0000000001fb4cd0 GS: 0000000000000000 [469732.126678] potentially unexpected fatal signal 5. [469732.131760] CPU: 16 PID: 813502 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [469732.142186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [469732.151756] RIP: 0033:0x7fffffffe062 [469732.155557] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [469732.174613] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [469732.181449] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [469732.188918] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [469732.196295] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [469732.203661] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [469732.212511] R13: 0000000000000004 R14: 000000c0001724e0 R15: 00000000000b27da [469732.221265] FS: 000000c000180090 GS: 0000000000000000 [470206.853580] potentially unexpected fatal signal 5. [470206.858663] CPU: 4 PID: 822531 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [470206.868999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [470206.878455] RIP: 0033:0x7fffffffe062 [470206.882247] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [470206.901256] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [470206.906765] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [470206.914135] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [470206.921507] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [470206.928869] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [470206.936215] R13: 0000000000000012 R14: 000000c000481380 R15: 00000000000b4034 [470206.943567] FS: 00000000022860f0 GS: 0000000000000000 [470207.709948] potentially unexpected fatal signal 5. [470207.715012] CPU: 7 PID: 822500 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [470207.725412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [470207.735030] RIP: 0033:0x7fffffffe062 [470207.738967] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [470207.758210] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [470207.763660] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [470207.771022] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [470207.778391] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [470207.785877] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [470207.793238] R13: 0000000000000012 R14: 000000c000481380 R15: 00000000000b4034 [470207.800620] FS: 00000000022860f0 GS: 0000000000000000 [470389.545370] potentially unexpected fatal signal 5. [470389.550416] CPU: 25 PID: 743919 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [470389.560831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [470389.570378] RIP: 0033:0x7fffffffe062 [470389.574250] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [470389.594674] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [470389.601525] RAX: 00000000000ca490 RBX: 0000000000000000 RCX: 00007fffffffe05a [470389.608889] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [470389.616265] RBP: 000000c00013de38 R08: 000000c00084e3d0 R09: 0000000000000000 [470389.623630] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [470389.631072] R13: 000000000000003e R14: 000000c0001b4b60 R15: 00000000000b5351 [470389.638466] FS: 000000c000130490 GS: 0000000000000000 [470389.710804] potentially unexpected fatal signal 5. [470389.715935] CPU: 53 PID: 750548 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [470389.727743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [470389.738562] RIP: 0033:0x7fffffffe062 [470389.743712] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [470389.764232] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [470389.769714] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [470389.779052] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [470389.787782] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [470389.796627] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [470389.805362] R13: 0000000000000040 R14: 000000c0004944e0 R15: 00000000000b5350 [470389.814186] FS: 0000000001fb4cd0 GS: 0000000000000000 [470389.883946] potentially unexpected fatal signal 5. [470389.889010] CPU: 9 PID: 787090 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [470389.899367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [470389.910148] RIP: 0033:0x7fffffffe062 [470389.915320] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [470389.934303] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [470389.941138] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [470389.948576] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [470389.955914] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [470389.963275] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [470389.972170] R13: 000000000000003e R14: 000000c0001b4b60 R15: 00000000000b5351 [470389.979533] FS: 000000c000130490 GS: 0000000000000000 [470390.166470] potentially unexpected fatal signal 5. [470390.172367] CPU: 31 PID: 743940 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [470390.184162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [470390.193685] RIP: 0033:0x7fffffffe062 [470390.197507] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [470390.217895] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [470390.224757] RAX: 00000000000ca48e RBX: 0000000000000000 RCX: 00007fffffffe05a [470390.232130] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [470390.240848] RBP: 000000c00013de38 R08: 000000c0003c45b0 R09: 0000000000000000 [470390.248221] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [470390.256940] R13: 000000000000003e R14: 000000c0001b4b60 R15: 00000000000b5351 [470390.264314] FS: 000000c000130490 GS: 0000000000000000 [470390.700802] potentially unexpected fatal signal 5. [470390.705835] CPU: 53 PID: 742279 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [470390.716247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [470390.725684] RIP: 0033:0x7fffffffe062 [470390.729469] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [470390.748473] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [470390.753903] RAX: 00000000000ca48f RBX: 0000000000000000 RCX: 00007fffffffe05a [470390.761318] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [470390.770048] RBP: 000000c00013de38 R08: 000000c00047e2e0 R09: 0000000000000000 [470390.777427] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [470390.786179] R13: 000000000000003e R14: 000000c0001b4b60 R15: 00000000000b5351 [470390.794960] FS: 000000c000130490 GS: 0000000000000000 [470390.935391] potentially unexpected fatal signal 5. [470390.940370] CPU: 22 PID: 828551 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [470390.950816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [470390.960295] RIP: 0033:0x7fffffffe062 [470390.964098] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [470390.983177] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [470390.989949] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [470390.997315] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [470391.004724] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [470391.012109] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [470391.019491] R13: 0000000000000040 R14: 000000c0004944e0 R15: 00000000000b5350 [470391.026864] FS: 0000000001fb4cd0 GS: 0000000000000000 [471051.716720] potentially unexpected fatal signal 5. [471051.721772] CPU: 76 PID: 857987 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [471051.732260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [471051.741733] RIP: 0033:0x7fffffffe062 [471051.745528] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [471051.764721] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [471051.770201] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [471051.779044] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [471051.787813] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [471051.796562] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [471051.805356] R13: 0000000000000004 R14: 000000c000183380 R15: 00000000000bb019 [471051.814086] FS: 000000c000130c90 GS: 0000000000000000 [471171.203917] potentially unexpected fatal signal 5. [471171.208968] CPU: 72 PID: 786447 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [471171.219527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [471171.229003] RIP: 0033:0x7fffffffe062 [471171.232825] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [471171.253258] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [471171.260073] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [471171.268821] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [471171.277571] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [471171.286325] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [471171.293822] R13: 0000000000000004 R14: 000000c0001a7860 R15: 00000000000bc8e8 [471171.301241] FS: 000000c000130890 GS: 0000000000000000 [472001.018356] warn_bad_vsyscall: 57 callbacks suppressed [472001.018360] exe[901013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bfd3183b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:ba029000 [472001.043772] exe[900679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bfd3183b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:ba029000 [472001.066984] exe[901013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bfd3183b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:ba029000 [472111.662936] exe[880134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558400a67839 cs:33 sp:7fcf12f65ee8 ax:0 si:20006f00 di:ffffffffff600000 [472111.761285] exe[873262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558400a67839 cs:33 sp:7fcf12f44ee8 ax:0 si:20006f00 di:ffffffffff600000 [472111.869010] exe[893026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558400a67839 cs:33 sp:7fcf12f44ee8 ax:0 si:20006f00 di:ffffffffff600000 [472111.869483] exe[880134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558400a67839 cs:33 sp:7fcf12f65ee8 ax:0 si:20006f00 di:ffffffffff600000 [472870.866481] exe[914503] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578740bb40a cs:33 sp:7ed7d1f88ee8 ax:12 si:ffffffffff600000 di:557874127ff2 [472870.985744] exe[914503] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578740bb40a cs:33 sp:7ed7d1f88ee8 ax:12 si:ffffffffff600000 di:557874127ff2 [472871.810590] exe[918832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578740bb40a cs:33 sp:7ed7d1f67ee8 ax:12 si:ffffffffff600000 di:557874127ff2 [473345.030356] potentially unexpected fatal signal 5. [473345.035540] CPU: 38 PID: 928515 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [473345.045958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [473345.055464] RIP: 0033:0x7fffffffe062 [473345.059245] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [473345.078262] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [473345.083707] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [473345.091124] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [473345.099886] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [473345.107257] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [473345.116007] R13: 0000000000000004 R14: 000000c000514ea0 R15: 00000000000c6ad9 [473345.124744] FS: 000000c000130490 GS: 0000000000000000 [473818.791095] potentially unexpected fatal signal 5. [473818.796140] CPU: 50 PID: 943283 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [473818.806583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [473818.816029] RIP: 0033:0x7fffffffe062 [473818.819951] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [473818.840329] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [473818.845792] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [473818.853152] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [473818.860594] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [473818.868570] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [473818.875923] R13: 0000000000000004 R14: 000000c0004596c0 R15: 00000000000c8e52 [473818.883283] FS: 000000c000130890 GS: 0000000000000000 [473818.969085] potentially unexpected fatal signal 5. [473818.974226] CPU: 58 PID: 914481 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [473818.984648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [473818.994128] RIP: 0033:0x7fffffffe062 [473818.997938] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [473819.016949] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [473819.022385] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [473819.029738] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [473819.037099] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [473819.044464] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [473819.051803] R13: 0000000000000004 R14: 000000c0004596c0 R15: 00000000000c8e52 [473819.059268] FS: 000000c000130890 GS: 0000000000000000 [474003.025064] potentially unexpected fatal signal 5. [474003.030121] CPU: 47 PID: 927166 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [474003.040540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [474003.049998] RIP: 0033:0x7fffffffe062 [474003.053793] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [474003.072849] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [474003.079708] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [474003.088458] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [474003.097201] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [474003.105938] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [474003.113390] R13: 000000000000003e R14: 000000c000519ba0 R15: 00000000000ca7ac [474003.122144] FS: 000000c000130890 GS: 0000000000000000 [474661.705334] potentially unexpected fatal signal 5. [474661.710380] CPU: 48 PID: 858382 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [474661.720801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [474661.730332] RIP: 0033:0x7fffffffe062 [474661.734203] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [474661.753188] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [474661.758621] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [474661.765969] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [474661.773320] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [474661.780668] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [474661.788012] R13: 000000000000000a R14: 000000c000007520 R15: 00000000000d1879 [474661.795363] FS: 00000000022860f0 GS: 0000000000000000 [475397.186334] exe[987411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562571ad240a cs:33 sp:7f799f3feee8 ax:12 si:ffffffffff600000 di:562571b3eff2 [475397.257470] exe[965071] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562571ad240a cs:33 sp:7f799f3feee8 ax:12 si:ffffffffff600000 di:562571b3eff2 [475397.288177] exe[980849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562571ad240a cs:33 sp:7f799f3bcee8 ax:12 si:ffffffffff600000 di:562571b3eff2 [475397.364187] exe[963802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562571ad240a cs:33 sp:7f799f3bcee8 ax:12 si:ffffffffff600000 di:562571b3eff2 [475661.951009] exe[964146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558277cf7b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:ea020000 [475661.998200] exe[992767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558277cf7b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:ea020000 [475662.010336] exe[979078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558277cf7b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:ea020000 [475662.055599] exe[979078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558277cf7b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:ea020000 [475662.064880] exe[964146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558277cf7b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:ea020000 [476826.730217] exe[35469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580505e4839 cs:33 sp:7fa0d6921858 ax:0 si:55805063d062 di:ffffffffff600000 [476826.838926] exe[33951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580505e4839 cs:33 sp:7fa0d6921858 ax:0 si:55805063d062 di:ffffffffff600000 [476826.947469] exe[988513] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580505e4839 cs:33 sp:7fa0d6921858 ax:0 si:55805063d062 di:ffffffffff600000 [476956.159608] potentially unexpected fatal signal 5. [476956.164649] CPU: 11 PID: 984893 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [476956.177078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [476956.186524] RIP: 0033:0x7fffffffe062 [476956.190316] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [476956.209324] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [476956.214789] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [476956.222152] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [476956.230902] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [476956.238277] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [476956.245643] R13: 0000000000000004 R14: 000000c00047e820 R15: 00000000000e2bd3 [476956.254393] FS: 000000c000130490 GS: 0000000000000000 [476994.899825] exe[996318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c424e44839 cs:33 sp:7fce79e63ee8 ax:0 si:20000100 di:ffffffffff600000 [476995.053064] exe[36461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c424e44839 cs:33 sp:7fce79e63ee8 ax:0 si:20000100 di:ffffffffff600000 [476995.151464] exe[964963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c424e44839 cs:33 sp:7fce79e63ee8 ax:0 si:20000100 di:ffffffffff600000 [476995.176086] exe[24358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c424e44839 cs:33 sp:7fce79e63ee8 ax:0 si:20000100 di:ffffffffff600000 [477379.400321] exe[11255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0906c9839 cs:33 sp:7f9afddbb858 ax:0 si:55c090722062 di:ffffffffff600000 [477379.481624] exe[16598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0906c9839 cs:33 sp:7f9afdd9a858 ax:0 si:55c090722062 di:ffffffffff600000 [477379.620654] exe[16721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0906c9839 cs:33 sp:7f9afddbb858 ax:0 si:55c090722062 di:ffffffffff600000 [477429.917580] potentially unexpected fatal signal 5. [477429.922632] CPU: 54 PID: 31012 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [477429.933738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [477429.943172] RIP: 0033:0x7fffffffe062 [477429.946950] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [477429.966045] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [477429.971510] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [477429.978876] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [477429.986245] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [477429.994950] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [477430.002300] R13: 0000000000000004 R14: 000000c000182680 R15: 00000000000e65c7 [477430.009668] FS: 00000000022860f0 GS: 0000000000000000 [477612.803176] potentially unexpected fatal signal 5. [477612.808223] CPU: 12 PID: 951991 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [477612.818649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [477612.828106] RIP: 0033:0x7fffffffe062 [477612.831903] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [477612.850911] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [477612.856388] RAX: 000000000000cb93 RBX: 0000000000000000 RCX: 00007fffffffe05a [477612.865124] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [477612.872495] RBP: 000000c000193e38 R08: 000000c00057cb50 R09: 0000000000000000 [477612.879853] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [477612.887225] R13: 0000000000000030 R14: 000000c000164d00 R15: 00000000000e81c1 [477612.894581] FS: 000000c000130490 GS: 0000000000000000 [477613.212888] potentially unexpected fatal signal 5. [477613.217933] CPU: 29 PID: 9581 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [477613.228169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [477613.237709] RIP: 0033:0x7fffffffe062 [477613.241714] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [477613.260790] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [477613.266258] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [477613.273622] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [477613.281008] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [477613.288378] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [477613.295746] R13: 0000000000000030 R14: 000000c000164d00 R15: 00000000000e81c1 [477613.303126] FS: 000000c000130490 GS: 0000000000000000 [477623.129981] potentially unexpected fatal signal 5. [477623.135022] CPU: 61 PID: 25297 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [477623.145346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [477623.154884] RIP: 0033:0x7fffffffe062 [477623.158704] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [477623.177788] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [477623.183237] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [477623.191972] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [477623.199413] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [477623.206767] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [477623.214119] R13: 0000000000000012 R14: 000000c00047d380 R15: 00000000000e85e5 [477623.221474] FS: 000000c000130c90 GS: 0000000000000000 [477623.296962] potentially unexpected fatal signal 5. [477623.302035] CPU: 50 PID: 52470 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [477623.312377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [477623.321832] RIP: 0033:0x7fffffffe062 [477623.325611] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [477623.344705] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [477623.350149] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [477623.357511] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [477623.364849] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [477623.372232] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [477623.379591] R13: 0000000000000012 R14: 000000c00047d380 R15: 00000000000e85e5 [477623.386059] potentially unexpected fatal signal 5. [477623.386950] FS: 000000c000130c90 GS: 0000000000000000 [477623.392091] CPU: 18 PID: 52474 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [477623.394186] potentially unexpected fatal signal 5. [477623.394189] CPU: 64 PID: 953654 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [477623.394191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [477623.394196] RIP: 0033:0x7fffffffe062 [477623.394199] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [477623.394200] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [477623.394202] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [477623.394202] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [477623.394203] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [477623.394203] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [477623.394204] R13: 0000000000000012 R14: 000000c00047d380 R15: 00000000000e85e5 [477623.394205] FS: 000000c000130c90 GS: 0000000000000000 [477623.474157] potentially unexpected fatal signal 5. [477623.475663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [477623.475667] RIP: 0033:0x7fffffffe062 [477623.475672] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [477623.483051] CPU: 58 PID: 52472 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [477623.483053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [477623.483059] RIP: 0033:0x7fffffffe062 [477623.483063] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [477623.483064] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [477623.483066] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [477623.483067] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [477623.483067] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [477623.483068] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [477623.483069] R13: 0000000000000012 R14: 000000c00047d380 R15: 00000000000e85e5 [477623.483070] FS: 000000c000130c90 GS: 0000000000000000 [477623.636419] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [477623.641878] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [477623.649245] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [477623.656613] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [477623.663967] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [477623.671331] R13: 0000000000000012 R14: 000000c00047d380 R15: 00000000000e85e5 [477623.680144] FS: 000000c000130c90 GS: 0000000000000000 [478272.205033] potentially unexpected fatal signal 5. [478272.210121] CPU: 63 PID: 73386 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [478272.220460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [478272.229934] RIP: 0033:0x7fffffffe062 [478272.233804] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [478272.252793] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [478272.258250] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [478272.265600] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [478272.272961] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [478272.280333] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [478272.289056] R13: 0000000000000004 R14: 000000c000182b60 R15: 00000000000ee991 [478272.296409] FS: 000000c000131890 GS: 0000000000000000 [479100.197486] exe[97918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2a6df8839 cs:33 sp:7fb72c936ee8 ax:0 si:20000180 di:ffffffffff600000 [479100.597284] exe[101087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2a6df8839 cs:33 sp:7fb72c936ee8 ax:0 si:20000180 di:ffffffffff600000 [479100.744152] exe[101067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2a6df8839 cs:33 sp:7fb72c936ee8 ax:0 si:20000180 di:ffffffffff600000 [479362.241906] exe[108356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e1d200839 cs:33 sp:7f4283b0fee8 ax:0 si:20000a80 di:ffffffffff600000 [479362.340054] exe[103975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e1d200839 cs:33 sp:7f4283aeeee8 ax:0 si:20000a80 di:ffffffffff600000 [479362.340326] exe[109082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e1d200839 cs:33 sp:7f4283b0fee8 ax:0 si:20000a80 di:ffffffffff600000 [479362.430479] exe[104016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e1d200839 cs:33 sp:7f4283b0fee8 ax:0 si:20000a80 di:ffffffffff600000 [480568.034907] potentially unexpected fatal signal 5. [480568.040069] CPU: 92 PID: 125902 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [480568.050471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [480568.060100] RIP: 0033:0x7fffffffe062 [480568.063889] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [480568.082895] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [480568.088406] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [480568.095768] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [480568.103113] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [480568.111842] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [480568.119349] R13: 0000000000000004 R14: 000000c0005809c0 R15: 0000000000009086 [480568.128097] FS: 00000000022860f0 GS: 0000000000000000 [480568.142936] potentially unexpected fatal signal 5. [480568.148254] CPU: 53 PID: 125901 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [480568.160128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [480568.171215] RIP: 0033:0x7fffffffe062 [480568.176363] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [480568.196844] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [480568.203668] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [480568.212377] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [480568.219727] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [480568.227070] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [480568.234441] R13: 0000000000000004 R14: 000000c0005809c0 R15: 0000000000009086 [480568.243263] FS: 00000000022860f0 GS: 0000000000000000 [481040.535825] potentially unexpected fatal signal 5. [481040.540874] CPU: 48 PID: 56858 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [481040.551186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [481040.560706] RIP: 0033:0x7fffffffe062 [481040.564487] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [481040.583487] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [481040.589012] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [481040.596376] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [481040.603737] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [481040.611119] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [481040.619842] R13: 0000000000000004 R14: 000000c0004929c0 R15: 000000000000b9bf [481040.628572] FS: 000000c000130890 GS: 0000000000000000 [481681.678025] exe[116937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c9fc9540a cs:33 sp:7f87845feee8 ax:12 si:ffffffffff600000 di:562c9fd01ff2 [481682.425054] exe[133488] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c9fc9540a cs:33 sp:7f87845bcee8 ax:12 si:ffffffffff600000 di:562c9fd01ff2 [481682.543823] exe[148656] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c9fc9540a cs:33 sp:7f87845feee8 ax:12 si:ffffffffff600000 di:562c9fd01ff2 [482391.947427] exe[168999] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555742c41b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:26a68400 [482392.271554] exe[177857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555742c41b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:26a68400 [482392.289652] exe[189634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555742c41b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:26a68400 [482392.294955] exe[169016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555742c41b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:26a68400 [482392.297410] exe[177996] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555742c41b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:26a68400 [482392.300802] exe[177802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555742c41b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:26a68400 [482392.309296] exe[177854] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555742c41b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:26a68400 [482392.311926] exe[182673] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555742c41b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:26a68400 [482392.335280] exe[177525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555742c41b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:26a68400 [482392.352130] exe[178371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555742c41b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:26a68400 [482559.512564] warn_bad_vsyscall: 26 callbacks suppressed [482559.512567] exe[188924] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55984bdf040a cs:33 sp:7fad4e541ee8 ax:12 si:ffffffffff600000 di:55984be5cff2 [482559.609052] exe[188930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55984bdf040a cs:33 sp:7fad4e520ee8 ax:12 si:ffffffffff600000 di:55984be5cff2 [482559.707124] exe[154624] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55984bdf040a cs:33 sp:7fad4e520ee8 ax:12 si:ffffffffff600000 di:55984be5cff2 [482559.707726] exe[141964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55984bdf040a cs:33 sp:7fad4e541ee8 ax:12 si:ffffffffff600000 di:55984be5cff2 [483101.408836] exe[187042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1b8663839 cs:33 sp:7ff4429ec858 ax:0 si:55a1b86bc097 di:ffffffffff600000 [483101.522014] exe[193253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1b8663839 cs:33 sp:7ff4429cb858 ax:0 si:55a1b86bc097 di:ffffffffff600000 [483101.643531] exe[184414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1b8663839 cs:33 sp:7ff4429ec858 ax:0 si:55a1b86bc097 di:ffffffffff600000 [483279.432703] exe[119446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c940c09839 cs:33 sp:7fc84ef23ee8 ax:0 si:20004f40 di:ffffffffff600000 [483280.231689] exe[118583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c940c09839 cs:33 sp:7fc84eee1ee8 ax:0 si:20004f40 di:ffffffffff600000 [483281.216115] exe[121548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c940c09839 cs:33 sp:7fc84ef23ee8 ax:0 si:20004f40 di:ffffffffff600000 [483311.477730] exe[159227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9d8876839 cs:33 sp:7ea7656c1858 ax:0 si:55c9d88cf097 di:ffffffffff600000 [483312.323733] exe[159087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9d8876839 cs:33 sp:7ea7656e2858 ax:0 si:55c9d88cf097 di:ffffffffff600000 [483312.413987] exe[158671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9d8876839 cs:33 sp:7ea7656c1858 ax:0 si:55c9d88cf097 di:ffffffffff600000 [483660.657297] exe[183638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a06993839 cs:33 sp:7ff1dc69aee8 ax:0 si:20000a80 di:ffffffffff600000 [483660.929638] exe[189467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a06993839 cs:33 sp:7ff1dc658ee8 ax:0 si:20000a80 di:ffffffffff600000 [483661.081614] exe[197410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a06993839 cs:33 sp:7ff1dc69aee8 ax:0 si:20000a80 di:ffffffffff600000 [484179.640960] potentially unexpected fatal signal 5. [484179.646019] CPU: 19 PID: 226330 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [484179.656428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [484179.665908] RIP: 0033:0x7fffffffe062 [484179.669899] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [484179.688966] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [484179.694767] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [484179.702144] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [484179.709491] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [484179.716855] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [484179.724299] R13: 0000000000000008 R14: 000000c00047fba0 R15: 000000000001ecca [484179.731647] FS: 000000c000130890 GS: 0000000000000000 [484572.576165] potentially unexpected fatal signal 5. [484572.581318] CPU: 45 PID: 241392 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [484572.591775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [484572.601273] RIP: 0033:0x7fffffffe062 [484572.605118] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [484572.625534] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [484572.633685] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [484572.642464] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [484572.651303] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [484572.658694] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [484572.666126] R13: 0000000000000012 R14: 000000c00047d1e0 R15: 000000000003a8d6 [484572.674925] FS: 0000000001fb4cd0 GS: 0000000000000000 [484631.917051] potentially unexpected fatal signal 5. [484631.922101] CPU: 30 PID: 238604 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [484631.930139] potentially unexpected fatal signal 5. [484631.932518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [484631.937514] CPU: 58 PID: 240802 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [484631.937517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [484631.937522] RIP: 0033:0x7fffffffe062 [484631.937524] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [484631.937525] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [484631.937527] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [484631.937528] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [484631.937529] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [484631.937529] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [484631.937530] R13: 0000000000000004 R14: 000000c000518d00 R15: 000000000003a3fd [484631.937531] FS: 000000c000180090 GS: 0000000000000000 [484632.047422] RIP: 0033:0x7fffffffe062 [484632.051262] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [484632.071649] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [484632.078500] RAX: 000000000003bc35 RBX: 0000000000000000 RCX: 00007fffffffe05a [484632.087286] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [484632.096018] RBP: 000000c00018fe38 R08: 000000c00052c1f0 R09: 0000000000000000 [484632.104771] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [484632.113537] R13: 0000000000000004 R14: 000000c000518d00 R15: 000000000003a3fd [484632.122287] FS: 000000c000180090 GS: 0000000000000000 [484651.999653] potentially unexpected fatal signal 5. [484652.004706] CPU: 4 PID: 137176 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [484652.015060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [484652.024599] RIP: 0033:0x7fffffffe062 [484652.026241] potentially unexpected fatal signal 5. [484652.028381] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [484652.028385] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [484652.033409] CPU: 63 PID: 144959 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [484652.033414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [484652.052399] RAX: 000000000003c3fc RBX: 0000000000000000 RCX: 00007fffffffe05a [484652.052400] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [484652.052401] RBP: 000000c00013de38 R08: 000000c0001f2a60 R09: 0000000000000000 [484652.052401] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [484652.052402] R13: 000000000000003c R14: 000000c000493040 R15: 00000000000217bf [484652.052403] FS: 000000c000680090 GS: 0000000000000000 [484652.121717] RIP: 0033:0x7fffffffe062 [484652.125563] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [484652.145955] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [484652.152815] RAX: 000000000003c3f4 RBX: 0000000000000000 RCX: 00007fffffffe05a [484652.160197] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [484652.167577] RBP: 000000c00013de38 R08: 000000c00ec543d0 R09: 0000000000000000 [484652.174962] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [484652.183801] R13: 0000000000000004 R14: 000000c000500d00 R15: 00000000000217b6 [484652.191200] FS: 00000000022860f0 GS: 0000000000000000 [484681.346287] potentially unexpected fatal signal 5. [484681.351349] CPU: 48 PID: 248776 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [484681.361765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [484681.371217] RIP: 0033:0x7fffffffe062 [484681.375032] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [484681.394061] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [484681.400854] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [484681.409601] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [484681.418364] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [484681.425738] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [484681.433192] R13: 0000000000000020 R14: 000000c0004b2820 R15: 000000000003a8de [484681.441944] FS: 000000c000180090 GS: 0000000000000000 [487322.945335] exe[292759] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632b8b4f839 cs:33 sp:7eb08ecb0ee8 ax:0 si:20000080 di:ffffffffff600000 [487322.983269] exe[304714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632b8b4f839 cs:33 sp:7eb08ecb0ee8 ax:0 si:20000080 di:ffffffffff600000 [487323.030868] exe[292721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632b8b4f839 cs:33 sp:7eb08ecb0ee8 ax:0 si:20000080 di:ffffffffff600000 [488094.922538] exe[272580] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d3810839 cs:33 sp:7f6cf6522858 ax:0 si:5604d3869097 di:ffffffffff600000 [488095.008276] exe[274175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d3810839 cs:33 sp:7f6cf6501858 ax:0 si:5604d3869097 di:ffffffffff600000 [488095.062211] exe[318759] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d3810839 cs:33 sp:7f6cf64bf858 ax:0 si:5604d3869097 di:ffffffffff600000 [488225.289391] exe[344481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d94b4b1b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000000 [488226.615309] exe[344481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d94b4b1b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000000 [489001.196173] potentially unexpected fatal signal 5. [489001.201317] CPU: 0 PID: 380849 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [489001.211721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [489001.221416] RIP: 0033:0x7fffffffe062 [489001.225229] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [489001.244414] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [489001.249871] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [489001.257253] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [489001.266015] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [489001.273412] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [489001.280780] R13: 0000000000000004 R14: 000000c000497a00 R15: 000000000004712d [489001.289529] FS: 000000c000130c90 GS: 0000000000000000 [489017.128055] potentially unexpected fatal signal 5. [489017.133201] CPU: 86 PID: 382406 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [489017.143632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [489017.153080] RIP: 0033:0x7fffffffe062 [489017.156878] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [489017.176152] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [489017.182985] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [489017.191784] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [489017.200547] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [489017.207933] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [489017.216791] R13: 0000000000000004 R14: 000000c0004be680 R15: 000000000004799f [489017.224178] FS: 000000c000130890 GS: 0000000000000000 [489076.787060] exe[384695] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623174c9839 cs:33 sp:7f5c97c48858 ax:0 si:562317522097 di:ffffffffff600000 [489076.826449] exe[386118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623174c9839 cs:33 sp:7f5c97c48858 ax:0 si:562317522097 di:ffffffffff600000 [489076.879601] exe[385193] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623174c9839 cs:33 sp:7f5c97c48858 ax:0 si:562317522097 di:ffffffffff600000 [489076.880816] exe[386116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623174c9839 cs:33 sp:7f5c97c27858 ax:0 si:562317522097 di:ffffffffff600000 [489087.283406] exe[385817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ad3279839 cs:33 sp:7f80a824a858 ax:0 si:557ad32d2097 di:ffffffffff600000 [489088.054260] exe[366685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ad3279839 cs:33 sp:7f80a8229858 ax:0 si:557ad32d2097 di:ffffffffff600000 [489088.055149] exe[385815] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ad3279839 cs:33 sp:7f80a7dfe858 ax:0 si:557ad32d2097 di:ffffffffff600000 [489088.142203] exe[386984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ad3279839 cs:33 sp:7f80a824a858 ax:0 si:557ad32d2097 di:ffffffffff600000 [489496.867141] exe[397356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b7e259b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:808a000 [489497.011465] exe[397378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b7e259b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:808a000 [489994.088754] exe[369469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56138f6d0839 cs:33 sp:7eb1790fe858 ax:0 si:56138f729070 di:ffffffffff600000 [489994.206921] exe[400056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56138f6d0839 cs:33 sp:7eb1790fe858 ax:0 si:56138f729070 di:ffffffffff600000 [489994.317783] exe[369469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56138f6d0839 cs:33 sp:7eb1790fe858 ax:0 si:56138f729070 di:ffffffffff600000 [490005.890199] exe[400056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fcc7f2839 cs:33 sp:7eeab3cac858 ax:0 si:562fcc84b070 di:ffffffffff600000 [490005.975208] exe[369438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fcc7f2839 cs:33 sp:7eeab3cac858 ax:0 si:562fcc84b070 di:ffffffffff600000 [490006.078433] exe[391958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fcc7f2839 cs:33 sp:7eeab3cac858 ax:0 si:562fcc84b070 di:ffffffffff600000 [490006.174316] exe[398102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fcc7f2839 cs:33 sp:7eeab3cac858 ax:0 si:562fcc84b070 di:ffffffffff600000 [490246.036829] exe[386116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623174c540a cs:33 sp:7f5c97c48ee8 ax:12 si:ffffffffff600000 di:562317531ff2 [490246.082201] exe[385263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623174c540a cs:33 sp:7f5c97c48ee8 ax:12 si:ffffffffff600000 di:562317531ff2 [490512.837610] exe[391351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564275185839 cs:33 sp:7f6136b7b858 ax:0 si:5642751de070 di:ffffffffff600000 [490549.151811] exe[402327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623fc307839 cs:33 sp:7fbd8b0fc858 ax:0 si:5623fc360070 di:ffffffffff600000 [490570.635300] exe[353257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564d27a9839 cs:33 sp:7f5700edd858 ax:0 si:5564d2802070 di:ffffffffff600000 [490690.432716] exe[412457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600fa90e839 cs:33 sp:7f45ba761858 ax:0 si:5600fa967070 di:ffffffffff600000 [490727.216561] exe[414480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4009b1839 cs:33 sp:7eb7e4e52858 ax:0 si:55c400a0a070 di:ffffffffff600000 [490767.916446] exe[407618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556aa3608839 cs:33 sp:7f4709952858 ax:0 si:556aa3661070 di:ffffffffff600000 [490835.308077] exe[414783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56039d195839 cs:33 sp:7fc92737e858 ax:0 si:56039d1ee070 di:ffffffffff600000 [490864.988388] exe[391244] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56304c82b839 cs:33 sp:7f3879307858 ax:0 si:56304c884070 di:ffffffffff600000 [490886.127133] exe[410708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55787f528839 cs:33 sp:7ef30fd36858 ax:0 si:55787f581070 di:ffffffffff600000 [490898.671561] exe[387390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558da036b839 cs:33 sp:7fdabe3c0858 ax:0 si:558da03c4070 di:ffffffffff600000 [490907.904394] exe[417486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56263912b839 cs:33 sp:7fa54571f858 ax:0 si:562639184062 di:ffffffffff600000 [490907.976924] exe[401623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56263912b839 cs:33 sp:7fa54571f858 ax:0 si:562639184062 di:ffffffffff600000 [490908.048530] exe[414595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56263912b839 cs:33 sp:7fa54571f858 ax:0 si:562639184062 di:ffffffffff600000 [490911.136325] exe[379813] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b7e24b839 cs:33 sp:7f20e1dfe858 ax:0 si:559b7e2a4070 di:ffffffffff600000 [490987.738334] exe[395808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cba1abb839 cs:33 sp:7fc594dab858 ax:0 si:55cba1b14070 di:ffffffffff600000 [491009.654216] exe[412446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592dfae5839 cs:33 sp:7f08e15c0858 ax:0 si:5592dfb3e070 di:ffffffffff600000 [491087.921882] exe[418583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55787f528839 cs:33 sp:7ef30fd36858 ax:0 si:55787f581097 di:ffffffffff600000 [491122.776044] exe[395797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f17e586839 cs:33 sp:7fc55eef3858 ax:0 si:55f17e5df070 di:ffffffffff600000 [491143.503356] exe[417856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d94b4a3839 cs:33 sp:7ed246843858 ax:0 si:55d94b4fc070 di:ffffffffff600000 [491653.247427] exe[383074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653765a3839 cs:33 sp:7fc7c61fe858 ax:0 si:5653765fc097 di:ffffffffff600000 [491653.378208] exe[404254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653765a3839 cs:33 sp:7fc7c61fe858 ax:0 si:5653765fc097 di:ffffffffff600000 [491653.464694] exe[384067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653765a3839 cs:33 sp:7fc7c61fe858 ax:0 si:5653765fc097 di:ffffffffff600000 [491664.504085] exe[414038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616ecde7839 cs:33 sp:7f8cf8552858 ax:0 si:5616ece40097 di:ffffffffff600000 [491664.615007] exe[384256] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616ecde7839 cs:33 sp:7f8cf8552858 ax:0 si:5616ece40097 di:ffffffffff600000 [491664.702656] exe[391686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616ecde7839 cs:33 sp:7f8cf8552858 ax:0 si:5616ece40097 di:ffffffffff600000 [491664.803357] exe[414075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616ecde7839 cs:33 sp:7f8cf8552858 ax:0 si:5616ece40097 di:ffffffffff600000 [491664.905749] exe[383690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616ecde7839 cs:33 sp:7f8cf8552858 ax:0 si:5616ece40097 di:ffffffffff600000 [491664.992463] exe[383097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616ecde7839 cs:33 sp:7f8cf8552858 ax:0 si:5616ece40097 di:ffffffffff600000 [491665.082852] exe[384060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616ecde7839 cs:33 sp:7f8cf8552858 ax:0 si:5616ece40097 di:ffffffffff600000 [491665.173897] exe[383998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616ecde7839 cs:33 sp:7f8cf8552858 ax:0 si:5616ece40097 di:ffffffffff600000 [491665.273333] exe[383078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616ecde7839 cs:33 sp:7f8cf8552858 ax:0 si:5616ece40097 di:ffffffffff600000 [491665.357170] exe[414405] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616ecde7839 cs:33 sp:7f8cf8552858 ax:0 si:5616ece40097 di:ffffffffff600000 [491691.855443] warn_bad_vsyscall: 22 callbacks suppressed [491691.855446] exe[391753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491691.932446] exe[386654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491692.016294] exe[383097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491692.046365] exe[391726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491692.151276] exe[383084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be097 di:ffffffffff600000 [491692.238753] exe[386380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be097 di:ffffffffff600000 [491692.313129] exe[384060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e649858 ax:0 si:5586a88be097 di:ffffffffff600000 [491692.382789] exe[393892] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491692.460417] exe[383087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491692.463633] exe[414062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e66a858 ax:0 si:5586a88be062 di:ffffffffff600000 [491697.498456] warn_bad_vsyscall: 105 callbacks suppressed [491697.498460] exe[383164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491698.328027] exe[386376] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491698.398311] exe[404252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491698.428771] exe[386376] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491698.500503] exe[414077] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491698.569299] exe[398383] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491698.600697] exe[414027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e66a858 ax:0 si:5586a88be062 di:ffffffffff600000 [491698.678109] exe[414058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491698.710012] exe[391725] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e66a858 ax:0 si:5586a88be062 di:ffffffffff600000 [491698.781007] exe[414039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be097 di:ffffffffff600000 [491702.525008] warn_bad_vsyscall: 125 callbacks suppressed [491702.525011] exe[386376] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491702.817507] exe[391841] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491702.848545] exe[391716] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491702.925609] exe[404247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491703.030692] exe[384340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491703.120583] exe[383109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e649858 ax:0 si:5586a88be062 di:ffffffffff600000 [491703.218408] exe[391675] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491703.299244] exe[383071] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491703.372343] exe[383217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491703.407591] exe[383224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e66a858 ax:0 si:5586a88be062 di:ffffffffff600000 [491707.577045] warn_bad_vsyscall: 27 callbacks suppressed [491707.577047] exe[386376] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491707.650904] exe[414397] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491707.720737] exe[414397] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491707.746818] exe[414397] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491707.773790] exe[414397] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491707.799794] exe[391811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491707.825729] exe[391811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491707.851272] exe[391811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491707.878024] exe[391811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491707.903749] exe[391811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491712.891006] warn_bad_vsyscall: 81 callbacks suppressed [491712.891009] exe[384571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491713.021753] exe[383092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491713.127636] exe[383018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491713.223164] exe[384571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491713.304023] exe[414420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491713.386431] exe[386628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e649858 ax:0 si:5586a88be062 di:ffffffffff600000 [491714.314706] exe[384060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491715.143730] exe[391726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491715.216147] exe[383097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491715.218298] exe[391726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e66a858 ax:0 si:5586a88be062 di:ffffffffff600000 [491719.340840] warn_bad_vsyscall: 39 callbacks suppressed [491719.340843] exe[386640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491719.418108] exe[383355] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491719.497914] exe[386671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491719.567789] exe[383355] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491719.643875] exe[386656] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491719.723147] exe[383144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491719.792895] exe[383222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491719.860710] exe[414420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491719.934253] exe[391716] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e66a858 ax:0 si:5586a88be062 di:ffffffffff600000 [491720.007982] exe[383177] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491724.446732] warn_bad_vsyscall: 214 callbacks suppressed [491724.446734] exe[383144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491724.481100] exe[383144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491724.556847] exe[391811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491724.584530] exe[384059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491724.655305] exe[391720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be070 di:ffffffffff600000 [491724.727351] exe[386376] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be070 di:ffffffffff600000 [491724.812095] exe[391836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be070 di:ffffffffff600000 [491724.888856] exe[391725] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491724.967859] exe[404260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e68b858 ax:0 si:5586a88be062 di:ffffffffff600000 [491725.047008] exe[383084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586a8865839 cs:33 sp:7f104e66a858 ax:0 si:5586a88be062 di:ffffffffff600000 [491843.419160] warn_bad_vsyscall: 89 callbacks suppressed [491843.419163] exe[391720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56049742c839 cs:33 sp:7fb12bf95858 ax:0 si:560497485062 di:ffffffffff600000 [491843.500904] exe[383224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56049742c839 cs:33 sp:7fb12bf95858 ax:0 si:560497485062 di:ffffffffff600000 [491843.532347] exe[392059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56049742c839 cs:33 sp:7fb12bf95858 ax:0 si:560497485062 di:ffffffffff600000 [491843.608069] exe[383177] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56049742c839 cs:33 sp:7fb12bf95858 ax:0 si:560497485062 di:ffffffffff600000 [491843.639099] exe[383177] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56049742c839 cs:33 sp:7fb12bf95858 ax:0 si:560497485062 di:ffffffffff600000 [491863.330532] exe[392997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600fa90e839 cs:33 sp:7f45ba761858 ax:0 si:5600fa967062 di:ffffffffff600000 [491878.191380] exe[428319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556aa3608839 cs:33 sp:7f4709952858 ax:0 si:556aa3661062 di:ffffffffff600000 [491934.353415] exe[429282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56199727f839 cs:33 sp:7f0bb76b3858 ax:0 si:5619972d8070 di:ffffffffff600000 [491935.025682] exe[425336] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56199727f839 cs:33 sp:7f0bb7692858 ax:0 si:5619972d8070 di:ffffffffff600000 [491935.272798] exe[397482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56199727f839 cs:33 sp:7f0bb76b3858 ax:0 si:5619972d8070 di:ffffffffff600000 [492022.592937] exe[428891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56039d195839 cs:33 sp:7fc92737e858 ax:0 si:56039d1ee062 di:ffffffffff600000 [492074.423085] exe[430169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629ff1b9839 cs:33 sp:7fa86d79e858 ax:0 si:5629ff212062 di:ffffffffff600000 [492130.898083] exe[430740] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc95a4a839 cs:33 sp:7eba5ee87858 ax:0 si:55bc95aa3062 di:ffffffffff600000 [492162.224526] exe[416243] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56199727f839 cs:33 sp:7f0bb76d4858 ax:0 si:5619972d8062 di:ffffffffff600000 [492187.163565] exe[427975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e1829f839 cs:33 sp:7f899de57858 ax:0 si:560e182f8062 di:ffffffffff600000 [492193.992020] exe[406706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f25faa839 cs:33 sp:7f9a81757858 ax:0 si:560f26003062 di:ffffffffff600000 [492295.466930] potentially unexpected fatal signal 5. [492295.471982] CPU: 16 PID: 378510 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [492295.482397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [492295.491940] RIP: 0033:0x7fffffffe062 [492295.495736] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [492295.514837] RSP: 002b:000000c000493d98 EFLAGS: 00000297 [492295.520291] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [492295.527653] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [492295.535010] RBP: 000000c000493e38 R08: 0000000000000000 R09: 0000000000000000 [492295.542376] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000493e20 [492295.549723] R13: 0000000000000036 R14: 000000c000419ba0 R15: 00000000000592af [492295.557096] FS: 000000c000130890 GS: 0000000000000000 [492380.274639] exe[430341] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56278080c839 cs:33 sp:7ec042dd7858 ax:0 si:562780865062 di:ffffffffff600000 [492414.673481] exe[396025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564275185839 cs:33 sp:7f6136b7b858 ax:0 si:5642751de062 di:ffffffffff600000 [492426.683466] exe[441490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a78a74839 cs:33 sp:7f7ff3066858 ax:0 si:558a78acd062 di:ffffffffff600000 [492563.732903] exe[420062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55676cacf839 cs:33 sp:7f8dd0a94858 ax:0 si:55676cb28062 di:ffffffffff600000 [492638.857046] exe[449777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562441b7f839 cs:33 sp:7ed7ed1cc858 ax:0 si:562441bd8062 di:ffffffffff600000 [492678.972691] exe[445045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56311d1ab839 cs:33 sp:7eb76af37858 ax:0 si:56311d204062 di:ffffffffff600000 [493896.641432] exe[479158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9097 di:ffffffffff600000 [493896.740622] exe[476650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9097 di:ffffffffff600000 [493896.831089] exe[440218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9097 di:ffffffffff600000 [493904.659107] exe[465496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e95757d839 cs:33 sp:7edf06869858 ax:0 si:55e9575d6097 di:ffffffffff600000 [493904.773273] exe[475667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e95757d839 cs:33 sp:7edf06869858 ax:0 si:55e9575d6097 di:ffffffffff600000 [493904.879835] exe[440291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e95757d839 cs:33 sp:7edf06869858 ax:0 si:55e9575d6097 di:ffffffffff600000 [493904.980353] exe[440291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e95757d839 cs:33 sp:7edf06869858 ax:0 si:55e9575d6097 di:ffffffffff600000 [493905.087559] exe[475563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e95757d839 cs:33 sp:7edf06869858 ax:0 si:55e9575d6062 di:ffffffffff600000 [493905.202462] exe[475530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e95757d839 cs:33 sp:7edf06869858 ax:0 si:55e9575d6062 di:ffffffffff600000 [493906.296118] exe[475667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493906.404298] exe[475667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493906.520301] exe[446215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78538858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493906.911283] exe[465496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9070 di:ffffffffff600000 [493909.752954] warn_bad_vsyscall: 87 callbacks suppressed [493909.752957] exe[476650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493909.950190] exe[479158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493910.080179] exe[479158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493910.200744] exe[465461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493910.377099] exe[440291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493910.405570] exe[465496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493910.463887] exe[465461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493910.492675] exe[440247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493910.519512] exe[440291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493910.549340] exe[465496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493914.778900] warn_bad_vsyscall: 55 callbacks suppressed [493914.778904] exe[465461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9097 di:ffffffffff600000 [493915.550599] exe[477097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493915.668079] exe[479158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493916.477446] exe[475530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493916.609361] exe[475667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493916.865408] exe[475530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493916.907386] exe[475564] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493917.028889] exe[475563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78538858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493917.144031] exe[475667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493917.245594] exe[465496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493919.787966] warn_bad_vsyscall: 71 callbacks suppressed [493919.787970] exe[475561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493919.820343] exe[475561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493919.848347] exe[475562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493919.880048] exe[475561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493919.907599] exe[479429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493919.933221] exe[475562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493919.962378] exe[475561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493919.991453] exe[475561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493920.020861] exe[475533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493920.050028] exe[475533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493924.919682] warn_bad_vsyscall: 159 callbacks suppressed [493924.919685] exe[479158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493925.077653] exe[477097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493925.856638] exe[475562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493925.979545] exe[440247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493926.013911] exe[440291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493926.723244] exe[475564] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493926.741400] exe[475564] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493927.497205] exe[457950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493927.641902] exe[440195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493927.755254] exe[440195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493930.008441] warn_bad_vsyscall: 17 callbacks suppressed [493930.008444] exe[478196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493930.128440] exe[478539] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493930.254327] exe[440195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493930.358544] exe[440215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493930.394368] exe[440213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493930.528145] exe[440215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493930.640254] exe[477770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493930.670257] exe[477770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493930.702213] exe[477843] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493930.737409] exe[478539] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493935.066557] warn_bad_vsyscall: 117 callbacks suppressed [493935.066561] exe[477843] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493935.211175] exe[478196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493935.328233] exe[475543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493935.478227] exe[475543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493935.588613] exe[477097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493935.724484] exe[477097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493935.752758] exe[476650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493935.864917] exe[476650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493935.896777] exe[477097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493936.205110] exe[440192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493940.078201] warn_bad_vsyscall: 59 callbacks suppressed [493940.078205] exe[477097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493940.197117] exe[479158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493940.287893] exe[478539] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493940.386670] exe[477636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493940.478923] exe[440200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493940.570630] exe[440215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493940.662374] exe[440215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493940.665190] exe[440192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493940.794869] exe[440213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493940.952942] exe[440192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493945.085753] warn_bad_vsyscall: 127 callbacks suppressed [493945.085756] exe[478539] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493945.117099] exe[477770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493945.143210] exe[478196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493945.170481] exe[478539] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493945.198493] exe[477636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493945.226547] exe[478539] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493945.253979] exe[477770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493945.281367] exe[477636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493945.307895] exe[478196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493945.334879] exe[477636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493950.089469] warn_bad_vsyscall: 91 callbacks suppressed [493950.089472] exe[465461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493950.120987] exe[440247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493950.147221] exe[440291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493950.173626] exe[465461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493950.213357] exe[440247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493950.239848] exe[465496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493950.266565] exe[465461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493950.295776] exe[440247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493950.324819] exe[465496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493950.352427] exe[440247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493955.576485] warn_bad_vsyscall: 38 callbacks suppressed [493955.576489] exe[477097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493955.711205] exe[440213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493955.825292] exe[478196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493955.851969] exe[477636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493955.883062] exe[477770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493955.912288] exe[478196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493955.939885] exe[477770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493955.965327] exe[478196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493955.992262] exe[477843] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493956.019125] exe[478196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf78559858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493961.107573] warn_bad_vsyscall: 45 callbacks suppressed [493961.107576] exe[477097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493961.208439] exe[477097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493961.990705] exe[479429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493962.090652] exe[475562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493962.173350] exe[440213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493962.276737] exe[475561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [493962.392720] exe[475543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccc21a0839 cs:33 sp:7eaf7857a858 ax:0 si:55ccc21f9062 di:ffffffffff600000 [495421.753477] potentially unexpected fatal signal 11. [495421.758606] CPU: 86 PID: 473337 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [495421.769017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [495421.778449] RIP: 0033:0x558ff826db17 [495421.782232] Code: 00 00 e9 8f e7 ff ff ba 01 00 00 00 e9 a9 ee ff ff 66 90 41 57 41 56 41 55 49 89 d5 41 54 55 53 48 89 fb 48 81 ec 18 05 00 00 <48> 89 74 24 08 89 4c 24 48 64 48 8b 04 25 28 00 00 00 48 89 84 24 [495421.801362] RSP: 002b:00007f7c80a22c90 EFLAGS: 00010206 [495421.806831] RAX: 00007f7c80a23500 RBX: 00007f7c80a231f0 RCX: 0000000000000000 [495421.814315] RDX: 00007f7c80a23370 RSI: 0000558ff82ef3d8 RDI: 00007f7c80a231f0 [495421.821718] RBP: 00007f7c80a232e0 R08: 0000000000000000 R09: 0000000000000000 [495421.829083] R10: 0000000000001000 R11: 0000000000000293 R12: 0000558ff82ef3d8 [495421.836442] R13: 00007f7c80a23370 R14: 0000000000000000 R15: 00007f7c80a231f0 [495421.843797] FS: 0000558ff8ef4480 GS: 0000000000000000 [495497.324766] potentially unexpected fatal signal 5. [495497.329832] CPU: 42 PID: 546684 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [495497.340260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [495497.349719] RIP: 0033:0x7fffffffe062 [495497.353543] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [495497.372767] RSP: 002b:000000c000673cb0 EFLAGS: 00000297 [495497.379620] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [495497.388386] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000560b86600000 [495497.397122] RBP: 000000c000673d40 R08: 0000000000000000 R09: 0000000000000000 [495497.405887] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000673bd8 [495497.414672] R13: 000000c000138c00 R14: 000000c0002c0680 R15: 00000000000821ac [495497.423421] FS: 00007f6ba3fff6c0 GS: 0000000000000000 [495687.811030] potentially unexpected fatal signal 11. [495687.816191] CPU: 14 PID: 547058 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [495687.822508] potentially unexpected fatal signal 11. [495687.826653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [495687.831812] CPU: 49 PID: 548695 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [495687.831814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [495687.831823] RIP: 0033:0x55c9ba4af9a5 [495687.834220] potentially unexpected fatal signal 5. [495687.834225] CPU: 3 PID: 548107 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [495687.834227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [495687.834233] RIP: 0033:0x7fffffffe062 [495687.834236] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [495687.834237] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [495687.834239] RAX: 0000560600e43000 RBX: 0000000000000000 RCX: 00007fffffffe05a [495687.834240] RDX: 0000000000000001 RSI: 00000000000b7000 RDI: 0000560600e43000 [495687.834241] RBP: 000000c00013de38 R08: 0000000000000009 R09: 000000000c2e3000 [495687.834242] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00013de20 [495687.834242] R13: 0000000000000010 R14: 000000c0005211e0 R15: 00000000000825bd [495687.834244] FS: 0000000001fb4cd0 GS: 0000000000000000 [495687.841392] RIP: 0033:0x5648e5a62b53 [495687.841399] Code: Unable to access opcode bytes at RIP 0x5648e5a62b29. [495687.841401] RSP: 002b:00007f7882909438 EFLAGS: 00010246 [495687.841404] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00005648e5a62b53 [495687.841409] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [495687.851890] Code: c0 0f 85 46 01 00 00 41 0f 11 82 c0 02 00 00 48 89 15 97 19 c5 00 48 89 15 88 19 c5 00 48 89 da 89 ee bf 01 00 00 00 45 31 e4 b6 06 00 00 e9 28 fd ff ff 90 e8 7b 01 00 00 41 89 c4 85 c0 0f [495687.851892] RSP: 002b:00007ff47b5ee440 EFLAGS: 00010246 [495687.851894] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 000055c9ba4afb8d [495687.851895] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [495687.851895] RBP: 0000000000000000 R08: 0000000000000000 R09: 000055c9bb101320 [495687.851896] R10: 000055c9bb102480 R11: 000055c9bb101320 R12: 0000000000000000 [495687.851897] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [495687.851897] FS: 000055c9bb102480 GS: 0000000000000000 [495688.082094] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [495688.089487] R10: 00005648e66b5750 R11: 0000000000000246 R12: 0000000000000001 [495688.098265] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [495688.107046] FS: 00005648e66b5480 GS: 0000000000000000 [495994.652981] exe[596679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f320b1839 cs:33 sp:7ec22887f858 ax:0 si:563f3210a070 di:ffffffffff600000 [495994.703917] exe[590248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f320b1839 cs:33 sp:7ec22887f858 ax:0 si:563f3210a070 di:ffffffffff600000 [495994.752574] exe[587035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f320b1839 cs:33 sp:7ec22887f858 ax:0 si:563f3210a070 di:ffffffffff600000 [495994.793164] exe[587495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f320b1839 cs:33 sp:7ec22887f858 ax:0 si:563f3210a070 di:ffffffffff600000 [496794.879111] exe[545438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc83af7839 cs:33 sp:7fdd09082858 ax:0 si:55fc83b50062 di:ffffffffff600000 [497931.505989] exe[555647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e9b233e839 cs:33 sp:7fd13667b858 ax:0 si:55e9b2397097 di:ffffffffff600000 [497931.662532] exe[578347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e9b233e839 cs:33 sp:7fd136659858 ax:0 si:55e9b2397097 di:ffffffffff600000 [497931.804825] exe[636231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e9b233e839 cs:33 sp:7fd13667b858 ax:0 si:55e9b2397097 di:ffffffffff600000 [498424.986540] potentially unexpected fatal signal 5. [498424.991608] CPU: 51 PID: 509051 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [498425.002017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [498425.011540] RIP: 0033:0x7fffffffe062 [498425.015551] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [498425.034716] RSP: 002b:000000c0001cfd98 EFLAGS: 00000297 [498425.040202] RAX: 00000000000a0fa9 RBX: 0000000000000000 RCX: 00007fffffffe05a [498425.047556] RDX: 0000000000000000 RSI: 000000c0001d0000 RDI: 0000000000012f00 [498425.054912] RBP: 000000c0001cfe38 R08: 000000c008ff6790 R09: 0000000000000000 [498425.062342] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0001cfe20 [498425.069699] R13: 0000000000000012 R14: 000000c00021f1e0 R15: 000000000007a25b [498425.077066] FS: 000000c000500090 GS: 0000000000000000 [498425.238176] potentially unexpected fatal signal 5. [498425.243337] CPU: 52 PID: 659365 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [498425.253853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [498425.263307] RIP: 0033:0x7fffffffe062 [498425.268490] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [498425.288948] RSP: 002b:000000c0001cfd98 EFLAGS: 00000297 [498425.295765] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [498425.303119] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [498425.310472] RBP: 000000c0001cfe38 R08: 0000000000000000 R09: 0000000000000000 [498425.319190] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0001cfe20 [498425.326549] R13: 0000000000000012 R14: 000000c00021f1e0 R15: 000000000007a25b [498425.333899] FS: 000000c000500090 GS: 0000000000000000 [498549.927621] potentially unexpected fatal signal 5. [498549.932695] CPU: 52 PID: 512855 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [498549.943142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [498549.952605] RIP: 0033:0x7fffffffe062 [498549.956403] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [498549.975405] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [498549.980849] RAX: 00000000000a1fcd RBX: 0000000000000000 RCX: 00007fffffffe05a [498549.988200] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [498549.995641] RBP: 000000c00018fe38 R08: 000000c002f13d20 R09: 0000000000000000 [498550.003000] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [498550.010524] R13: 0000000000000004 R14: 000000c000501520 R15: 000000000007b3e8 [498550.018072] FS: 000000c000130490 GS: 0000000000000000 [498550.104076] potentially unexpected fatal signal 5. [498550.109124] CPU: 68 PID: 663497 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [498550.119567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [498550.129016] RIP: 0033:0x7fffffffe062 [498550.132813] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [498550.142839] potentially unexpected fatal signal 5. [498550.151931] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [498550.158380] CPU: 6 PID: 663498 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [498550.158382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [498550.158390] RIP: 0033:0x7fffffffe062 [498550.174290] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [498550.183715] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [498550.183716] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [498550.183717] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [498550.183718] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [498550.183719] R13: 0000000000000004 R14: 000000c000501520 R15: 000000000007b3e8 [498550.183719] FS: 000000c000130490 GS: 0000000000000000 [498550.200514] potentially unexpected fatal signal 5. [498550.208308] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [498550.208311] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [498550.208312] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [498550.208313] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [498550.208314] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [498550.208314] R13: 0000000000000004 R14: 000000c000501520 R15: 000000000007b3e8 [498550.208315] FS: 000000c000130490 GS: 0000000000000000 [498550.244167] potentially unexpected fatal signal 5. [498550.245575] CPU: 77 PID: 505307 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [498550.251025] CPU: 50 PID: 663485 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [498550.251028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [498550.251035] RIP: 0033:0x7fffffffe062 [498550.251039] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [498550.251040] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [498550.251042] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [498550.251043] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [498550.251044] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [498550.251044] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [498550.251045] R13: 0000000000000004 R14: 000000c000501520 R15: 000000000007b3e8 [498550.251046] FS: 000000c000130490 GS: 0000000000000000 [498550.415458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [498550.423813] potentially unexpected fatal signal 5. [498550.424932] RIP: 0033:0x7fffffffe062 [498550.429990] CPU: 63 PID: 663478 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [498550.429992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [498550.429999] RIP: 0033:0x7fffffffe062 [498550.435177] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [498550.435180] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [498550.435182] RAX: 00000000000a1fcb RBX: 0000000000000000 RCX: 00007fffffffe05a [498550.435184] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [498550.435186] RBP: 000000c00018fe38 R08: 000000c000504d30 R09: 0000000000000000 [498550.435190] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [498550.445595] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [498550.445596] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [498550.445599] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [498550.445601] potentially unexpected fatal signal 5. [498550.445602] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [498550.445602] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [498550.445605] CPU: 62 PID: 625118 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [498550.445606] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [498550.445606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [498550.445607] R13: 0000000000000004 R14: 000000c000501520 R15: 000000000007b3e8 [498550.445610] RIP: 0033:0x7fffffffe062 [498550.445611] FS: 000000c000130490 GS: 0000000000000000 [498550.445612] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [498550.445614] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [498550.445615] RAX: 00000000000a1fcc RBX: 0000000000000000 RCX: 00007fffffffe05a [498550.445616] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [498550.445616] RBP: 000000c00018fe38 R08: 000000c0078fb2d0 R09: 0000000000000000 [498550.445617] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [498550.445617] R13: 0000000000000004 R14: 000000c000501520 R15: 000000000007b3e8 [498550.445618] FS: 000000c000130490 GS: 0000000000000000 [498550.583015] potentially unexpected fatal signal 5. [498550.588199] R13: 0000000000000004 R14: 000000c000501520 R15: 000000000007b3e8 [498550.599041] CPU: 1 PID: 663503 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [498550.599044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [498550.599050] RIP: 0033:0x7fffffffe062 [498550.599054] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [498550.599055] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [498550.599058] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [498550.599058] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [498550.599059] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [498550.599060] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [498550.599060] R13: 0000000000000004 R14: 000000c000501520 R15: 000000000007b3e8 [498550.599061] FS: 000000c000130490 GS: 0000000000000000 [498550.799285] FS: 000000c000130490 GS: 0000000000000000 [499058.746781] potentially unexpected fatal signal 5. [499058.751745] potentially unexpected fatal signal 5. [499058.751878] CPU: 91 PID: 554144 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [499058.756906] CPU: 67 PID: 550669 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [499058.756909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [499058.756915] RIP: 0033:0x7fffffffe062 [499058.756918] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [499058.756920] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [499058.756922] RAX: 00000000000a5bf6 RBX: 0000000000000000 RCX: 00007fffffffe05a [499058.756923] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [499058.756923] RBP: 000000c00013de38 R08: 000000c0007d70f0 R09: 0000000000000000 [499058.756924] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [499058.756924] R13: 000000000000001a R14: 000000c00051e820 R15: 00000000000846f9 [499058.756925] FS: 000000c000600090 GS: 0000000000000000 [499058.759626] potentially unexpected fatal signal 5. [499058.767373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [499058.777748] CPU: 95 PID: 576780 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [499058.777750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [499058.777755] RIP: 0033:0x7fffffffe062 [499058.777758] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [499058.777759] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [499058.777761] RAX: 00000000000a5bfa RBX: 0000000000000000 RCX: 00007fffffffe05a [499058.777762] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [499058.777763] RBP: 000000c00013de38 R08: 000000c032e2c970 R09: 0000000000000000 [499058.777763] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [499058.777764] R13: 000000000000001a R14: 000000c00051e820 R15: 00000000000846f9 [499058.777765] FS: 000000c000600090 GS: 0000000000000000 [499058.973908] RIP: 0033:0x7fffffffe062 [499058.977744] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [499058.998186] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [499059.004983] RAX: 00000000000a5bfc RBX: 0000000000000000 RCX: 00007fffffffe05a [499059.013746] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [499059.021104] RBP: 000000c00013de38 R08: 000000c03ca20c40 R09: 0000000000000000 [499059.028492] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [499059.035861] R13: 000000000000001a R14: 000000c00051e820 R15: 00000000000846f9 [499059.044615] FS: 000000c000600090 GS: 0000000000000000 [499268.306543] potentially unexpected fatal signal 5. [499268.311585] CPU: 10 PID: 688655 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [499268.314206] potentially unexpected fatal signal 5. [499268.315111] potentially unexpected fatal signal 5. [499268.315116] CPU: 60 PID: 688619 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [499268.315118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [499268.315124] RIP: 0033:0x7fffffffe062 [499268.315127] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [499268.315128] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [499268.315131] RAX: 00000000000a8210 RBX: 0000000000000000 RCX: 00007fffffffe05a [499268.315132] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [499268.315132] RBP: 000000c00013de38 R08: 000000c00067cb50 R09: 0000000000000000 [499268.315133] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [499268.315134] R13: 0000000000000008 R14: 000000c0004d1a00 R15: 00000000000a801a [499268.315135] FS: 00000000022860f0 GS: 0000000000000000 [499268.322006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [499268.327077] CPU: 73 PID: 688654 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [499268.327080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [499268.327084] RIP: 0033:0x7fffffffe062 [499268.327088] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [499268.327089] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [499268.327092] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [499268.327092] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [499268.327094] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [499268.327094] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [499268.327095] R13: 0000000000000008 R14: 000000c0004d1a00 R15: 00000000000a801a [499268.327097] FS: 00000000022860f0 GS: 0000000000000000 [499268.544592] RIP: 0033:0x7fffffffe062 [499268.549786] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [499268.570340] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [499268.577171] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [499268.585928] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [499268.594673] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [499268.603414] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [499268.612165] R13: 0000000000000008 R14: 000000c0004d1a00 R15: 00000000000a801a [499268.620910] FS: 00000000022860f0 GS: 0000000000000000 [499350.224001] potentially unexpected fatal signal 5. [499350.229075] CPU: 37 PID: 690676 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [499350.239620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [499350.249201] RIP: 0033:0x7fffffffe062 [499350.253067] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [499350.272195] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [499350.277755] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [499350.285144] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [499350.294001] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [499350.302743] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [499350.311494] R13: 0000000000000004 R14: 000000c0001a0820 R15: 00000000000a213f [499350.320219] FS: 00000000022860f0 GS: 0000000000000000 [499375.044410] potentially unexpected fatal signal 5. [499375.049461] CPU: 67 PID: 688179 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [499375.059982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [499375.069455] RIP: 0033:0x7fffffffe062 [499375.073286] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [499375.092298] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [499375.097791] RAX: 00000000000a916c RBX: 0000000000000000 RCX: 00007fffffffe05a [499375.106550] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [499375.115310] RBP: 000000c00018fe38 R08: 000000c0007ec010 R09: 0000000000000000 [499375.124089] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [499375.132824] R13: 0000000000000004 R14: 000000c000182b60 R15: 00000000000a801f [499375.141564] FS: 000000c000130490 GS: 0000000000000000 [500316.021581] potentially unexpected fatal signal 5. [500316.026630] CPU: 3 PID: 725981 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [500316.036952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [500316.046422] RIP: 0033:0x7fffffffe062 [500316.050319] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [500316.069420] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [500316.074890] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [500316.082262] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [500316.091145] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [500316.099803] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [500316.108558] R13: 0000000000000004 R14: 000000c000182ea0 R15: 00000000000b0faa [500316.117274] FS: 00000000022860f0 GS: 0000000000000000 [500846.310641] exe[740203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55796d5df839 cs:33 sp:7ef5345b9858 ax:0 si:55796d638070 di:ffffffffff600000 [501078.606532] exe[743915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c7aa7d839 cs:33 sp:7eb6bf4ae858 ax:0 si:561c7aad6062 di:ffffffffff600000 [501078.647643] exe[743918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c7aa7d839 cs:33 sp:7eb6bf4ae858 ax:0 si:561c7aad6062 di:ffffffffff600000 [501078.689325] exe[727213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c7aa7d839 cs:33 sp:7eb6bf4ae858 ax:0 si:561c7aad6062 di:ffffffffff600000 [503238.602346] exe[784088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557fe73d0839 cs:33 sp:7faf96b9d858 ax:0 si:557fe7429062 di:ffffffffff600000 [503238.672837] exe[780584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557fe73d0839 cs:33 sp:7faf96b9d858 ax:0 si:557fe7429062 di:ffffffffff600000 [503239.475284] exe[781145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557fe73d0839 cs:33 sp:7faf96b9d858 ax:0 si:557fe7429062 di:ffffffffff600000 [503239.549890] exe[778599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557fe73d0839 cs:33 sp:7faf96b9d858 ax:0 si:557fe7429062 di:ffffffffff600000 [503946.759767] exe[782599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ba2b6c40a cs:33 sp:7f3bfd37aee8 ax:12 si:ffffffffff600000 di:564ba2bd8ff2 [503947.635554] exe[803317] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ba2b6c40a cs:33 sp:7f3bfd359ee8 ax:12 si:ffffffffff600000 di:564ba2bd8ff2 [503947.868327] exe[783685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ba2b6c40a cs:33 sp:7f3bfd3ddee8 ax:12 si:ffffffffff600000 di:564ba2bd8ff2 [504322.569406] potentially unexpected fatal signal 5. [504322.574451] CPU: 60 PID: 759732 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [504322.585155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [504322.594712] RIP: 0033:0x7fffffffe062 [504322.598597] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [504322.617625] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [504322.623164] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [504322.630516] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [504322.637876] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [504322.645257] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [504322.653988] R13: 0000000000000004 R14: 000000c00041c9c0 R15: 00000000000b3dc8 [504322.662730] FS: 000000c0004a8890 GS: 0000000000000000 [504322.905915] potentially unexpected fatal signal 5. [504322.910971] CPU: 10 PID: 814401 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [504322.921403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [504322.930877] RIP: 0033:0x7fffffffe062 [504322.934688] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [504322.953707] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [504322.959255] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [504322.966773] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [504322.974139] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [504322.982883] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [504322.991627] R13: 0000000000000004 R14: 000000c00041c9c0 R15: 00000000000b3dc8 [504323.000466] FS: 000000c0004a8890 GS: 0000000000000000 [504454.477542] exe[786057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56226df07839 cs:33 sp:7ef276e9c858 ax:0 si:56226df60070 di:ffffffffff600000 [504696.194225] exe[817523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a289b6a839 cs:33 sp:7f8e8cf53858 ax:0 si:55a289bc3070 di:ffffffffff600000 [504696.286446] exe[817953] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a289b6a839 cs:33 sp:7f8e8cf53858 ax:0 si:55a289bc3070 di:ffffffffff600000 [504696.377431] exe[803709] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a289b6a839 cs:33 sp:7f8e8cf53858 ax:0 si:55a289bc3070 di:ffffffffff600000 [504696.434128] exe[817953] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557fe73d0839 cs:33 sp:7faf96b9d858 ax:0 si:557fe7429070 di:ffffffffff600000 [504696.466097] exe[802920] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a289b6a839 cs:33 sp:7f8e8cf53858 ax:0 si:55a289bc3070 di:ffffffffff600000 [504696.530939] exe[817490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557fe73d0839 cs:33 sp:7faf96b9d858 ax:0 si:557fe7429070 di:ffffffffff600000 [504696.617153] exe[777988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557fe73d0839 cs:33 sp:7faf96b9d858 ax:0 si:557fe7429070 di:ffffffffff600000 [505188.381035] exe[822933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff5d01b839 cs:33 sp:7fe1f6576858 ax:0 si:55ff5d074070 di:ffffffffff600000 [505461.270799] exe[832210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557fe73d0839 cs:33 sp:7faf96b9d858 ax:0 si:557fe7429062 di:ffffffffff600000 [505465.494658] exe[816937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f7a654839 cs:33 sp:7f729e762858 ax:0 si:558f7a6ad070 di:ffffffffff600000 [505465.538535] exe[816784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f7a654839 cs:33 sp:7f729e762858 ax:0 si:558f7a6ad070 di:ffffffffff600000 [505465.583117] exe[828531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f7a654839 cs:33 sp:7f729e762858 ax:0 si:558f7a6ad070 di:ffffffffff600000 [506711.480781] exe[867766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbee6be839 cs:33 sp:7fe1618df858 ax:0 si:55fbee717062 di:ffffffffff600000 [506751.744579] potentially unexpected fatal signal 11. [506751.749703] CPU: 78 PID: 868005 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [506751.760168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [506751.769616] RIP: 0033:0x558fafeedb53 [506751.773535] Code: Unable to access opcode bytes at RIP 0x558fafeedb29. [506751.780274] RSP: 002b:00007f6c49319438 EFLAGS: 00010246 [506751.787185] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000558fafeedb53 [506751.794973] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [506751.802330] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [506751.809687] R10: 0000558fb0b40750 R11: 0000000000000246 R12: 0000000000000001 [506751.818423] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [506751.825776] FS: 0000558fb0b40480 GS: 0000000000000000 [506751.831763] potentially unexpected fatal signal 5. [506751.836837] CPU: 65 PID: 816864 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [506751.847255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [506751.858083] RIP: 0033:0x7fffffffe062 [506751.861868] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [506751.880860] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [506751.887706] RAX: 00007ff5e1200000 RBX: 0000000000000000 RCX: 00007fffffffe05a [506751.895067] RDX: 0000000000000001 RSI: 0000000000400000 RDI: 00007ff5e1200000 [506751.902501] RBP: 000000c00013de38 R08: 0000000000000009 R09: 0000000008e00000 [506751.909858] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00013de20 [506751.917200] R13: 0000000000000004 R14: 000000c000786340 R15: 00000000000c6e93 [506751.924556] FS: 000000c000180090 GS: 0000000000000000 [506752.254169] potentially unexpected fatal signal 5. [506752.259244] CPU: 3 PID: 875432 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [506752.269625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [506752.279071] RIP: 0033:0x7fffffffe062 [506752.282871] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [506752.301997] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [506752.307453] RAX: 00007efc5e185000 RBX: 0000000000000000 RCX: 00007fffffffe05a [506752.314801] RDX: 0000000000000003 RSI: 0000000000020000 RDI: 00007efc5e185000 [506752.322157] RBP: 000000c00013de38 R08: 0000000000000009 R09: 000000000bf4e000 [506752.329539] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00013de20 [506752.336948] R13: 0000000000000004 R14: 000000c00047f520 R15: 00000000000c13e3 [506752.344319] FS: 000000c0004d4090 GS: 0000000000000000 [507089.268759] exe[918883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556943562839 cs:33 sp:7f503b0f2ee8 ax:0 si:20000080 di:ffffffffff600000 [507089.584244] exe[919811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f671f9839 cs:33 sp:7fd44b9aaee8 ax:0 si:20000080 di:ffffffffff600000 [507178.732353] exe[911181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56061bb41839 cs:33 sp:7eb92dad1ee8 ax:0 si:20000080 di:ffffffffff600000 [507490.611923] exe[922964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7befc839 cs:33 sp:7ef0db864ee8 ax:0 si:20000080 di:ffffffffff600000 [507492.636992] exe[921165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592af7ab839 cs:33 sp:7f2d70b94ee8 ax:0 si:20000080 di:ffffffffff600000 [507521.959416] exe[929606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557398892839 cs:33 sp:7f08b2bfeee8 ax:0 si:20000080 di:ffffffffff600000 [507522.296418] exe[928399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3e1f62839 cs:33 sp:7f73fb59bee8 ax:0 si:20000080 di:ffffffffff600000 [507881.356534] exe[951156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d445a43839 cs:33 sp:7fab8f7fe858 ax:0 si:55d445a9c070 di:ffffffffff600000 [507882.192033] exe[944898] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d445a43839 cs:33 sp:7fab8f7fe858 ax:0 si:55d445a9c070 di:ffffffffff600000 [507882.237488] exe[947764] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559eaf16d839 cs:33 sp:7fa6a0c3c858 ax:0 si:559eaf1c6070 di:ffffffffff600000 [507882.277954] exe[951156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d445a43839 cs:33 sp:7fab8f7fe858 ax:0 si:55d445a9c070 di:ffffffffff600000 [507883.061622] exe[939849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559eaf16d839 cs:33 sp:7fa6a0c3c858 ax:0 si:559eaf1c6070 di:ffffffffff600000 [507883.072142] exe[944944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d445a43839 cs:33 sp:7fab8f7fe858 ax:0 si:55d445a9c070 di:ffffffffff600000 [507883.072514] exe[899304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f03a38a839 cs:33 sp:7f4b601a9858 ax:0 si:55f03a3e3070 di:ffffffffff600000 [507883.142550] exe[935361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f03a38a839 cs:33 sp:7f4b601a9858 ax:0 si:55f03a3e3070 di:ffffffffff600000 [507883.164050] exe[951647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559eaf16d839 cs:33 sp:7fa6a0c3c858 ax:0 si:559eaf1c6070 di:ffffffffff600000 [507883.243200] exe[948105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f03a38a839 cs:33 sp:7f4b601a9858 ax:0 si:55f03a3e3070 di:ffffffffff600000 [509669.169148] exe[901724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a705c8b839 cs:33 sp:7eac720bc858 ax:0 si:55a705ce4070 di:ffffffffff600000 [509669.211837] exe[901909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a705c8b839 cs:33 sp:7eac720bc858 ax:0 si:55a705ce4070 di:ffffffffff600000 [509669.276638] exe[964564] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a705c8b839 cs:33 sp:7eac720bc858 ax:0 si:55a705ce4070 di:ffffffffff600000 [509669.325373] exe[977409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a705c8b839 cs:33 sp:7eac720bc858 ax:0 si:55a705ce4070 di:ffffffffff600000 [510381.866592] potentially unexpected fatal signal 5. [510381.871637] CPU: 23 PID: 968028 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [510381.882098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [510381.891547] RIP: 0033:0x7fffffffe062 [510381.895354] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [510381.914454] RSP: 002b:000000c000593d98 EFLAGS: 00000297 [510381.921401] RAX: 00000000000f3528 RBX: 0000000000000000 RCX: 00007fffffffe05a [510381.930236] RDX: 0000000000000000 RSI: 000000c000594000 RDI: 0000000000012f00 [510381.938962] RBP: 000000c000593e38 R08: 000000c0091d22e0 R09: 0000000000000000 [510381.946331] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000593e20 [510381.955064] R13: 0000000000000004 R14: 000000c00049f380 R15: 00000000000d7c6b [510381.963875] FS: 000000c000180090 GS: 0000000000000000 [510382.470521] potentially unexpected fatal signal 5. [510382.475558] CPU: 27 PID: 996627 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [510382.487008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [510382.496470] RIP: 0033:0x7fffffffe062 [510382.500252] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [510382.519247] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [510382.524698] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [510382.532052] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [510382.539439] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [510382.546791] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [510382.554229] R13: 0000000000000012 R14: 000000c000500d00 R15: 00000000000d78de [510382.561604] FS: 000000c000180090 GS: 0000000000000000 [510391.958428] potentially unexpected fatal signal 5. [510391.963472] CPU: 59 PID: 997538 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [510391.973987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [510391.983564] RIP: 0033:0x7fffffffe062 [510391.987406] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [510392.007115] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [510392.013936] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [510392.021315] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [510392.028668] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [510392.036063] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [510392.044838] R13: 0000000000000004 R14: 000000c00050da00 R15: 00000000000d856c [510392.053577] FS: 000000c000490890 GS: 0000000000000000 [510396.009139] potentially unexpected fatal signal 5. [510396.014231] CPU: 87 PID: 943225 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [510396.024811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [510396.034278] RIP: 0033:0x7fffffffe062 [510396.038092] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [510396.057101] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [510396.057120] potentially unexpected fatal signal 5. [510396.062551] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [510396.062552] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [510396.062553] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [510396.062554] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [510396.062554] R13: 0000000000000004 R14: 000000c0001a8b60 R15: 00000000000d88cf [510396.062555] FS: 000000c000131490 GS: 0000000000000000 [510396.115419] CPU: 84 PID: 947318 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [510396.125897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [510396.136767] RIP: 0033:0x7fffffffe062 [510396.141947] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [510396.162366] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [510396.167920] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [510396.175293] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [510396.182672] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [510396.191427] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [510396.200162] R13: 0000000000000004 R14: 000000c0001a8b60 R15: 00000000000d88cf [510396.208923] FS: 000000c000131490 GS: 0000000000000000 [511734.960001] exe[49883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e9d644b839 cs:33 sp:7f48ed95b858 ax:0 si:55e9d64a4062 di:ffffffffff600000 [511735.044794] exe[49254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e9d644b839 cs:33 sp:7f48ed95b858 ax:0 si:55e9d64a4062 di:ffffffffff600000 [511735.124648] exe[49305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e9d644b839 cs:33 sp:7f48ed95b858 ax:0 si:55e9d64a4062 di:ffffffffff600000 [511735.205548] exe[10437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e9d644b839 cs:33 sp:7f48ed95b858 ax:0 si:55e9d64a4062 di:ffffffffff600000 [511736.579631] exe[1701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562218756839 cs:33 sp:7f4d70589858 ax:0 si:5622187af070 di:ffffffffff600000 [511736.724424] exe[24848] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562218756839 cs:33 sp:7f4d70568858 ax:0 si:5622187af070 di:ffffffffff600000 [511736.853644] exe[43005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562218756839 cs:33 sp:7f4d70568858 ax:0 si:5622187af070 di:ffffffffff600000 [512279.618161] exe[4491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560af7af0839 cs:33 sp:7ec741424858 ax:0 si:560af7b49070 di:ffffffffff600000 [513451.287833] exe[52572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ccc816839 cs:33 sp:7f65f3b56858 ax:0 si:555ccc86f062 di:ffffffffff600000 [513822.823137] exe[65094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dccbcea839 cs:33 sp:7ecceba43858 ax:0 si:55dccbd43070 di:ffffffffff600000 [513995.749206] potentially unexpected fatal signal 5. [513995.754256] CPU: 65 PID: 40479 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [513995.764598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [513995.774051] RIP: 0033:0x7fffffffe062 [513995.777837] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [513995.796853] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [513995.802341] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [513995.811087] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [513995.818447] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [513995.827199] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [513995.835948] R13: 0000000000000004 R14: 000000c000168680 R15: 00000000000f397a [513995.844682] FS: 000000c000130890 GS: 0000000000000000 [513996.067243] potentially unexpected fatal signal 5. [513996.072362] CPU: 25 PID: 44335 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [513996.082734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [513996.092323] RIP: 0033:0x7fffffffe062 [513996.096171] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [513996.116550] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [513996.123357] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [513996.132171] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [513996.140954] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [513996.149699] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [513996.158437] R13: 0000000000000004 R14: 000000c000168680 R15: 00000000000f397a [513996.167169] FS: 000000c000130890 GS: 0000000000000000 [513996.377256] potentially unexpected fatal signal 5. [513996.383294] CPU: 3 PID: 997782 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [513996.393618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [513996.404431] RIP: 0033:0x7fffffffe062 [513996.409579] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [513996.428582] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [513996.435378] RAX: 0000000000014af2 RBX: 0000000000000000 RCX: 00007fffffffe05a [513996.444108] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [513996.452930] RBP: 000000c000193e38 R08: 000000c0007201f0 R09: 0000000000000000 [513996.460271] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [513996.467621] R13: 0000000000000004 R14: 000000c000168680 R15: 00000000000f397a [513996.474960] FS: 000000c000130890 GS: 0000000000000000 [513996.923720] potentially unexpected fatal signal 5. [513996.928862] CPU: 57 PID: 47725 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [513996.937874] potentially unexpected fatal signal 5. [513996.939170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [513996.944160] CPU: 8 PID: 48089 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [513996.944162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [513996.953592] RIP: 0033:0x7fffffffe062 [513996.953595] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [513996.953596] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [513996.953598] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [513996.953599] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [513996.953600] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [513996.953600] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [513996.953601] R13: 0000000000000004 R14: 000000c000168680 R15: 00000000000f397a [513996.953602] FS: 000000c000130890 GS: 0000000000000000 [513997.046769] RIP: 0033:0x7fffffffe062 [513997.051979] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [513997.072336] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [513997.079164] RAX: 0000000000014af7 RBX: 0000000000000000 RCX: 00007fffffffe05a [513997.086513] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [513997.095243] RBP: 000000c000193e38 R08: 000000c00fd57c30 R09: 0000000000000000 [513997.103987] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [513997.112724] R13: 0000000000000004 R14: 000000c000168680 R15: 00000000000f397a [513997.120098] FS: 000000c000130890 GS: 0000000000000000 [514004.319240] potentially unexpected fatal signal 5. [514004.324292] CPU: 36 PID: 85104 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [514004.334630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [514004.344101] RIP: 0033:0x7fffffffe062 [514004.347945] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [514004.366945] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [514004.372403] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [514004.379768] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [514004.387185] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [514004.395909] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [514004.403256] R13: 0000000000000004 R14: 000000c0001a5860 R15: 00000000000f3d5b [514004.410609] FS: 00000000022860f0 GS: 0000000000000000 [514004.538223] potentially unexpected fatal signal 5. [514004.543293] CPU: 20 PID: 71073 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [514004.553755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [514004.563230] RIP: 0033:0x7fffffffe062 [514004.567093] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [514004.586112] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [514004.591554] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [514004.598944] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [514004.607753] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [514004.615121] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [514004.622491] R13: 0000000000000012 R14: 000000c000481d40 R15: 00000000000f3d6c [514004.629849] FS: 0000000001fb4cd0 GS: 0000000000000000 [514499.705513] exe[98915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b24d7a940a cs:33 sp:7fdf0e5ceee8 ax:12 si:ffffffffff600000 di:55b24d815ff2 [514499.753317] exe[87417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b24d7a940a cs:33 sp:7fdf0e5ceee8 ax:12 si:ffffffffff600000 di:55b24d815ff2 [514499.792093] exe[98445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b24d7a940a cs:33 sp:7fdf0e5ceee8 ax:12 si:ffffffffff600000 di:55b24d815ff2 [516062.972608] potentially unexpected fatal signal 5. [516062.977659] CPU: 65 PID: 154971 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [516062.988083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [516062.997533] RIP: 0033:0x7fffffffe062 [516063.001371] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [516063.020448] RSP: 002b:000000c000687cb0 EFLAGS: 00000297 [516063.027282] RAX: 0000557ddb400000 RBX: 0000000000000000 RCX: 00007fffffffe05a [516063.036294] RDX: 0000000000000001 RSI: 000000000008f000 RDI: 0000557ddb400000 [516063.045088] RBP: 000000c000687d40 R08: 0000000000000009 R09: 0000000007988000 [516063.053852] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c000687bf8 [516063.062587] R13: 000000c00053a000 R14: 000000c000530b60 R15: 00000000000259b4 [516063.071326] FS: 00007f841cebe6c0 GS: 0000000000000000 [516192.170520] exe[118137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b24d7a940a cs:33 sp:7fdf0e58cee8 ax:12 si:ffffffffff600000 di:55b24d815ff2 [516291.783667] potentially unexpected fatal signal 5. [516291.788719] CPU: 61 PID: 157348 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [516291.799141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [516291.808622] RIP: 0033:0x7fffffffe062 [516291.812453] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [516291.832887] RSP: 002b:000000c00082dcb0 EFLAGS: 00000297 [516291.839772] RAX: 0000000000026c9d RBX: 0000000000000000 RCX: 00007fffffffe05a [516291.848554] RDX: 0000000000000000 RSI: 000000c00082e000 RDI: 0000000000012f00 [516291.857284] RBP: 000000c00082dd40 R08: 000000c0001f4010 R09: 0000000000000000 [516291.866201] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00082dbf8 [516291.874951] R13: 0000000002a22520 R14: 000000c000182680 R15: 000000000002668b [516291.883682] FS: 00000000051cc3c0 GS: 0000000000000000 [516533.243924] exe[134516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fa2738040a cs:33 sp:7f56cf93dee8 ax:12 si:ffffffffff600000 di:55fa273ecff2 [516788.520659] exe[144024] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c6883e839 cs:33 sp:7f506abd7858 ax:0 si:557c68897062 di:ffffffffff600000 [517167.021895] exe[92504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561e082d839 cs:33 sp:7f80b2fe4858 ax:0 si:5561e0886062 di:ffffffffff600000 [517292.628511] exe[145105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c6883e839 cs:33 sp:7f506abd7858 ax:0 si:557c68897070 di:ffffffffff600000 [517435.051713] potentially unexpected fatal signal 5. [517435.056766] CPU: 41 PID: 171667 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [517435.067196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [517435.076643] RIP: 0033:0x7fffffffe062 [517435.080439] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [517435.099439] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [517435.104886] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [517435.112235] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [517435.119670] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [517435.127025] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [517435.134378] R13: 0000000000000004 R14: 000000c00015fba0 R15: 000000000001501d [517435.141729] FS: 000000c00048e090 GS: 0000000000000000 [517435.747552] potentially unexpected fatal signal 5. [517435.752595] CPU: 11 PID: 171669 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [517435.762995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [517435.772585] RIP: 0033:0x7fffffffe062 [517435.776504] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [517435.795520] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [517435.800980] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [517435.808438] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [517435.815808] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [517435.823169] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [517435.830514] R13: 0000000000000012 R14: 000000c00048a680 R15: 0000000000014e67 [517435.837885] FS: 00000000022860f0 GS: 0000000000000000 [517631.563976] potentially unexpected fatal signal 5. [517631.569110] CPU: 12 PID: 122389 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [517631.579524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [517631.589014] RIP: 0033:0x7fffffffe062 [517631.592841] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [517631.611875] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [517631.618759] RAX: 000000000002b497 RBX: 0000000000000000 RCX: 00007fffffffe05a [517631.627513] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [517631.634876] RBP: 000000c00018fe38 R08: 000000c0078add20 R09: 0000000000000000 [517631.642238] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [517631.649631] R13: 0000000000000012 R14: 000000c000509040 R15: 0000000000016002 [517631.657007] FS: 000000c000130490 GS: 0000000000000000 [517855.072861] exe[183870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567d1597839 cs:33 sp:7ee3a1ab3858 ax:0 si:5567d15f0070 di:ffffffffff600000 [521227.896994] potentially unexpected fatal signal 5. [521227.902035] CPU: 4 PID: 325264 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [521227.912347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [521227.921775] RIP: 0033:0x7fffffffe062 [521227.925562] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [521227.944626] RSP: 002b:000000c000583d98 EFLAGS: 00000297 [521227.950085] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [521227.957435] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [521227.966167] RBP: 000000c000583e38 R08: 0000000000000000 R09: 0000000000000000 [521227.973517] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000583e20 [521227.982250] R13: 0000000000000004 R14: 000000c0001a09c0 R15: 000000000002b1f7 [521227.990991] FS: 000000c000588090 GS: 0000000000000000 [521470.500938] potentially unexpected fatal signal 5. [521470.506069] CPU: 10 PID: 270614 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [521470.516687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [521470.526123] RIP: 0033:0x7fffffffe062 [521470.529926] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [521470.549069] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [521470.554529] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [521470.561935] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [521470.569327] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [521470.576723] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [521470.585444] R13: 0000000000000004 R14: 000000c0005029c0 R15: 00000000000319a8 [521470.592802] FS: 000000c000180090 GS: 0000000000000000 [521471.893290] potentially unexpected fatal signal 5. [521471.898370] CPU: 46 PID: 203339 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [521471.908816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [521471.918347] RIP: 0033:0x7fffffffe062 [521471.922146] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [521471.941246] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [521471.946692] RAX: 000000000005639e RBX: 0000000000000000 RCX: 00007fffffffe05a [521471.954093] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [521471.962896] RBP: 000000c000193e38 R08: 000000c0009365b0 R09: 0000000000000000 [521471.971618] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [521471.980361] R13: 0000000000000004 R14: 000000c0005029c0 R15: 00000000000319a8 [521471.989107] FS: 000000c000180090 GS: 0000000000000000 [522834.320036] potentially unexpected fatal signal 5. [522834.325211] CPU: 4 PID: 289991 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [522834.335821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [522834.345407] RIP: 0033:0x7fffffffe062 [522834.349257] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [522834.369647] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [522834.376491] RAX: 000000000006398f RBX: 0000000000000000 RCX: 00007fffffffe05a [522834.385230] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [522834.393985] RBP: 000000c000193e38 R08: 000000c018b48970 R09: 0000000000000000 [522834.402732] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [522834.411469] R13: 0000000000000022 R14: 000000c0004a8340 R15: 000000000004278e [522834.420229] FS: 0000000001fb4cd0 GS: 0000000000000000 [523072.482553] exe[407965] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564928cf5839 cs:33 sp:7f34629f5858 ax:0 si:564928d4e070 di:ffffffffff600000 [523072.706895] exe[417952] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564928cf5839 cs:33 sp:7f34629f5858 ax:0 si:564928d4e070 di:ffffffffff600000 [523072.860731] exe[405141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564928cf5839 cs:33 sp:7f34629f5858 ax:0 si:564928d4e070 di:ffffffffff600000