itioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.177465 345762 task_exit.go:204] [ 591: 592] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.177476 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.177568 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.177621 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.177597 345762 task_exit.go:204] [ 591: 591] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.178265 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.179401 345762 syscalls.go:262] [ 596: 596] Allocating stack with size of 8388608 bytes D0713 08:45:18.179506 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.180486 345762 usertrap_amd64.go:212] [ 596: 596] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.180554 345762 usertrap_amd64.go:106] [ 596: 596] Map a usertrap vma at 63000 D0713 08:45:18.180659 345762 usertrap_amd64.go:122] [ 596: 596] Allocate a new trap: 0xc001a4a6f0 1 D0713 08:45:18.180688 345762 usertrap_amd64.go:225] [ 596: 596] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:18.181242 345762 usertrap_amd64.go:212] [ 596: 596] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.181287 345762 usertrap_amd64.go:122] [ 596: 596] Allocate a new trap: 0xc001a4a6f0 2 D0713 08:45:18.181305 345762 usertrap_amd64.go:225] [ 596: 596] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:18.182197 345762 usertrap_amd64.go:212] [ 596: 596] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.182228 345762 usertrap_amd64.go:122] [ 596: 596] Allocate a new trap: 0xc001a4a6f0 3 D0713 08:45:18.182240 345762 usertrap_amd64.go:225] [ 596: 596] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:18.188714 345762 usertrap_amd64.go:212] [ 596: 596] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.188739 345762 usertrap_amd64.go:122] [ 596: 596] Allocate a new trap: 0xc001a4a6f0 4 D0713 08:45:18.188748 345762 usertrap_amd64.go:225] [ 596: 596] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:18.189826 345762 usertrap_amd64.go:212] [ 596: 596] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.189846 345762 usertrap_amd64.go:122] [ 596: 596] Allocate a new trap: 0xc001a4a6f0 5 D0713 08:45:18.189853 345762 usertrap_amd64.go:225] [ 596: 596] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:18.189872 345762 usertrap_amd64.go:212] [ 596: 596] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.189876 345762 usertrap_amd64.go:122] [ 596: 596] Allocate a new trap: 0xc001a4a6f0 6 D0713 08:45:18.189883 345762 usertrap_amd64.go:225] [ 596: 596] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:18.190166 345762 usertrap_amd64.go:212] [ 596: 596] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.190181 345762 usertrap_amd64.go:122] [ 596: 596] Allocate a new trap: 0xc001a4a6f0 7 D0713 08:45:18.190186 345762 usertrap_amd64.go:225] [ 596: 596] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:18.190282 345762 usertrap_amd64.go:212] [ 596: 597] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.190297 345762 usertrap_amd64.go:122] [ 596: 597] Allocate a new trap: 0xc001a4a6f0 8 D0713 08:45:18.190303 345762 usertrap_amd64.go:225] [ 596: 597] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:18.190454 345762 usertrap_amd64.go:212] [ 596: 597] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.190474 345762 usertrap_amd64.go:122] [ 596: 597] Allocate a new trap: 0xc001a4a6f0 9 D0713 08:45:18.190480 345762 usertrap_amd64.go:225] [ 596: 597] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:18.190640 345762 usertrap_amd64.go:212] [ 596: 596] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.190672 345762 usertrap_amd64.go:122] [ 596: 596] Allocate a new trap: 0xc001a4a6f0 10 D0713 08:45:18.190683 345762 usertrap_amd64.go:225] [ 596: 596] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:18.190788 345762 usertrap_amd64.go:212] [ 596: 596] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:18.190837 345762 usertrap_amd64.go:122] [ 596: 596] Allocate a new trap: 0xc001a4a6f0 11 D0713 08:45:18.190852 345762 usertrap_amd64.go:225] [ 596: 596] Apply the binary patch addr 46b6e0 trap addr 63370 ([184 24 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:18.198599 345762 usertrap_amd64.go:212] [ 596: 596] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.198649 345762 usertrap_amd64.go:122] [ 596: 596] Allocate a new trap: 0xc001a4a6f0 12 D0713 08:45:18.198669 345762 usertrap_amd64.go:225] [ 596: 596] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:18.201417 345762 usertrap_amd64.go:212] [ 596: 597] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.201453 345762 usertrap_amd64.go:122] [ 596: 597] Allocate a new trap: 0xc001a4a6f0 13 D0713 08:45:18.201467 345762 usertrap_amd64.go:225] [ 596: 597] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:18.201525 345762 usertrap_amd64.go:212] [ 596: 597] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.201568 345762 usertrap_amd64.go:122] [ 596: 597] Allocate a new trap: 0xc001a4a6f0 14 D0713 08:45:18.201587 345762 usertrap_amd64.go:225] [ 596: 597] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:18.201653 345762 task_signals.go:470] [ 596: 596] Notified of signal 23 D0713 08:45:18.201729 345762 task_signals.go:220] [ 596: 596] Signal 23: delivering to handler D0713 08:45:18.209943 345762 usertrap_amd64.go:212] [ 596: 596] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.209965 345762 usertrap_amd64.go:122] [ 596: 596] Allocate a new trap: 0xc001a4a6f0 15 D0713 08:45:18.209980 345762 usertrap_amd64.go:225] [ 596: 596] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0713 08:45:18.210061 345762 task_exit.go:204] [ 596: 596] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.210091 345762 task_exit.go:204] [ 596: 596] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.210122 345762 task_signals.go:204] [ 596: 599] Signal 596, PID: 599, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.210117 345762 task_signals.go:204] [ 596: 598] Signal 596, PID: 598, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.210143 345762 task_exit.go:204] [ 596: 599] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.210193 345762 task_signals.go:204] [ 596: 600] Signal 596, PID: 600, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.210211 345762 task_exit.go:204] [ 596: 598] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.210221 345762 task_signals.go:204] [ 596: 597] Signal 596, PID: 597, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.210242 345762 task_exit.go:204] [ 596: 598] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.210247 345762 task_exit.go:204] [ 596: 598] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.210264 345762 task_exit.go:204] [ 596: 600] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.210272 345762 task_exit.go:204] [ 596: 600] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.210276 345762 task_exit.go:204] [ 596: 600] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.210285 345762 task_exit.go:204] [ 596: 599] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.210290 345762 task_exit.go:204] [ 596: 599] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.210311 345762 task_exit.go:204] [ 596: 597] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.211932 345762 task_exit.go:204] [ 596: 597] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.211946 345762 task_exit.go:204] [ 596: 597] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.211960 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.212004 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.212048 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.212139 345762 task_exit.go:204] [ 596: 596] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.212499 345762 task_signals.go:470] [ 5: 16] Notified of signal 23 D0713 08:45:18.212689 345762 task_signals.go:220] [ 5: 16] Signal 23: delivering to handler D0713 08:45:18.214409 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.216484 345762 syscalls.go:262] [ 601: 601] Allocating stack with size of 8388608 bytes D0713 08:45:18.216601 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.217669 345762 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.217709 345762 usertrap_amd64.go:106] [ 601: 601] Map a usertrap vma at 63000 D0713 08:45:18.217769 345762 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc001a4ad20 1 D0713 08:45:18.217786 345762 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:18.218151 345762 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.218169 345762 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc001a4ad20 2 D0713 08:45:18.218176 345762 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:18.218986 345762 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.219011 345762 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc001a4ad20 3 D0713 08:45:18.219022 345762 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:18.225163 345762 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.225188 345762 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc001a4ad20 4 D0713 08:45:18.225198 345762 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:18.226259 345762 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.226280 345762 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc001a4ad20 5 D0713 08:45:18.226289 345762 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:18.226335 345762 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.226343 345762 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc001a4ad20 6 D0713 08:45:18.226350 345762 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:18.226523 345762 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.226542 345762 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc001a4ad20 7 D0713 08:45:18.226551 345762 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:18.226682 345762 usertrap_amd64.go:212] [ 601: 602] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.226692 345762 usertrap_amd64.go:122] [ 601: 602] Allocate a new trap: 0xc001a4ad20 8 D0713 08:45:18.226702 345762 usertrap_amd64.go:225] [ 601: 602] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:18.226836 345762 usertrap_amd64.go:212] [ 601: 602] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:18.226855 345762 usertrap_amd64.go:122] [ 601: 602] Allocate a new trap: 0xc001a4ad20 9 D0713 08:45:18.226862 345762 usertrap_amd64.go:225] [ 601: 602] Apply the binary patch addr 46b6e0 trap addr 632d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:18.226876 345762 usertrap_amd64.go:212] [ 601: 602] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.226881 345762 usertrap_amd64.go:122] [ 601: 602] Allocate a new trap: 0xc001a4ad20 10 D0713 08:45:18.226890 345762 usertrap_amd64.go:225] [ 601: 602] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:18.226992 345762 usertrap_amd64.go:212] [ 601: 602] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.227071 345762 usertrap_amd64.go:122] [ 601: 602] Allocate a new trap: 0xc001a4ad20 11 D0713 08:45:18.227118 345762 usertrap_amd64.go:225] [ 601: 602] Apply the binary patch addr 46af76 trap addr 63370 ([184 35 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:18.234518 345762 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.234544 345762 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc001a4ad20 12 D0713 08:45:18.234553 345762 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:18.238028 345762 usertrap_amd64.go:212] [ 601: 602] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.238056 345762 usertrap_amd64.go:122] [ 601: 602] Allocate a new trap: 0xc001a4ad20 13 D0713 08:45:18.238068 345762 usertrap_amd64.go:225] [ 601: 602] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:18.238093 345762 usertrap_amd64.go:212] [ 601: 602] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.238107 345762 usertrap_amd64.go:122] [ 601: 602] Allocate a new trap: 0xc001a4ad20 14 D0713 08:45:18.238117 345762 usertrap_amd64.go:225] [ 601: 602] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:18.238179 345762 task_signals.go:470] [ 601: 601] Notified of signal 23 D0713 08:45:18.238221 345762 task_signals.go:220] [ 601: 601] Signal 23: delivering to handler I0713 08:45:18.246130 345762 compat.go:120] Unsupported syscall ioperm(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioperm for more information. D0713 08:45:18.246303 345762 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.246323 345762 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc001a4ad20 15 D0713 08:45:18.246335 345762 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0713 08:45:18.246467 345762 task_exit.go:204] [ 601: 601] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.246496 345762 task_exit.go:204] [ 601: 601] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.246525 345762 task_signals.go:204] [ 601: 602] Signal 601, PID: 602, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.246550 345762 task_signals.go:204] [ 601: 605] Signal 601, PID: 605, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.246569 345762 task_exit.go:204] [ 601: 605] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.246577 345762 task_exit.go:204] [ 601: 605] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.246583 345762 task_exit.go:204] [ 601: 605] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.246558 345762 task_signals.go:204] [ 601: 604] Signal 601, PID: 604, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.246598 345762 task_exit.go:204] [ 601: 602] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.246629 345762 task_exit.go:204] [ 601: 602] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.246656 345762 task_exit.go:204] [ 601: 602] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.246676 345762 task_exit.go:204] [ 601: 604] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.246699 345762 task_signals.go:204] [ 601: 603] Signal 601, PID: 603, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.246712 345762 task_exit.go:204] [ 601: 604] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.246717 345762 task_exit.go:204] [ 601: 604] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.246733 345762 task_exit.go:204] [ 601: 603] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.248608 345762 task_exit.go:204] [ 601: 603] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.248648 345762 task_exit.go:204] [ 601: 603] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.248669 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.248698 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.248720 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.248874 345762 task_exit.go:204] [ 601: 601] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.249552 345762 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.251116 345762 syscalls.go:262] [ 606: 606] Allocating stack with size of 8388608 bytes D0713 08:45:18.251280 345762 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.253247 345762 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.253361 345762 usertrap_amd64.go:106] [ 606: 606] Map a usertrap vma at 63000 D0713 08:45:18.253562 345762 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc0006cc8a0 1 D0713 08:45:18.253631 345762 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:18.254745 345762 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.254774 345762 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc0006cc8a0 2 D0713 08:45:18.254789 345762 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:18.255692 345762 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.255724 345762 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc0006cc8a0 3 D0713 08:45:18.255733 345762 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:18.261315 345762 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.261348 345762 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc0006cc8a0 4 D0713 08:45:18.261359 345762 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:18.262609 345762 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.262638 345762 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc0006cc8a0 5 D0713 08:45:18.262648 345762 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:18.262705 345762 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.262723 345762 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc0006cc8a0 6 D0713 08:45:18.262730 345762 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:18.262918 345762 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.262937 345762 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc0006cc8a0 7 D0713 08:45:18.262944 345762 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:18.263073 345762 usertrap_amd64.go:212] [ 606: 607] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.263115 345762 usertrap_amd64.go:122] [ 606: 607] Allocate a new trap: 0xc0006cc8a0 8 D0713 08:45:18.263131 345762 usertrap_amd64.go:225] [ 606: 607] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:18.263338 345762 usertrap_amd64.go:212] [ 606: 607] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.263358 345762 usertrap_amd64.go:122] [ 606: 607] Allocate a new trap: 0xc0006cc8a0 9 D0713 08:45:18.263366 345762 usertrap_amd64.go:225] [ 606: 607] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:18.263423 345762 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.263466 345762 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc0006cc8a0 10 D0713 08:45:18.263520 345762 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:18.271603 345762 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.271641 345762 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc0006cc8a0 11 D0713 08:45:18.271653 345762 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:18.274303 345762 usertrap_amd64.go:212] [ 606: 607] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.274336 345762 usertrap_amd64.go:122] [ 606: 607] Allocate a new trap: 0xc0006cc8a0 12 D0713 08:45:18.274345 345762 usertrap_amd64.go:225] [ 606: 607] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:18.274496 345762 usertrap_amd64.go:212] [ 606: 607] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.274562 345762 usertrap_amd64.go:122] [ 606: 607] Allocate a new trap: 0xc0006cc8a0 13 D0713 08:45:18.274583 345762 usertrap_amd64.go:225] [ 606: 607] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:18.274645 345762 task_signals.go:470] [ 606: 606] Notified of signal 23 D0713 08:45:18.274741 345762 task_signals.go:220] [ 606: 606] Signal 23: delivering to handler I0713 08:45:18.283151 345762 compat.go:120] Unsupported syscall iopl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/iopl for more information. D0713 08:45:18.283323 345762 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.283340 345762 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc0006cc8a0 14 D0713 08:45:18.283350 345762 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:18.283420 345762 task_exit.go:204] [ 606: 606] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.283441 345762 task_exit.go:204] [ 606: 606] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.283468 345762 task_signals.go:204] [ 606: 609] Signal 606, PID: 609, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.283484 345762 task_exit.go:204] [ 606: 609] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.283464 345762 task_signals.go:204] [ 606: 608] Signal 606, PID: 608, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.283499 345762 task_signals.go:204] [ 606: 607] Signal 606, PID: 607, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.283507 345762 task_exit.go:204] [ 606: 609] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.283518 345762 task_exit.go:204] [ 606: 609] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.283531 345762 task_exit.go:204] [ 606: 607] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.283540 345762 task_exit.go:204] [ 606: 607] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.283543 345762 task_exit.go:204] [ 606: 607] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.283498 345762 task_signals.go:204] [ 606: 610] Signal 606, PID: 610, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.283551 345762 task_exit.go:204] [ 606: 608] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.283606 345762 task_exit.go:204] [ 606: 608] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.283676 345762 task_exit.go:204] [ 606: 608] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.283731 345762 task_exit.go:204] [ 606: 610] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.285379 345762 task_exit.go:204] [ 606: 610] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.285399 345762 task_exit.go:204] [ 606: 610] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.285409 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.285482 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.285542 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.285632 345762 task_exit.go:204] [ 606: 606] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.286079 345762 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.287492 345762 syscalls.go:262] [ 611: 611] Allocating stack with size of 8388608 bytes D0713 08:45:18.287622 345762 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.288655 345762 usertrap_amd64.go:212] [ 611: 611] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.288697 345762 usertrap_amd64.go:106] [ 611: 611] Map a usertrap vma at 6a000 D0713 08:45:18.288764 345762 usertrap_amd64.go:122] [ 611: 611] Allocate a new trap: 0xc0012e8b40 1 D0713 08:45:18.288788 345762 usertrap_amd64.go:225] [ 611: 611] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:18.289165 345762 usertrap_amd64.go:212] [ 611: 611] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.289187 345762 usertrap_amd64.go:122] [ 611: 611] Allocate a new trap: 0xc0012e8b40 2 D0713 08:45:18.289195 345762 usertrap_amd64.go:225] [ 611: 611] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:18.289604 345762 usertrap_amd64.go:212] [ 611: 611] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.289621 345762 usertrap_amd64.go:122] [ 611: 611] Allocate a new trap: 0xc0012e8b40 3 D0713 08:45:18.289627 345762 usertrap_amd64.go:225] [ 611: 611] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:18.295024 345762 usertrap_amd64.go:212] [ 611: 611] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.295054 345762 usertrap_amd64.go:122] [ 611: 611] Allocate a new trap: 0xc0012e8b40 4 D0713 08:45:18.295066 345762 usertrap_amd64.go:225] [ 611: 611] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:18.296315 345762 usertrap_amd64.go:212] [ 611: 611] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.296343 345762 usertrap_amd64.go:122] [ 611: 611] Allocate a new trap: 0xc0012e8b40 5 D0713 08:45:18.296354 345762 usertrap_amd64.go:225] [ 611: 611] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:18.296423 345762 usertrap_amd64.go:212] [ 611: 611] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.296432 345762 usertrap_amd64.go:122] [ 611: 611] Allocate a new trap: 0xc0012e8b40 6 D0713 08:45:18.296441 345762 usertrap_amd64.go:225] [ 611: 611] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:18.296629 345762 usertrap_amd64.go:212] [ 611: 611] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.296650 345762 usertrap_amd64.go:122] [ 611: 611] Allocate a new trap: 0xc0012e8b40 7 D0713 08:45:18.296660 345762 usertrap_amd64.go:225] [ 611: 611] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:18.296818 345762 usertrap_amd64.go:212] [ 611: 612] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.296842 345762 usertrap_amd64.go:122] [ 611: 612] Allocate a new trap: 0xc0012e8b40 8 D0713 08:45:18.296852 345762 usertrap_amd64.go:225] [ 611: 612] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:18.297207 345762 usertrap_amd64.go:212] [ 611: 612] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.297242 345762 usertrap_amd64.go:122] [ 611: 612] Allocate a new trap: 0xc0012e8b40 9 D0713 08:45:18.297255 345762 usertrap_amd64.go:225] [ 611: 612] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:18.297398 345762 usertrap_amd64.go:212] [ 611: 611] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.297420 345762 usertrap_amd64.go:122] [ 611: 611] Allocate a new trap: 0xc0012e8b40 10 D0713 08:45:18.297427 345762 usertrap_amd64.go:225] [ 611: 611] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:18.297449 345762 usertrap_amd64.go:212] [ 611: 614] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:18.297454 345762 usertrap_amd64.go:122] [ 611: 614] Allocate a new trap: 0xc0012e8b40 11 D0713 08:45:18.297459 345762 usertrap_amd64.go:225] [ 611: 614] Apply the binary patch addr 46b6e0 trap addr 6a370 ([184 24 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:18.298045 345762 usertrap_amd64.go:212] [ 611: 612] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.298100 345762 usertrap_amd64.go:122] [ 611: 612] Allocate a new trap: 0xc0012e8b40 12 D0713 08:45:18.298116 345762 usertrap_amd64.go:225] [ 611: 612] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:18.298203 345762 usertrap_amd64.go:212] [ 611: 612] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.298220 345762 usertrap_amd64.go:122] [ 611: 612] Allocate a new trap: 0xc0012e8b40 13 D0713 08:45:18.298233 345762 usertrap_amd64.go:225] [ 611: 612] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:18.298271 345762 task_signals.go:470] [ 611: 611] Notified of signal 23 D0713 08:45:18.298303 345762 task_signals.go:220] [ 611: 611] Signal 23: delivering to handler D0713 08:45:18.304613 345762 usertrap_amd64.go:212] [ 611: 611] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.304641 345762 usertrap_amd64.go:122] [ 611: 611] Allocate a new trap: 0xc0012e8b40 14 D0713 08:45:18.304650 345762 usertrap_amd64.go:225] [ 611: 611] Apply the binary patch addr 46af29 trap addr 6a460 ([184 37 1 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:18.308754 345762 task_signals.go:470] [ 611: 611] Notified of signal 23 D0713 08:45:18.308810 345762 task_signals.go:220] [ 611: 611] Signal 23: delivering to handler I0713 08:45:18.315238 345762 compat.go:120] Unsupported syscall ioprio_get(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_get for more information. D0713 08:45:18.315338 345762 usertrap_amd64.go:212] [ 611: 611] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.315350 345762 usertrap_amd64.go:122] [ 611: 611] Allocate a new trap: 0xc0012e8b40 15 D0713 08:45:18.315374 345762 usertrap_amd64.go:225] [ 611: 611] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 08:45:18.315456 345762 task_exit.go:204] [ 611: 611] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.315479 345762 task_exit.go:204] [ 611: 611] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.315501 345762 task_signals.go:204] [ 611: 614] Signal 611, PID: 614, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.315513 345762 task_exit.go:204] [ 611: 614] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.315530 345762 task_signals.go:204] [ 611: 613] Signal 611, PID: 613, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.315557 345762 task_signals.go:204] [ 611: 612] Signal 611, PID: 612, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.315554 345762 task_signals.go:204] [ 611: 615] Signal 611, PID: 615, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.315557 345762 task_signals.go:204] [ 611: 616] Signal 611, PID: 616, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.315568 345762 task_exit.go:204] [ 611: 614] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.315616 345762 task_exit.go:204] [ 611: 614] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.315647 345762 task_exit.go:204] [ 611: 613] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.315701 345762 task_exit.go:204] [ 611: 613] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.315720 345762 task_exit.go:204] [ 611: 613] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.315741 345762 task_exit.go:204] [ 611: 612] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.315827 345762 task_exit.go:204] [ 611: 612] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.315836 345762 task_exit.go:204] [ 611: 612] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.315855 345762 task_exit.go:204] [ 611: 615] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.315864 345762 task_exit.go:204] [ 611: 615] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.315875 345762 task_exit.go:204] [ 611: 615] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.315886 345762 task_exit.go:204] [ 611: 616] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.317386 345762 task_exit.go:204] [ 611: 616] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.317423 345762 task_exit.go:204] [ 611: 616] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.317439 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.317500 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.317520 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.317579 345762 task_exit.go:204] [ 611: 611] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.318133 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.319622 345762 syscalls.go:262] [ 617: 617] Allocating stack with size of 8388608 bytes D0713 08:45:18.319760 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.321534 345762 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.321572 345762 usertrap_amd64.go:106] [ 617: 617] Map a usertrap vma at 65000 D0713 08:45:18.321684 345762 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc0006ccc90 1 D0713 08:45:18.321708 345762 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:18.322008 345762 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.322015 345762 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc0006ccc90 2 D0713 08:45:18.322021 345762 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:18.322525 345762 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.322547 345762 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc0006ccc90 3 D0713 08:45:18.322562 345762 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:18.330239 345762 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.330281 345762 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc0006ccc90 4 D0713 08:45:18.330294 345762 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:18.331600 345762 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.331631 345762 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc0006ccc90 5 D0713 08:45:18.331644 345762 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:18.331703 345762 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.331712 345762 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc0006ccc90 6 D0713 08:45:18.331721 345762 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:18.331984 345762 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.332022 345762 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc0006ccc90 7 D0713 08:45:18.332034 345762 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:18.332298 345762 usertrap_amd64.go:212] [ 617: 618] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.332340 345762 usertrap_amd64.go:122] [ 617: 618] Allocate a new trap: 0xc0006ccc90 8 D0713 08:45:18.332355 345762 usertrap_amd64.go:225] [ 617: 618] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:18.332791 345762 usertrap_amd64.go:212] [ 617: 618] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.332856 345762 usertrap_amd64.go:122] [ 617: 618] Allocate a new trap: 0xc0006ccc90 9 D0713 08:45:18.332880 345762 usertrap_amd64.go:225] [ 617: 618] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:18.332915 345762 usertrap_amd64.go:212] [ 617: 619] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:18.332926 345762 usertrap_amd64.go:122] [ 617: 619] Allocate a new trap: 0xc0006ccc90 10 D0713 08:45:18.332970 345762 usertrap_amd64.go:225] [ 617: 619] Apply the binary patch addr 46b6e0 trap addr 65320 ([184 24 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:18.333132 345762 usertrap_amd64.go:212] [ 617: 619] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.333177 345762 usertrap_amd64.go:122] [ 617: 619] Allocate a new trap: 0xc0006ccc90 11 D0713 08:45:18.333204 345762 usertrap_amd64.go:225] [ 617: 619] Apply the binary patch addr 46b57c trap addr 65370 ([184 202 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:18.341017 345762 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.341063 345762 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc0006ccc90 12 D0713 08:45:18.341080 345762 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46af29 trap addr 653c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:18.343816 345762 usertrap_amd64.go:212] [ 617: 618] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.343854 345762 usertrap_amd64.go:122] [ 617: 618] Allocate a new trap: 0xc0006ccc90 13 D0713 08:45:18.343868 345762 usertrap_amd64.go:225] [ 617: 618] Apply the binary patch addr 46b020 trap addr 65410 ([184 39 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:18.343914 345762 usertrap_amd64.go:212] [ 617: 618] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.343920 345762 usertrap_amd64.go:122] [ 617: 618] Allocate a new trap: 0xc0006ccc90 14 D0713 08:45:18.343927 345762 usertrap_amd64.go:225] [ 617: 618] Apply the binary patch addr 46b04f trap addr 65460 ([184 234 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:18.343949 345762 task_signals.go:470] [ 617: 617] Notified of signal 23 D0713 08:45:18.343986 345762 task_signals.go:220] [ 617: 617] Signal 23: delivering to handler I0713 08:45:18.352201 345762 compat.go:120] Unsupported syscall ioprio_set(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_set for more information. D0713 08:45:18.352343 345762 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.352361 345762 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc0006ccc90 15 D0713 08:45:18.352378 345762 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0713 08:45:18.352465 345762 task_exit.go:204] [ 617: 617] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.352494 345762 task_exit.go:204] [ 617: 617] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.352545 345762 task_signals.go:204] [ 617: 620] Signal 617, PID: 620, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.352534 345762 task_signals.go:204] [ 617: 619] Signal 617, PID: 619, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.352566 345762 task_exit.go:204] [ 617: 620] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.352588 345762 task_exit.go:204] [ 617: 619] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.352662 345762 task_exit.go:204] [ 617: 619] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.352673 345762 task_exit.go:204] [ 617: 619] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.352699 345762 task_signals.go:204] [ 617: 621] Signal 617, PID: 621, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.352705 345762 task_exit.go:204] [ 617: 620] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.352736 345762 task_exit.go:204] [ 617: 620] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.352694 345762 task_signals.go:204] [ 617: 618] Signal 617, PID: 618, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.352807 345762 task_exit.go:204] [ 617: 618] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.352820 345762 task_exit.go:204] [ 617: 621] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.352967 345762 task_exit.go:204] [ 617: 618] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.352982 345762 task_exit.go:204] [ 617: 618] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.355161 345762 task_exit.go:204] [ 617: 621] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.355201 345762 task_exit.go:204] [ 617: 621] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.355216 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.355254 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.355263 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.355392 345762 task_exit.go:204] [ 617: 617] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.356050 345762 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.357616 345762 syscalls.go:262] [ 622: 622] Allocating stack with size of 8388608 bytes D0713 08:45:18.357738 345762 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.359499 345762 usertrap_amd64.go:212] [ 622: 622] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.359537 345762 usertrap_amd64.go:106] [ 622: 622] Map a usertrap vma at 64000 D0713 08:45:18.359655 345762 usertrap_amd64.go:122] [ 622: 622] Allocate a new trap: 0xc0012e9050 1 D0713 08:45:18.359686 345762 usertrap_amd64.go:225] [ 622: 622] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:18.360177 345762 usertrap_amd64.go:212] [ 622: 622] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.360201 345762 usertrap_amd64.go:122] [ 622: 622] Allocate a new trap: 0xc0012e9050 2 D0713 08:45:18.360212 345762 usertrap_amd64.go:225] [ 622: 622] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:18.360900 345762 usertrap_amd64.go:212] [ 622: 622] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.360921 345762 usertrap_amd64.go:122] [ 622: 622] Allocate a new trap: 0xc0012e9050 3 D0713 08:45:18.360933 345762 usertrap_amd64.go:225] [ 622: 622] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:18.367630 345762 usertrap_amd64.go:212] [ 622: 622] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.367659 345762 usertrap_amd64.go:122] [ 622: 622] Allocate a new trap: 0xc0012e9050 4 D0713 08:45:18.367670 345762 usertrap_amd64.go:225] [ 622: 622] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:18.369164 345762 usertrap_amd64.go:212] [ 622: 622] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.369198 345762 usertrap_amd64.go:122] [ 622: 622] Allocate a new trap: 0xc0012e9050 5 D0713 08:45:18.369216 345762 usertrap_amd64.go:225] [ 622: 622] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:18.369289 345762 usertrap_amd64.go:212] [ 622: 622] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.369302 345762 usertrap_amd64.go:122] [ 622: 622] Allocate a new trap: 0xc0012e9050 6 D0713 08:45:18.369313 345762 usertrap_amd64.go:225] [ 622: 622] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:18.369757 345762 usertrap_amd64.go:212] [ 622: 622] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.369784 345762 usertrap_amd64.go:122] [ 622: 622] Allocate a new trap: 0xc0012e9050 7 D0713 08:45:18.369794 345762 usertrap_amd64.go:225] [ 622: 622] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:18.370007 345762 usertrap_amd64.go:212] [ 622: 623] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.370032 345762 usertrap_amd64.go:122] [ 622: 623] Allocate a new trap: 0xc0012e9050 8 D0713 08:45:18.370042 345762 usertrap_amd64.go:225] [ 622: 623] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:18.370217 345762 usertrap_amd64.go:212] [ 622: 623] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.370265 345762 usertrap_amd64.go:122] [ 622: 623] Allocate a new trap: 0xc0012e9050 9 D0713 08:45:18.370286 345762 usertrap_amd64.go:225] [ 622: 623] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:18.370369 345762 usertrap_amd64.go:212] [ 622: 622] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.370405 345762 usertrap_amd64.go:122] [ 622: 622] Allocate a new trap: 0xc0012e9050 10 D0713 08:45:18.370420 345762 usertrap_amd64.go:225] [ 622: 622] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:18.380140 345762 usertrap_amd64.go:212] [ 622: 622] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.380163 345762 usertrap_amd64.go:122] [ 622: 622] Allocate a new trap: 0xc0012e9050 11 D0713 08:45:18.380171 345762 usertrap_amd64.go:225] [ 622: 622] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:18.382582 345762 usertrap_amd64.go:212] [ 622: 623] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.382632 345762 usertrap_amd64.go:122] [ 622: 623] Allocate a new trap: 0xc0012e9050 12 D0713 08:45:18.382654 345762 usertrap_amd64.go:225] [ 622: 623] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:18.382685 345762 usertrap_amd64.go:212] [ 622: 623] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.382697 345762 usertrap_amd64.go:122] [ 622: 623] Allocate a new trap: 0xc0012e9050 13 D0713 08:45:18.382703 345762 usertrap_amd64.go:225] [ 622: 623] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:18.382751 345762 task_signals.go:470] [ 622: 622] Notified of signal 23 D0713 08:45:18.382808 345762 task_signals.go:220] [ 622: 622] Signal 23: delivering to handler I0713 08:45:18.390219 345762 compat.go:120] Unsupported syscall kcmp(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kcmp for more information. D0713 08:45:18.390372 345762 usertrap_amd64.go:212] [ 622: 622] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.390391 345762 usertrap_amd64.go:122] [ 622: 622] Allocate a new trap: 0xc0012e9050 14 D0713 08:45:18.390406 345762 usertrap_amd64.go:225] [ 622: 622] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:18.390490 345762 task_exit.go:204] [ 622: 622] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.390544 345762 task_exit.go:204] [ 622: 622] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.390564 345762 task_signals.go:204] [ 622: 624] Signal 622, PID: 624, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.390589 345762 task_exit.go:204] [ 622: 624] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.390587 345762 task_signals.go:204] [ 622: 625] Signal 622, PID: 625, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.390612 345762 task_signals.go:204] [ 622: 626] Signal 622, PID: 626, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.390625 345762 task_signals.go:204] [ 622: 623] Signal 622, PID: 623, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.390649 345762 task_exit.go:204] [ 622: 624] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.390660 345762 task_exit.go:204] [ 622: 624] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.390683 345762 task_signals.go:204] [ 622: 627] Signal 622, PID: 627, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.390694 345762 task_exit.go:204] [ 622: 627] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.390709 345762 task_exit.go:204] [ 622: 627] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.390717 345762 task_exit.go:204] [ 622: 627] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.390751 345762 task_exit.go:204] [ 622: 625] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.390779 345762 task_exit.go:204] [ 622: 625] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.390784 345762 task_exit.go:204] [ 622: 625] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.390796 345762 task_exit.go:204] [ 622: 626] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.390821 345762 task_exit.go:204] [ 622: 626] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.390826 345762 task_exit.go:204] [ 622: 626] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.390841 345762 task_exit.go:204] [ 622: 623] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.392480 345762 task_exit.go:204] [ 622: 623] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.392510 345762 task_exit.go:204] [ 622: 623] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.392524 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.392558 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.392567 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.392601 345762 task_exit.go:204] [ 622: 622] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.393390 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.395124 345762 syscalls.go:262] [ 628: 628] Allocating stack with size of 8388608 bytes D0713 08:45:18.395282 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.396492 345762 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.396532 345762 usertrap_amd64.go:106] [ 628: 628] Map a usertrap vma at 6a000 D0713 08:45:18.396585 345762 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001a4b9e0 1 D0713 08:45:18.396616 345762 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:18.396814 345762 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.396833 345762 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001a4b9e0 2 D0713 08:45:18.396840 345762 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:18.397614 345762 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.397662 345762 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001a4b9e0 3 D0713 08:45:18.397674 345762 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:18.403740 345762 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.403765 345762 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001a4b9e0 4 D0713 08:45:18.403778 345762 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:18.404819 345762 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.404853 345762 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001a4b9e0 5 D0713 08:45:18.404864 345762 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:18.404913 345762 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.404918 345762 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001a4b9e0 6 D0713 08:45:18.404924 345762 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:18.405147 345762 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.405168 345762 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001a4b9e0 7 D0713 08:45:18.405179 345762 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:18.405336 345762 usertrap_amd64.go:212] [ 628: 629] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.405357 345762 usertrap_amd64.go:122] [ 628: 629] Allocate a new trap: 0xc001a4b9e0 8 D0713 08:45:18.405374 345762 usertrap_amd64.go:225] [ 628: 629] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:18.405644 345762 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.405665 345762 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001a4b9e0 9 D0713 08:45:18.405673 345762 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:18.405682 345762 usertrap_amd64.go:212] [ 628: 629] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.405687 345762 usertrap_amd64.go:122] [ 628: 629] Allocate a new trap: 0xc001a4b9e0 10 D0713 08:45:18.405692 345762 usertrap_amd64.go:225] [ 628: 629] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:18.406228 345762 usertrap_amd64.go:212] [ 628: 629] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.406255 345762 usertrap_amd64.go:122] [ 628: 629] Allocate a new trap: 0xc001a4b9e0 11 D0713 08:45:18.406266 345762 usertrap_amd64.go:225] [ 628: 629] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:18.406324 345762 usertrap_amd64.go:212] [ 628: 629] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.406340 345762 usertrap_amd64.go:122] [ 628: 629] Allocate a new trap: 0xc001a4b9e0 12 D0713 08:45:18.406347 345762 usertrap_amd64.go:225] [ 628: 629] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:18.406362 345762 task_signals.go:470] [ 628: 628] Notified of signal 23 D0713 08:45:18.406404 345762 task_signals.go:220] [ 628: 628] Signal 23: delivering to handler D0713 08:45:18.412584 345762 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.412607 345762 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001a4b9e0 13 D0713 08:45:18.412615 345762 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:18.417027 345762 task_signals.go:470] [ 628: 628] Notified of signal 23 D0713 08:45:18.417101 345762 task_signals.go:220] [ 628: 628] Signal 23: delivering to handler I0713 08:45:18.422797 345762 compat.go:120] Unsupported syscall kexec_load(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kexec_load for more information. D0713 08:45:18.422871 345762 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.422880 345762 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001a4b9e0 14 D0713 08:45:18.422892 345762 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:18.422918 345762 task_exit.go:204] [ 628: 628] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.422930 345762 task_exit.go:204] [ 628: 628] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.422947 345762 task_signals.go:204] [ 628: 629] Signal 628, PID: 629, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.422955 345762 task_exit.go:204] [ 628: 629] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.422961 345762 task_exit.go:204] [ 628: 629] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.422964 345762 task_exit.go:204] [ 628: 629] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.422976 345762 task_signals.go:204] [ 628: 632] Signal 628, PID: 632, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.422984 345762 task_signals.go:204] [ 628: 631] Signal 628, PID: 631, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.422995 345762 task_exit.go:204] [ 628: 632] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.423006 345762 task_signals.go:204] [ 628: 630] Signal 628, PID: 630, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.423007 345762 task_exit.go:204] [ 628: 632] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.423014 345762 task_exit.go:204] [ 628: 632] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.423022 345762 task_signals.go:204] [ 628: 633] Signal 628, PID: 633, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.423026 345762 task_exit.go:204] [ 628: 630] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.423031 345762 task_exit.go:204] [ 628: 633] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.423038 345762 task_exit.go:204] [ 628: 633] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.423042 345762 task_exit.go:204] [ 628: 633] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.423049 345762 task_exit.go:204] [ 628: 631] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.423133 345762 task_exit.go:204] [ 628: 630] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.423162 345762 task_exit.go:204] [ 628: 630] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.424288 345762 task_exit.go:204] [ 628: 631] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.424306 345762 task_exit.go:204] [ 628: 631] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.424314 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.424362 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.424384 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.424462 345762 task_exit.go:204] [ 628: 628] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.425011 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.426146 345762 syscalls.go:262] [ 634: 634] Allocating stack with size of 8388608 bytes D0713 08:45:18.426256 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.427656 345762 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.427705 345762 usertrap_amd64.go:106] [ 634: 634] Map a usertrap vma at 62000 D0713 08:45:18.427792 345762 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc001a4bb60 1 D0713 08:45:18.427819 345762 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:18.428178 345762 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.428206 345762 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc001a4bb60 2 D0713 08:45:18.428216 345762 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:18.428849 345762 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.428864 345762 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc001a4bb60 3 D0713 08:45:18.428873 345762 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:18.435501 345762 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.435529 345762 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc001a4bb60 4 D0713 08:45:18.435539 345762 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:18.436651 345762 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.436669 345762 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc001a4bb60 5 D0713 08:45:18.436676 345762 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:18.436784 345762 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.436798 345762 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc001a4bb60 6 D0713 08:45:18.436806 345762 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:18.437069 345762 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.437090 345762 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc001a4bb60 7 D0713 08:45:18.437099 345762 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:18.437290 345762 usertrap_amd64.go:212] [ 634: 635] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.437304 345762 usertrap_amd64.go:122] [ 634: 635] Allocate a new trap: 0xc001a4bb60 8 D0713 08:45:18.437313 345762 usertrap_amd64.go:225] [ 634: 635] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:18.437470 345762 usertrap_amd64.go:212] [ 634: 635] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.437500 345762 usertrap_amd64.go:122] [ 634: 635] Allocate a new trap: 0xc001a4bb60 9 D0713 08:45:18.437514 345762 usertrap_amd64.go:225] [ 634: 635] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:18.437551 345762 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.437609 345762 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc001a4bb60 10 D0713 08:45:18.437625 345762 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:18.445245 345762 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.445270 345762 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc001a4bb60 11 D0713 08:45:18.445279 345762 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:18.447809 345762 usertrap_amd64.go:212] [ 634: 635] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.447838 345762 usertrap_amd64.go:122] [ 634: 635] Allocate a new trap: 0xc001a4bb60 12 D0713 08:45:18.447855 345762 usertrap_amd64.go:225] [ 634: 635] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:18.447952 345762 usertrap_amd64.go:212] [ 634: 635] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.447981 345762 usertrap_amd64.go:122] [ 634: 635] Allocate a new trap: 0xc001a4bb60 13 D0713 08:45:18.447993 345762 usertrap_amd64.go:225] [ 634: 635] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:18.448104 345762 task_signals.go:470] [ 634: 634] Notified of signal 23 D0713 08:45:18.448180 345762 task_signals.go:220] [ 634: 634] Signal 23: delivering to handler D0713 08:45:18.455213 345762 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.455255 345762 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc001a4bb60 14 D0713 08:45:18.455271 345762 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:18.455341 345762 task_exit.go:204] [ 634: 634] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.455391 345762 task_signals.go:204] [ 634: 635] Signal 634, PID: 635, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.455423 345762 task_signals.go:204] [ 634: 637] Signal 634, PID: 637, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.455428 345762 task_signals.go:204] [ 634: 638] Signal 634, PID: 638, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.455445 345762 task_signals.go:204] [ 634: 636] Signal 634, PID: 636, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.455456 345762 task_exit.go:204] [ 634: 634] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.455482 345762 task_exit.go:204] [ 634: 635] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.455511 345762 task_exit.go:204] [ 634: 635] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.455518 345762 task_exit.go:204] [ 634: 635] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.455533 345762 task_exit.go:204] [ 634: 637] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.455546 345762 task_exit.go:204] [ 634: 637] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.455551 345762 task_exit.go:204] [ 634: 637] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.455561 345762 task_exit.go:204] [ 634: 638] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.455580 345762 task_exit.go:204] [ 634: 638] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.455589 345762 task_exit.go:204] [ 634: 638] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.455614 345762 task_exit.go:204] [ 634: 636] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.457175 345762 task_exit.go:204] [ 634: 636] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.457207 345762 task_exit.go:204] [ 634: 636] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.457228 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.457255 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.457264 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.457460 345762 task_exit.go:204] [ 634: 634] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.458280 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.459442 345762 syscalls.go:262] [ 639: 639] Allocating stack with size of 8388608 bytes D0713 08:45:18.459530 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.460577 345762 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.460614 345762 usertrap_amd64.go:106] [ 639: 639] Map a usertrap vma at 67000 D0713 08:45:18.460683 345762 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc0004cda40 1 D0713 08:45:18.460698 345762 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:18.461110 345762 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.461128 345762 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc0004cda40 2 D0713 08:45:18.461135 345762 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:18.461644 345762 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.461661 345762 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc0004cda40 3 D0713 08:45:18.461667 345762 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:18.467320 345762 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.467346 345762 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc0004cda40 4 D0713 08:45:18.467356 345762 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:18.468458 345762 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.468512 345762 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc0004cda40 5 D0713 08:45:18.468526 345762 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:18.468574 345762 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.468585 345762 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc0004cda40 6 D0713 08:45:18.468591 345762 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:18.469138 345762 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.469167 345762 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc0004cda40 7 D0713 08:45:18.469177 345762 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:18.469336 345762 usertrap_amd64.go:212] [ 639: 640] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.469367 345762 usertrap_amd64.go:122] [ 639: 640] Allocate a new trap: 0xc0004cda40 8 D0713 08:45:18.469380 345762 usertrap_amd64.go:225] [ 639: 640] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:18.469568 345762 usertrap_amd64.go:212] [ 639: 640] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.469578 345762 usertrap_amd64.go:122] [ 639: 640] Allocate a new trap: 0xc0004cda40 9 D0713 08:45:18.469584 345762 usertrap_amd64.go:225] [ 639: 640] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:18.469596 345762 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.469605 345762 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc0004cda40 10 D0713 08:45:18.469611 345762 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:18.469778 345762 usertrap_amd64.go:212] [ 639: 640] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.469790 345762 usertrap_amd64.go:122] [ 639: 640] Allocate a new trap: 0xc0004cda40 11 D0713 08:45:18.469800 345762 usertrap_amd64.go:225] [ 639: 640] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:18.469870 345762 usertrap_amd64.go:212] [ 639: 640] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.469882 345762 usertrap_amd64.go:122] [ 639: 640] Allocate a new trap: 0xc0004cda40 12 D0713 08:45:18.469891 345762 usertrap_amd64.go:225] [ 639: 640] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:18.469910 345762 task_signals.go:470] [ 639: 642] Notified of signal 23 D0713 08:45:18.469961 345762 task_signals.go:179] [ 639: 642] Restarting syscall 202: interrupted by signal 23 D0713 08:45:18.469979 345762 task_signals.go:220] [ 639: 642] Signal 23: delivering to handler D0713 08:45:18.470182 345762 task_signals.go:470] [ 639: 639] Notified of signal 23 D0713 08:45:18.470318 345762 task_signals.go:220] [ 639: 639] Signal 23: delivering to handler D0713 08:45:18.476690 345762 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.476712 345762 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc0004cda40 13 D0713 08:45:18.476720 345762 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:18.480529 345762 task_signals.go:470] [ 639: 639] Notified of signal 23 D0713 08:45:18.480570 345762 task_signals.go:220] [ 639: 639] Signal 23: delivering to handler I0713 08:45:18.488044 345762 compat.go:120] Unsupported syscall sys_445(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_445 for more information. D0713 08:45:18.488151 345762 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.488168 345762 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc0004cda40 14 D0713 08:45:18.488178 345762 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:18.488198 345762 task_exit.go:204] [ 639: 639] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.488216 345762 task_exit.go:204] [ 639: 639] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.488237 345762 task_signals.go:204] [ 639: 642] Signal 639, PID: 642, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.488262 345762 task_exit.go:204] [ 639: 642] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.488258 345762 task_signals.go:204] [ 639: 640] Signal 639, PID: 640, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.488268 345762 task_exit.go:204] [ 639: 642] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.488272 345762 task_exit.go:204] [ 639: 642] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.488241 345762 task_signals.go:204] [ 639: 641] Signal 639, PID: 641, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.488285 345762 task_exit.go:204] [ 639: 641] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.488295 345762 task_signals.go:204] [ 639: 643] Signal 639, PID: 643, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.488304 345762 task_exit.go:204] [ 639: 641] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.488309 345762 task_exit.go:204] [ 639: 641] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.488316 345762 task_exit.go:204] [ 639: 640] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.488321 345762 task_exit.go:204] [ 639: 640] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.488324 345762 task_exit.go:204] [ 639: 640] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.488334 345762 task_exit.go:204] [ 639: 643] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.489751 345762 task_exit.go:204] [ 639: 643] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.489789 345762 task_exit.go:204] [ 639: 643] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.489801 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.489826 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.489833 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.490039 345762 task_exit.go:204] [ 639: 639] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.490432 345762 task_signals.go:470] [ 5: 16] Notified of signal 23 D0713 08:45:18.490555 345762 task_signals.go:220] [ 5: 16] Signal 23: delivering to handler D0713 08:45:18.490881 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.492406 345762 syscalls.go:262] [ 644: 644] Allocating stack with size of 8388608 bytes D0713 08:45:18.492504 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.494074 345762 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.494123 345762 usertrap_amd64.go:106] [ 644: 644] Map a usertrap vma at 64000 D0713 08:45:18.494215 345762 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc001a4bf50 1 D0713 08:45:18.494234 345762 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:18.494636 345762 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.494662 345762 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc001a4bf50 2 D0713 08:45:18.494673 345762 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:18.495118 345762 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.495135 345762 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc001a4bf50 3 D0713 08:45:18.495142 345762 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:18.500765 345762 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.500794 345762 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc001a4bf50 4 D0713 08:45:18.500809 345762 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:18.501786 345762 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.501809 345762 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc001a4bf50 5 D0713 08:45:18.501816 345762 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:18.501854 345762 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.501867 345762 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc001a4bf50 6 D0713 08:45:18.501871 345762 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:18.502182 345762 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.502213 345762 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc001a4bf50 7 D0713 08:45:18.502226 345762 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:18.502389 345762 usertrap_amd64.go:212] [ 644: 645] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.502413 345762 usertrap_amd64.go:122] [ 644: 645] Allocate a new trap: 0xc001a4bf50 8 D0713 08:45:18.502422 345762 usertrap_amd64.go:225] [ 644: 645] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:18.502561 345762 usertrap_amd64.go:212] [ 644: 645] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.502583 345762 usertrap_amd64.go:122] [ 644: 645] Allocate a new trap: 0xc001a4bf50 9 D0713 08:45:18.502598 345762 usertrap_amd64.go:225] [ 644: 645] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:18.502687 345762 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.502721 345762 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc001a4bf50 10 D0713 08:45:18.502735 345762 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:18.503438 345762 usertrap_amd64.go:212] [ 644: 645] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.503468 345762 usertrap_amd64.go:122] [ 644: 645] Allocate a new trap: 0xc001a4bf50 11 D0713 08:45:18.503477 345762 usertrap_amd64.go:225] [ 644: 645] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:18.503528 345762 usertrap_amd64.go:212] [ 644: 645] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.503544 345762 usertrap_amd64.go:122] [ 644: 645] Allocate a new trap: 0xc001a4bf50 12 D0713 08:45:18.503558 345762 usertrap_amd64.go:225] [ 644: 645] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:18.503605 345762 task_signals.go:470] [ 644: 644] Notified of signal 23 D0713 08:45:18.503632 345762 task_signals.go:220] [ 644: 644] Signal 23: delivering to handler D0713 08:45:18.510041 345762 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.510070 345762 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc001a4bf50 13 D0713 08:45:18.510079 345762 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:18.514313 345762 task_signals.go:470] [ 644: 644] Notified of signal 23 D0713 08:45:18.514370 345762 task_signals.go:220] [ 644: 644] Signal 23: delivering to handler I0713 08:45:18.520182 345762 compat.go:120] Unsupported syscall sys_444(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_444 for more information. D0713 08:45:18.520270 345762 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.520289 345762 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc001a4bf50 14 D0713 08:45:18.520304 345762 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:18.520366 345762 task_exit.go:204] [ 644: 644] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.520379 345762 task_exit.go:204] [ 644: 644] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.520410 345762 task_signals.go:204] [ 644: 648] Signal 644, PID: 648, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.520431 345762 task_exit.go:204] [ 644: 648] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.520405 345762 task_signals.go:204] [ 644: 647] Signal 644, PID: 647, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.520427 345762 task_signals.go:204] [ 644: 646] Signal 644, PID: 646, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.520440 345762 task_exit.go:204] [ 644: 648] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.520452 345762 task_exit.go:204] [ 644: 648] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.520480 345762 task_signals.go:204] [ 644: 649] Signal 644, PID: 649, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.520494 345762 task_exit.go:204] [ 644: 649] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.520506 345762 task_signals.go:204] [ 644: 645] Signal 644, PID: 645, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.520526 345762 task_exit.go:204] [ 644: 645] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.520541 345762 task_exit.go:204] [ 644: 645] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.520552 345762 task_exit.go:204] [ 644: 645] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.520572 345762 task_exit.go:204] [ 644: 647] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.520581 345762 task_exit.go:204] [ 644: 647] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.520586 345762 task_exit.go:204] [ 644: 647] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.520594 345762 task_exit.go:204] [ 644: 646] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.520623 345762 task_exit.go:204] [ 644: 649] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.520688 345762 task_exit.go:204] [ 644: 649] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.521861 345762 task_exit.go:204] [ 644: 646] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.521911 345762 task_exit.go:204] [ 644: 646] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.521924 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.521960 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.521970 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.522064 345762 task_exit.go:204] [ 644: 644] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.522174 345762 task_signals.go:470] [ 5: 16] Notified of signal 23 D0713 08:45:18.522227 345762 task_signals.go:220] [ 5: 16] Signal 23: delivering to handler D0713 08:45:18.522554 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.523799 345762 syscalls.go:262] [ 650: 650] Allocating stack with size of 8388608 bytes D0713 08:45:18.523904 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.525532 345762 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.525577 345762 usertrap_amd64.go:106] [ 650: 650] Map a usertrap vma at 66000 D0713 08:45:18.525672 345762 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc0006cd5c0 1 D0713 08:45:18.525689 345762 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:18.526036 345762 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.526053 345762 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc0006cd5c0 2 D0713 08:45:18.526059 345762 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:18.526597 345762 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.526613 345762 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc0006cd5c0 3 D0713 08:45:18.526619 345762 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:18.531784 345762 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.531811 345762 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc0006cd5c0 4 D0713 08:45:18.531821 345762 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:18.533462 345762 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.533516 345762 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc0006cd5c0 5 D0713 08:45:18.533527 345762 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:18.533590 345762 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.533603 345762 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc0006cd5c0 6 D0713 08:45:18.533609 345762 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:18.533939 345762 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.533957 345762 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc0006cd5c0 7 D0713 08:45:18.533963 345762 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:18.534087 345762 usertrap_amd64.go:212] [ 650: 651] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.534115 345762 usertrap_amd64.go:122] [ 650: 651] Allocate a new trap: 0xc0006cd5c0 8 D0713 08:45:18.534128 345762 usertrap_amd64.go:225] [ 650: 651] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:18.534288 345762 usertrap_amd64.go:212] [ 650: 651] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.534315 345762 usertrap_amd64.go:122] [ 650: 651] Allocate a new trap: 0xc0006cd5c0 9 D0713 08:45:18.534327 345762 usertrap_amd64.go:225] [ 650: 651] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:18.534356 345762 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.534364 345762 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc0006cd5c0 10 D0713 08:45:18.534372 345762 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:18.534630 345762 usertrap_amd64.go:212] [ 650: 653] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:18.534648 345762 usertrap_amd64.go:122] [ 650: 653] Allocate a new trap: 0xc0006cd5c0 11 D0713 08:45:18.534658 345762 usertrap_amd64.go:225] [ 650: 653] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:18.541659 345762 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.541686 345762 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc0006cd5c0 12 D0713 08:45:18.541697 345762 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:18.545588 345762 usertrap_amd64.go:212] [ 650: 651] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.545623 345762 usertrap_amd64.go:122] [ 650: 651] Allocate a new trap: 0xc0006cd5c0 13 D0713 08:45:18.545638 345762 usertrap_amd64.go:225] [ 650: 651] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:18.545782 345762 usertrap_amd64.go:212] [ 650: 651] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.545872 345762 usertrap_amd64.go:122] [ 650: 651] Allocate a new trap: 0xc0006cd5c0 14 D0713 08:45:18.545893 345762 usertrap_amd64.go:225] [ 650: 651] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:18.545962 345762 task_signals.go:470] [ 650: 650] Notified of signal 23 D0713 08:45:18.546056 345762 task_signals.go:220] [ 650: 650] Signal 23: delivering to handler I0713 08:45:18.552821 345762 compat.go:120] Unsupported syscall sys_446(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_446 for more information. D0713 08:45:18.553005 345762 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.553032 345762 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc0006cd5c0 15 D0713 08:45:18.553045 345762 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 08:45:18.553125 345762 task_exit.go:204] [ 650: 650] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.553154 345762 task_exit.go:204] [ 650: 650] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.553179 345762 task_signals.go:204] [ 650: 653] Signal 650, PID: 653, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.553177 345762 task_signals.go:204] [ 650: 652] Signal 650, PID: 652, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.553202 345762 task_signals.go:204] [ 650: 651] Signal 650, PID: 651, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.553211 345762 task_exit.go:204] [ 650: 653] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.553284 345762 task_signals.go:204] [ 650: 654] Signal 650, PID: 654, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.553380 345762 task_exit.go:204] [ 650: 653] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.553399 345762 task_exit.go:204] [ 650: 653] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.553426 345762 task_exit.go:204] [ 650: 652] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.553440 345762 task_exit.go:204] [ 650: 652] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.553446 345762 task_exit.go:204] [ 650: 652] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.553459 345762 task_exit.go:204] [ 650: 651] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.553468 345762 task_exit.go:204] [ 650: 651] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.553474 345762 task_exit.go:204] [ 650: 651] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.553495 345762 task_exit.go:204] [ 650: 654] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.555073 345762 task_exit.go:204] [ 650: 654] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.555124 345762 task_exit.go:204] [ 650: 654] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.555147 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.555222 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.555256 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.555359 345762 task_exit.go:204] [ 650: 650] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.555950 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.557377 345762 syscalls.go:262] [ 655: 655] Allocating stack with size of 8388608 bytes D0713 08:45:18.557495 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.558584 345762 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.558642 345762 usertrap_amd64.go:106] [ 655: 655] Map a usertrap vma at 61000 D0713 08:45:18.558737 345762 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc000197770 1 D0713 08:45:18.558779 345762 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:18.559287 345762 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.559314 345762 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc000197770 2 D0713 08:45:18.559325 345762 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:18.560150 345762 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.560177 345762 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc000197770 3 D0713 08:45:18.560188 345762 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:45:18.566598 345762 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.566621 345762 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc000197770 4 D0713 08:45:18.566632 345762 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:45:18.567796 345762 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.567807 345762 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc000197770 5 D0713 08:45:18.567816 345762 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:45:18.567833 345762 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.567840 345762 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc000197770 6 D0713 08:45:18.567848 345762 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:45:18.568171 345762 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.568187 345762 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc000197770 7 D0713 08:45:18.568193 345762 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:45:18.568347 345762 usertrap_amd64.go:212] [ 655: 656] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.568356 345762 usertrap_amd64.go:122] [ 655: 656] Allocate a new trap: 0xc000197770 8 D0713 08:45:18.568364 345762 usertrap_amd64.go:225] [ 655: 656] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:45:18.568612 345762 usertrap_amd64.go:212] [ 655: 656] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.568632 345762 usertrap_amd64.go:122] [ 655: 656] Allocate a new trap: 0xc000197770 9 D0713 08:45:18.568719 345762 usertrap_amd64.go:225] [ 655: 656] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:45:18.568735 345762 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.568740 345762 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc000197770 10 D0713 08:45:18.568746 345762 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:45:18.568811 345762 usertrap_amd64.go:212] [ 655: 658] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:18.568835 345762 usertrap_amd64.go:122] [ 655: 658] Allocate a new trap: 0xc000197770 11 D0713 08:45:18.568848 345762 usertrap_amd64.go:225] [ 655: 658] Apply the binary patch addr 46b6e0 trap addr 61370 ([184 24 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:45:18.576525 345762 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.576552 345762 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc000197770 12 D0713 08:45:18.576563 345762 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:45:18.579062 345762 usertrap_amd64.go:212] [ 655: 656] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.579090 345762 usertrap_amd64.go:122] [ 655: 656] Allocate a new trap: 0xc000197770 13 D0713 08:45:18.579101 345762 usertrap_amd64.go:225] [ 655: 656] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:45:18.579157 345762 usertrap_amd64.go:212] [ 655: 656] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.579187 345762 usertrap_amd64.go:122] [ 655: 656] Allocate a new trap: 0xc000197770 14 D0713 08:45:18.579199 345762 usertrap_amd64.go:225] [ 655: 656] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:45:18.579255 345762 task_signals.go:470] [ 655: 655] Notified of signal 23 D0713 08:45:18.579344 345762 task_signals.go:220] [ 655: 655] Signal 23: delivering to handler D0713 08:45:18.588143 345762 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.588197 345762 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc000197770 15 D0713 08:45:18.588217 345762 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 08:45:18.588297 345762 task_exit.go:204] [ 655: 655] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.588343 345762 task_exit.go:204] [ 655: 655] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.588381 345762 task_signals.go:204] [ 655: 658] Signal 655, PID: 658, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.588382 345762 task_signals.go:204] [ 655: 656] Signal 655, PID: 656, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.588422 345762 task_signals.go:204] [ 655: 657] Signal 655, PID: 657, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.588453 345762 task_exit.go:204] [ 655: 657] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.588467 345762 task_exit.go:204] [ 655: 657] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.588483 345762 task_exit.go:204] [ 655: 657] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.588515 345762 task_exit.go:204] [ 655: 658] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.588555 345762 task_exit.go:204] [ 655: 658] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.588562 345762 task_exit.go:204] [ 655: 658] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.588579 345762 task_exit.go:204] [ 655: 656] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.588587 345762 task_exit.go:204] [ 655: 656] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.588591 345762 task_exit.go:204] [ 655: 656] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.588610 345762 task_signals.go:204] [ 655: 659] Signal 655, PID: 659, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.588632 345762 task_exit.go:204] [ 655: 659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.590223 345762 task_exit.go:204] [ 655: 659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.590259 345762 task_exit.go:204] [ 655: 659] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.590280 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.590308 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.590325 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.590433 345762 task_exit.go:204] [ 655: 655] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.591067 345762 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.592636 345762 syscalls.go:262] [ 660: 660] Allocating stack with size of 8388608 bytes D0713 08:45:18.592769 345762 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.594283 345762 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.594334 345762 usertrap_amd64.go:106] [ 660: 660] Map a usertrap vma at 65000 D0713 08:45:18.594416 345762 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc000197860 1 D0713 08:45:18.594447 345762 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:18.594894 345762 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.594917 345762 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc000197860 2 D0713 08:45:18.594926 345762 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:18.595669 345762 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.595705 345762 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc000197860 3 D0713 08:45:18.595721 345762 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:18.601409 345762 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.601441 345762 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc000197860 4 D0713 08:45:18.601451 345762 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:18.602589 345762 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.602608 345762 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc000197860 5 D0713 08:45:18.602619 345762 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:18.602752 345762 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.602770 345762 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc000197860 6 D0713 08:45:18.602779 345762 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:18.603267 345762 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.603283 345762 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc000197860 7 D0713 08:45:18.603289 345762 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:18.603452 345762 usertrap_amd64.go:212] [ 660: 661] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.603472 345762 usertrap_amd64.go:122] [ 660: 661] Allocate a new trap: 0xc000197860 8 D0713 08:45:18.603480 345762 usertrap_amd64.go:225] [ 660: 661] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:18.603733 345762 usertrap_amd64.go:212] [ 660: 661] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.603775 345762 usertrap_amd64.go:122] [ 660: 661] Allocate a new trap: 0xc000197860 9 D0713 08:45:18.603799 345762 usertrap_amd64.go:225] [ 660: 661] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:18.604025 345762 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.604045 345762 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc000197860 10 D0713 08:45:18.604053 345762 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:18.613062 345762 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.613135 345762 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc000197860 11 D0713 08:45:18.613156 345762 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:18.615644 345762 usertrap_amd64.go:212] [ 660: 661] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.615676 345762 usertrap_amd64.go:122] [ 660: 661] Allocate a new trap: 0xc000197860 12 D0713 08:45:18.615689 345762 usertrap_amd64.go:225] [ 660: 661] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:18.615711 345762 usertrap_amd64.go:212] [ 660: 661] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.615718 345762 usertrap_amd64.go:122] [ 660: 661] Allocate a new trap: 0xc000197860 13 D0713 08:45:18.615727 345762 usertrap_amd64.go:225] [ 660: 661] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:18.615787 345762 task_signals.go:470] [ 660: 660] Notified of signal 23 D0713 08:45:18.615831 345762 task_signals.go:220] [ 660: 660] Signal 23: delivering to handler D0713 08:45:18.623001 345762 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.623028 345762 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc000197860 14 D0713 08:45:18.623042 345762 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:18.623097 345762 task_exit.go:204] [ 660: 660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.623144 345762 task_exit.go:204] [ 660: 660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.623172 345762 task_signals.go:204] [ 660: 662] Signal 660, PID: 662, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.623202 345762 task_exit.go:204] [ 660: 662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.623215 345762 task_signals.go:204] [ 660: 664] Signal 660, PID: 664, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.623229 345762 task_signals.go:204] [ 660: 663] Signal 660, PID: 663, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.623247 345762 task_signals.go:204] [ 660: 661] Signal 660, PID: 661, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.623266 345762 task_exit.go:204] [ 660: 661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.623275 345762 task_exit.go:204] [ 660: 661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.623279 345762 task_exit.go:204] [ 660: 661] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.623292 345762 task_exit.go:204] [ 660: 664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.623307 345762 task_exit.go:204] [ 660: 664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.623316 345762 task_exit.go:204] [ 660: 664] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.623327 345762 task_exit.go:204] [ 660: 663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.623447 345762 task_exit.go:204] [ 660: 662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.623478 345762 task_exit.go:204] [ 660: 662] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.624770 345762 task_exit.go:204] [ 660: 663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.624808 345762 task_exit.go:204] [ 660: 663] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.624833 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.624877 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.624898 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.625043 345762 task_exit.go:204] [ 660: 660] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.626172 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.627960 345762 syscalls.go:262] [ 665: 665] Allocating stack with size of 8388608 bytes D0713 08:45:18.628055 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.629420 345762 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.629475 345762 usertrap_amd64.go:106] [ 665: 665] Map a usertrap vma at 62000 D0713 08:45:18.629583 345762 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc000197ad0 1 D0713 08:45:18.629633 345762 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:18.630096 345762 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.630120 345762 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc000197ad0 2 D0713 08:45:18.630130 345762 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:18.630814 345762 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.630833 345762 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc000197ad0 3 D0713 08:45:18.630840 345762 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:18.637011 345762 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.637042 345762 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc000197ad0 4 D0713 08:45:18.637053 345762 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:18.638229 345762 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.638243 345762 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc000197ad0 5 D0713 08:45:18.638250 345762 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:18.638265 345762 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.638270 345762 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc000197ad0 6 D0713 08:45:18.638275 345762 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:18.638578 345762 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.638595 345762 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc000197ad0 7 D0713 08:45:18.638601 345762 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:18.638784 345762 usertrap_amd64.go:212] [ 665: 666] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.638802 345762 usertrap_amd64.go:122] [ 665: 666] Allocate a new trap: 0xc000197ad0 8 D0713 08:45:18.638815 345762 usertrap_amd64.go:225] [ 665: 666] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:18.638970 345762 usertrap_amd64.go:212] [ 665: 666] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.638997 345762 usertrap_amd64.go:122] [ 665: 666] Allocate a new trap: 0xc000197ad0 9 D0713 08:45:18.639010 345762 usertrap_amd64.go:225] [ 665: 666] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:18.639131 345762 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.639161 345762 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc000197ad0 10 D0713 08:45:18.639173 345762 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:18.639795 345762 usertrap_amd64.go:212] [ 665: 666] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.639827 345762 usertrap_amd64.go:122] [ 665: 666] Allocate a new trap: 0xc000197ad0 11 D0713 08:45:18.639840 345762 usertrap_amd64.go:225] [ 665: 666] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:18.639881 345762 usertrap_amd64.go:212] [ 665: 666] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.639903 345762 usertrap_amd64.go:122] [ 665: 666] Allocate a new trap: 0xc000197ad0 12 D0713 08:45:18.639913 345762 usertrap_amd64.go:225] [ 665: 666] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:18.639942 345762 task_signals.go:470] [ 665: 665] Notified of signal 23 D0713 08:45:18.639986 345762 task_signals.go:220] [ 665: 665] Signal 23: delivering to handler D0713 08:45:18.646781 345762 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.646805 345762 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc000197ad0 13 D0713 08:45:18.646813 345762 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:18.650713 345762 task_signals.go:470] [ 665: 665] Notified of signal 23 D0713 08:45:18.651274 345762 task_signals.go:220] [ 665: 665] Signal 23: delivering to handler D0713 08:45:18.657341 345762 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.657371 345762 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc000197ad0 14 D0713 08:45:18.657386 345762 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:18.657467 345762 task_exit.go:204] [ 665: 665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.657494 345762 task_exit.go:204] [ 665: 665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.657517 345762 task_signals.go:204] [ 665: 666] Signal 665, PID: 666, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.657531 345762 task_exit.go:204] [ 665: 666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.657538 345762 task_signals.go:204] [ 665: 667] Signal 665, PID: 667, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.657556 345762 task_exit.go:204] [ 665: 666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.657560 345762 task_exit.go:204] [ 665: 666] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.657536 345762 task_signals.go:204] [ 665: 669] Signal 665, PID: 669, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.657521 345762 task_signals.go:204] [ 665: 668] Signal 665, PID: 668, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.657575 345762 task_exit.go:204] [ 665: 667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.657615 345762 task_exit.go:204] [ 665: 667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.657624 345762 task_exit.go:204] [ 665: 667] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.657647 345762 task_exit.go:204] [ 665: 669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.657659 345762 task_exit.go:204] [ 665: 669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.657664 345762 task_exit.go:204] [ 665: 669] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.657676 345762 task_exit.go:204] [ 665: 668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.659856 345762 task_exit.go:204] [ 665: 668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.659891 345762 task_exit.go:204] [ 665: 668] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.659910 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.659948 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.659959 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.660060 345762 task_exit.go:204] [ 665: 665] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.661108 345762 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.662630 345762 syscalls.go:262] [ 670: 670] Allocating stack with size of 8388608 bytes D0713 08:45:18.662740 345762 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.663739 345762 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.663783 345762 usertrap_amd64.go:106] [ 670: 670] Map a usertrap vma at 64000 D0713 08:45:18.663890 345762 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc001680390 1 D0713 08:45:18.663920 345762 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:18.664303 345762 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.664325 345762 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc001680390 2 D0713 08:45:18.664334 345762 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:18.665044 345762 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.665072 345762 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc001680390 3 D0713 08:45:18.665081 345762 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:18.671413 345762 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.671444 345762 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc001680390 4 D0713 08:45:18.671457 345762 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:18.672500 345762 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.672521 345762 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc001680390 5 D0713 08:45:18.672528 345762 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:18.672547 345762 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.672555 345762 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc001680390 6 D0713 08:45:18.672560 345762 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:18.672695 345762 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.672714 345762 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc001680390 7 D0713 08:45:18.672721 345762 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:18.672820 345762 usertrap_amd64.go:212] [ 670: 671] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.672840 345762 usertrap_amd64.go:122] [ 670: 671] Allocate a new trap: 0xc001680390 8 D0713 08:45:18.672850 345762 usertrap_amd64.go:225] [ 670: 671] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:18.673019 345762 usertrap_amd64.go:212] [ 670: 671] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.673048 345762 usertrap_amd64.go:122] [ 670: 671] Allocate a new trap: 0xc001680390 9 D0713 08:45:18.673057 345762 usertrap_amd64.go:225] [ 670: 671] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:18.673143 345762 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.673170 345762 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc001680390 10 D0713 08:45:18.673179 345762 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:18.673253 345762 usertrap_amd64.go:212] [ 670: 671] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.673297 345762 usertrap_amd64.go:122] [ 670: 671] Allocate a new trap: 0xc001680390 11 D0713 08:45:18.673309 345762 usertrap_amd64.go:225] [ 670: 671] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:18.673330 345762 usertrap_amd64.go:212] [ 670: 671] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.673337 345762 usertrap_amd64.go:122] [ 670: 671] Allocate a new trap: 0xc001680390 12 D0713 08:45:18.673358 345762 usertrap_amd64.go:225] [ 670: 671] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:18.673387 345762 task_signals.go:470] [ 670: 673] Notified of signal 23 D0713 08:45:18.673421 345762 task_signals.go:179] [ 670: 673] Restarting syscall 202: interrupted by signal 23 D0713 08:45:18.673432 345762 task_signals.go:220] [ 670: 673] Signal 23: delivering to handler D0713 08:45:18.680582 345762 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.680612 345762 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc001680390 13 D0713 08:45:18.680623 345762 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:18.684355 345762 task_signals.go:470] [ 670: 670] Notified of signal 23 D0713 08:45:18.684393 345762 task_signals.go:220] [ 670: 670] Signal 23: delivering to handler D0713 08:45:18.690041 345762 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.690066 345762 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc001680390 14 D0713 08:45:18.690075 345762 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:18.690122 345762 task_exit.go:204] [ 670: 670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.690140 345762 task_exit.go:204] [ 670: 670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.690157 345762 task_signals.go:204] [ 670: 671] Signal 670, PID: 671, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.690175 345762 task_exit.go:204] [ 670: 671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.690183 345762 task_signals.go:204] [ 670: 673] Signal 670, PID: 673, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.690194 345762 task_signals.go:204] [ 670: 674] Signal 670, PID: 674, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.690225 345762 task_signals.go:204] [ 670: 672] Signal 670, PID: 672, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.690238 345762 task_exit.go:204] [ 670: 671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.690257 345762 task_exit.go:204] [ 670: 671] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.690269 345762 task_exit.go:204] [ 670: 673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.690277 345762 task_exit.go:204] [ 670: 673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.690281 345762 task_exit.go:204] [ 670: 673] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.690286 345762 task_exit.go:204] [ 670: 674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.690299 345762 task_exit.go:204] [ 670: 674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.690306 345762 task_exit.go:204] [ 670: 674] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.690320 345762 task_exit.go:204] [ 670: 672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.691698 345762 task_exit.go:204] [ 670: 672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.691725 345762 task_exit.go:204] [ 670: 672] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.691738 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.691769 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.691787 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.691851 345762 task_exit.go:204] [ 670: 670] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.692345 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.693719 345762 syscalls.go:262] [ 675: 675] Allocating stack with size of 8388608 bytes D0713 08:45:18.693826 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.694530 345762 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.694563 345762 usertrap_amd64.go:106] [ 675: 675] Map a usertrap vma at 65000 D0713 08:45:18.694611 345762 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc000540090 1 D0713 08:45:18.694633 345762 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:18.694778 345762 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.694793 345762 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc000540090 2 D0713 08:45:18.694799 345762 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:18.695139 345762 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.695161 345762 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc000540090 3 D0713 08:45:18.695169 345762 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:18.701119 345762 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.701144 345762 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc000540090 4 D0713 08:45:18.701152 345762 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:18.702121 345762 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.702135 345762 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc000540090 5 D0713 08:45:18.702143 345762 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:18.702157 345762 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.702164 345762 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc000540090 6 D0713 08:45:18.702180 345762 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:18.702337 345762 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.702360 345762 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc000540090 7 D0713 08:45:18.702367 345762 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:18.702487 345762 usertrap_amd64.go:212] [ 675: 676] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.702509 345762 usertrap_amd64.go:122] [ 675: 676] Allocate a new trap: 0xc000540090 8 D0713 08:45:18.702515 345762 usertrap_amd64.go:225] [ 675: 676] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:18.702652 345762 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.702690 345762 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc000540090 9 D0713 08:45:18.702700 345762 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:18.702741 345762 usertrap_amd64.go:212] [ 675: 676] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.702749 345762 usertrap_amd64.go:122] [ 675: 676] Allocate a new trap: 0xc000540090 10 D0713 08:45:18.702756 345762 usertrap_amd64.go:225] [ 675: 676] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:18.709118 345762 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.709141 345762 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc000540090 11 D0713 08:45:18.709149 345762 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:18.712964 345762 usertrap_amd64.go:212] [ 675: 676] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.712997 345762 usertrap_amd64.go:122] [ 675: 676] Allocate a new trap: 0xc000540090 12 D0713 08:45:18.713010 345762 usertrap_amd64.go:225] [ 675: 676] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:18.713055 345762 usertrap_amd64.go:212] [ 675: 676] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.713079 345762 usertrap_amd64.go:122] [ 675: 676] Allocate a new trap: 0xc000540090 13 D0713 08:45:18.713091 345762 usertrap_amd64.go:225] [ 675: 676] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:18.713165 345762 task_signals.go:470] [ 675: 675] Notified of signal 23 D0713 08:45:18.713229 345762 task_signals.go:220] [ 675: 675] Signal 23: delivering to handler D0713 08:45:18.718548 345762 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.718577 345762 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc000540090 14 D0713 08:45:18.718590 345762 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:18.718634 345762 task_exit.go:204] [ 675: 675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.718694 345762 task_exit.go:204] [ 675: 675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.718729 345762 task_signals.go:204] [ 675: 677] Signal 675, PID: 677, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.718748 345762 task_signals.go:204] [ 675: 676] Signal 675, PID: 676, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.718757 345762 task_exit.go:204] [ 675: 677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.718768 345762 task_exit.go:204] [ 675: 677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.718780 345762 task_exit.go:204] [ 675: 677] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.718728 345762 task_signals.go:204] [ 675: 679] Signal 675, PID: 679, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.718803 345762 task_exit.go:204] [ 675: 679] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.718839 345762 task_signals.go:204] [ 675: 678] Signal 675, PID: 678, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.718865 345762 task_exit.go:204] [ 675: 679] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.718870 345762 task_exit.go:204] [ 675: 679] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.718880 345762 task_exit.go:204] [ 675: 676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.718886 345762 task_exit.go:204] [ 675: 676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.718892 345762 task_exit.go:204] [ 675: 676] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.718899 345762 task_exit.go:204] [ 675: 678] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.720675 345762 task_exit.go:204] [ 675: 678] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.720697 345762 task_exit.go:204] [ 675: 678] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.720714 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.720740 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.720751 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.720895 345762 task_exit.go:204] [ 675: 675] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.721525 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.722813 345762 syscalls.go:262] [ 680: 680] Allocating stack with size of 8388608 bytes D0713 08:45:18.722941 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.724085 345762 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.724140 345762 usertrap_amd64.go:106] [ 680: 680] Map a usertrap vma at 6a000 D0713 08:45:18.724258 345762 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc00159fd40 1 D0713 08:45:18.724294 345762 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:18.724630 345762 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.724653 345762 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc00159fd40 2 D0713 08:45:18.724663 345762 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:18.725269 345762 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.725297 345762 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc00159fd40 3 D0713 08:45:18.725308 345762 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:18.731348 345762 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.731377 345762 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc00159fd40 4 D0713 08:45:18.731386 345762 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:18.732363 345762 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.732386 345762 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc00159fd40 5 D0713 08:45:18.732393 345762 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:18.732451 345762 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.732465 345762 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc00159fd40 6 D0713 08:45:18.732470 345762 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:18.732716 345762 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.732742 345762 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc00159fd40 7 D0713 08:45:18.732751 345762 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:18.732873 345762 usertrap_amd64.go:212] [ 680: 681] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.732895 345762 usertrap_amd64.go:122] [ 680: 681] Allocate a new trap: 0xc00159fd40 8 D0713 08:45:18.732904 345762 usertrap_amd64.go:225] [ 680: 681] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:18.733127 345762 usertrap_amd64.go:212] [ 680: 681] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.733156 345762 usertrap_amd64.go:122] [ 680: 681] Allocate a new trap: 0xc00159fd40 9 D0713 08:45:18.733169 345762 usertrap_amd64.go:225] [ 680: 681] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:18.733181 345762 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.733189 345762 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc00159fd40 10 D0713 08:45:18.733198 345762 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:18.741265 345762 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.741337 345762 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc00159fd40 11 D0713 08:45:18.741352 345762 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:18.744478 345762 usertrap_amd64.go:212] [ 680: 681] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.744522 345762 usertrap_amd64.go:122] [ 680: 681] Allocate a new trap: 0xc00159fd40 12 D0713 08:45:18.744537 345762 usertrap_amd64.go:225] [ 680: 681] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:18.744627 345762 usertrap_amd64.go:212] [ 680: 681] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.744637 345762 usertrap_amd64.go:122] [ 680: 681] Allocate a new trap: 0xc00159fd40 13 D0713 08:45:18.744644 345762 usertrap_amd64.go:225] [ 680: 681] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:18.744672 345762 task_signals.go:470] [ 680: 680] Notified of signal 23 D0713 08:45:18.744790 345762 task_signals.go:220] [ 680: 680] Signal 23: delivering to handler D0713 08:45:18.752982 345762 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.753038 345762 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc00159fd40 14 D0713 08:45:18.753056 345762 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:18.753138 345762 task_exit.go:204] [ 680: 680] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.753167 345762 task_exit.go:204] [ 680: 680] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.753203 345762 task_signals.go:204] [ 680: 681] Signal 680, PID: 681, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.753236 345762 task_exit.go:204] [ 680: 681] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.753237 345762 task_signals.go:204] [ 680: 684] Signal 680, PID: 684, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.753247 345762 task_exit.go:204] [ 680: 681] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.753285 345762 task_exit.go:204] [ 680: 681] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.753204 345762 task_signals.go:204] [ 680: 683] Signal 680, PID: 683, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.753318 345762 task_exit.go:204] [ 680: 683] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.753339 345762 task_signals.go:204] [ 680: 682] Signal 680, PID: 682, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.753359 345762 task_exit.go:204] [ 680: 683] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.753366 345762 task_exit.go:204] [ 680: 683] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.753412 345762 task_exit.go:204] [ 680: 682] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.753501 345762 task_exit.go:204] [ 680: 682] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.753508 345762 task_exit.go:204] [ 680: 682] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.753529 345762 task_exit.go:204] [ 680: 684] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.754946 345762 task_exit.go:204] [ 680: 684] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.755005 345762 task_exit.go:204] [ 680: 684] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.755038 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.755102 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.755123 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.755204 345762 task_exit.go:204] [ 680: 680] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.756469 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.758181 345762 syscalls.go:262] [ 685: 685] Allocating stack with size of 8388608 bytes D0713 08:45:18.758312 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.759594 345762 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.759640 345762 usertrap_amd64.go:106] [ 685: 685] Map a usertrap vma at 67000 D0713 08:45:18.759760 345762 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc000a22750 1 D0713 08:45:18.759798 345762 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:18.760335 345762 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.760382 345762 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc000a22750 2 D0713 08:45:18.760395 345762 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:18.761077 345762 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.761112 345762 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc000a22750 3 D0713 08:45:18.761125 345762 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:18.767512 345762 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.767538 345762 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc000a22750 4 D0713 08:45:18.767549 345762 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:18.768807 345762 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.768830 345762 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc000a22750 5 D0713 08:45:18.768837 345762 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:18.768892 345762 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.768906 345762 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc000a22750 6 D0713 08:45:18.768911 345762 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:18.769265 345762 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.769289 345762 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc000a22750 7 D0713 08:45:18.769301 345762 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:18.769481 345762 usertrap_amd64.go:212] [ 685: 686] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.769515 345762 usertrap_amd64.go:122] [ 685: 686] Allocate a new trap: 0xc000a22750 8 D0713 08:45:18.769528 345762 usertrap_amd64.go:225] [ 685: 686] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:18.769723 345762 usertrap_amd64.go:212] [ 685: 686] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.769738 345762 usertrap_amd64.go:122] [ 685: 686] Allocate a new trap: 0xc000a22750 9 D0713 08:45:18.769745 345762 usertrap_amd64.go:225] [ 685: 686] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:18.769801 345762 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.769810 345762 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc000a22750 10 D0713 08:45:18.769817 345762 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:18.775990 345762 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.776017 345762 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc000a22750 11 D0713 08:45:18.776028 345762 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:18.780159 345762 usertrap_amd64.go:212] [ 685: 686] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.780192 345762 usertrap_amd64.go:122] [ 685: 686] Allocate a new trap: 0xc000a22750 12 D0713 08:45:18.780205 345762 usertrap_amd64.go:225] [ 685: 686] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:18.780358 345762 usertrap_amd64.go:212] [ 685: 686] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.780442 345762 usertrap_amd64.go:122] [ 685: 686] Allocate a new trap: 0xc000a22750 13 D0713 08:45:18.780455 345762 usertrap_amd64.go:225] [ 685: 686] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:18.780536 345762 task_signals.go:470] [ 685: 685] Notified of signal 23 D0713 08:45:18.780625 345762 task_signals.go:220] [ 685: 685] Signal 23: delivering to handler D0713 08:45:18.787722 345762 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.787744 345762 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc000a22750 14 D0713 08:45:18.787752 345762 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:18.787874 345762 task_exit.go:204] [ 685: 685] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.787893 345762 task_exit.go:204] [ 685: 685] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.787925 345762 task_signals.go:204] [ 685: 687] Signal 685, PID: 687, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.787934 345762 task_exit.go:204] [ 685: 687] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.787942 345762 task_exit.go:204] [ 685: 687] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.787957 345762 task_exit.go:204] [ 685: 687] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.787973 345762 task_signals.go:204] [ 685: 689] Signal 685, PID: 689, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.787990 345762 task_exit.go:204] [ 685: 689] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.787945 345762 task_signals.go:204] [ 685: 686] Signal 685, PID: 686, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.787989 345762 task_signals.go:204] [ 685: 688] Signal 685, PID: 688, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.787998 345762 task_exit.go:204] [ 685: 689] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.788060 345762 task_exit.go:204] [ 685: 689] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.788109 345762 task_exit.go:204] [ 685: 686] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.788151 345762 task_exit.go:204] [ 685: 686] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.788162 345762 task_exit.go:204] [ 685: 686] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.788171 345762 task_exit.go:204] [ 685: 688] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.789765 345762 task_exit.go:204] [ 685: 688] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.789814 345762 task_exit.go:204] [ 685: 688] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.789835 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.789870 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.789892 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.789943 345762 task_exit.go:204] [ 685: 685] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.790568 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.792016 345762 syscalls.go:262] [ 690: 690] Allocating stack with size of 8388608 bytes D0713 08:45:18.792134 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.793311 345762 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.793371 345762 usertrap_amd64.go:106] [ 690: 690] Map a usertrap vma at 67000 D0713 08:45:18.793465 345762 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a227e0 1 D0713 08:45:18.793505 345762 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:18.794001 345762 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.794027 345762 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a227e0 2 D0713 08:45:18.794039 345762 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:18.794828 345762 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.794858 345762 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a227e0 3 D0713 08:45:18.794869 345762 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:18.800809 345762 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.800834 345762 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a227e0 4 D0713 08:45:18.800842 345762 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:18.802024 345762 sampler.go:191] Time: Adjusting syscall overhead down to 671 D0713 08:45:18.802241 345762 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.802268 345762 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a227e0 5 D0713 08:45:18.802275 345762 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:18.802320 345762 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.802344 345762 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a227e0 6 D0713 08:45:18.802352 345762 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:18.802619 345762 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.802639 345762 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a227e0 7 D0713 08:45:18.802648 345762 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:18.802819 345762 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.802852 345762 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc000a227e0 8 D0713 08:45:18.802872 345762 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:18.803029 345762 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.803054 345762 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a227e0 9 D0713 08:45:18.803067 345762 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:18.803186 345762 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.803210 345762 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc000a227e0 10 D0713 08:45:18.803219 345762 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:18.803596 345762 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.803620 345762 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc000a227e0 11 D0713 08:45:18.803632 345762 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:18.803701 345762 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.803712 345762 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc000a227e0 12 D0713 08:45:18.803720 345762 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:18.803741 345762 task_signals.go:470] [ 690: 690] Notified of signal 23 D0713 08:45:18.803812 345762 task_signals.go:220] [ 690: 690] Signal 23: delivering to handler D0713 08:45:18.809909 345762 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.809939 345762 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a227e0 13 D0713 08:45:18.809950 345762 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:18.814348 345762 task_signals.go:470] [ 690: 690] Notified of signal 23 D0713 08:45:18.814371 345762 usertrap_amd64.go:212] [ 690: 693] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:18.814403 345762 usertrap_amd64.go:122] [ 690: 693] Allocate a new trap: 0xc000a227e0 14 D0713 08:45:18.814417 345762 usertrap_amd64.go:225] [ 690: 693] Apply the binary patch addr 46b6e0 trap addr 67460 ([184 24 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:18.814391 345762 task_signals.go:179] [ 690: 690] Restarting syscall 202: interrupted by signal 23 D0713 08:45:18.814431 345762 task_signals.go:220] [ 690: 690] Signal 23: delivering to handler I0713 08:45:18.820709 345762 compat.go:120] Unsupported syscall lookup_dcookie(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/lookup_dcookie for more information. D0713 08:45:18.820783 345762 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.820793 345762 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a227e0 15 D0713 08:45:18.820803 345762 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46ae44 trap addr 674b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 116 6 0]) D0713 08:45:18.820860 345762 task_exit.go:204] [ 690: 690] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.820881 345762 task_exit.go:204] [ 690: 690] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.820903 345762 task_signals.go:204] [ 690: 693] Signal 690, PID: 693, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.820936 345762 task_exit.go:204] [ 690: 693] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.820964 345762 task_exit.go:204] [ 690: 693] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.820956 345762 task_signals.go:204] [ 690: 694] Signal 690, PID: 694, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.820971 345762 task_exit.go:204] [ 690: 693] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.820902 345762 task_signals.go:204] [ 690: 692] Signal 690, PID: 692, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.820958 345762 task_signals.go:204] [ 690: 691] Signal 690, PID: 691, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.820983 345762 task_exit.go:204] [ 690: 694] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.821007 345762 task_signals.go:204] [ 690: 695] Signal 690, PID: 695, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.821024 345762 task_exit.go:204] [ 690: 694] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.821031 345762 task_exit.go:204] [ 690: 694] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.821045 345762 task_exit.go:204] [ 690: 692] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.821058 345762 task_exit.go:204] [ 690: 692] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.821063 345762 task_exit.go:204] [ 690: 692] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.821069 345762 task_exit.go:204] [ 690: 691] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.821077 345762 task_exit.go:204] [ 690: 691] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.821083 345762 task_exit.go:204] [ 690: 691] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.821092 345762 task_exit.go:204] [ 690: 695] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.822424 345762 task_exit.go:204] [ 690: 695] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.822453 345762 task_exit.go:204] [ 690: 695] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.822465 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.822493 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.822501 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.822671 345762 task_exit.go:204] [ 690: 690] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.823187 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.824904 345762 syscalls.go:262] [ 696: 696] Allocating stack with size of 8388608 bytes D0713 08:45:18.825041 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.826115 345762 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.826150 345762 usertrap_amd64.go:106] [ 696: 696] Map a usertrap vma at 65000 D0713 08:45:18.826264 345762 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc0013a6120 1 D0713 08:45:18.826299 345762 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:18.826634 345762 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.826703 345762 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc0013a6120 2 D0713 08:45:18.826723 345762 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:18.827513 345762 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.827534 345762 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc0013a6120 3 D0713 08:45:18.827545 345762 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:18.833855 345762 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.833923 345762 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc0013a6120 4 D0713 08:45:18.833940 345762 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:18.835122 345762 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.835160 345762 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc0013a6120 5 D0713 08:45:18.835172 345762 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:18.835255 345762 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.835269 345762 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc0013a6120 6 D0713 08:45:18.835277 345762 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:18.835547 345762 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.835572 345762 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc0013a6120 7 D0713 08:45:18.835581 345762 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:18.835691 345762 usertrap_amd64.go:212] [ 696: 697] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.835712 345762 usertrap_amd64.go:122] [ 696: 697] Allocate a new trap: 0xc0013a6120 8 D0713 08:45:18.835722 345762 usertrap_amd64.go:225] [ 696: 697] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:18.835933 345762 usertrap_amd64.go:212] [ 696: 697] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.835954 345762 usertrap_amd64.go:122] [ 696: 697] Allocate a new trap: 0xc0013a6120 9 D0713 08:45:18.835964 345762 usertrap_amd64.go:225] [ 696: 697] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:18.835993 345762 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.836008 345762 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc0013a6120 10 D0713 08:45:18.836014 345762 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:18.843610 345762 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.843631 345762 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc0013a6120 11 D0713 08:45:18.843642 345762 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:18.846284 345762 usertrap_amd64.go:212] [ 696: 697] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.846341 345762 usertrap_amd64.go:122] [ 696: 697] Allocate a new trap: 0xc0013a6120 12 D0713 08:45:18.846359 345762 usertrap_amd64.go:225] [ 696: 697] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:18.846399 345762 usertrap_amd64.go:212] [ 696: 697] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.846424 345762 usertrap_amd64.go:122] [ 696: 697] Allocate a new trap: 0xc0013a6120 13 D0713 08:45:18.846436 345762 usertrap_amd64.go:225] [ 696: 697] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:18.846500 345762 task_signals.go:470] [ 696: 696] Notified of signal 23 D0713 08:45:18.846566 345762 task_signals.go:220] [ 696: 696] Signal 23: delivering to handler D0713 08:45:18.853918 345762 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.853943 345762 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc0013a6120 14 D0713 08:45:18.853953 345762 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:18.854008 345762 task_exit.go:204] [ 696: 696] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.854020 345762 task_exit.go:204] [ 696: 696] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.854038 345762 task_signals.go:204] [ 696: 697] Signal 696, PID: 697, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.854062 345762 task_signals.go:204] [ 696: 700] Signal 696, PID: 700, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.854056 345762 task_signals.go:204] [ 696: 699] Signal 696, PID: 699, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.854069 345762 task_exit.go:204] [ 696: 700] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.854068 345762 task_signals.go:204] [ 696: 698] Signal 696, PID: 698, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.854087 345762 task_exit.go:204] [ 696: 700] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.854121 345762 task_exit.go:204] [ 696: 700] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.854143 345762 task_exit.go:204] [ 696: 697] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.854155 345762 task_exit.go:204] [ 696: 697] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.854158 345762 task_exit.go:204] [ 696: 697] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.854168 345762 task_exit.go:204] [ 696: 699] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.854174 345762 task_exit.go:204] [ 696: 699] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.854177 345762 task_exit.go:204] [ 696: 699] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.854185 345762 task_exit.go:204] [ 696: 698] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.855673 345762 task_exit.go:204] [ 696: 698] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.855689 345762 task_exit.go:204] [ 696: 698] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.855699 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.855743 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.855756 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.855811 345762 task_exit.go:204] [ 696: 696] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.856537 345762 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.858286 345762 syscalls.go:262] [ 701: 701] Allocating stack with size of 8388608 bytes D0713 08:45:18.858418 345762 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.859786 345762 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.859825 345762 usertrap_amd64.go:106] [ 701: 701] Map a usertrap vma at 69000 D0713 08:45:18.859927 345762 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc000c922d0 1 D0713 08:45:18.859957 345762 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:18.860277 345762 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.860287 345762 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc000c922d0 2 D0713 08:45:18.860296 345762 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:18.861106 345762 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.861154 345762 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc000c922d0 3 D0713 08:45:18.861167 345762 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:18.868628 345762 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.868655 345762 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc000c922d0 4 D0713 08:45:18.868665 345762 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:18.869797 345762 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.869823 345762 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc000c922d0 5 D0713 08:45:18.869832 345762 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:18.869894 345762 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.869920 345762 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc000c922d0 6 D0713 08:45:18.869925 345762 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:18.870388 345762 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.870404 345762 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc000c922d0 7 D0713 08:45:18.870420 345762 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:18.870618 345762 usertrap_amd64.go:212] [ 701: 702] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.870673 345762 usertrap_amd64.go:122] [ 701: 702] Allocate a new trap: 0xc000c922d0 8 D0713 08:45:18.870696 345762 usertrap_amd64.go:225] [ 701: 702] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:18.870839 345762 usertrap_amd64.go:212] [ 701: 702] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.870871 345762 usertrap_amd64.go:122] [ 701: 702] Allocate a new trap: 0xc000c922d0 9 D0713 08:45:18.870884 345762 usertrap_amd64.go:225] [ 701: 702] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:18.871045 345762 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.871074 345762 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc000c922d0 10 D0713 08:45:18.871083 345762 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:18.871695 345762 usertrap_amd64.go:212] [ 701: 702] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.871728 345762 usertrap_amd64.go:122] [ 701: 702] Allocate a new trap: 0xc000c922d0 11 D0713 08:45:18.871743 345762 usertrap_amd64.go:225] [ 701: 702] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:18.871820 345762 usertrap_amd64.go:212] [ 701: 702] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.871864 345762 usertrap_amd64.go:122] [ 701: 702] Allocate a new trap: 0xc000c922d0 12 D0713 08:45:18.871880 345762 usertrap_amd64.go:225] [ 701: 702] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:18.871933 345762 task_signals.go:470] [ 701: 701] Notified of signal 23 D0713 08:45:18.872047 345762 task_signals.go:220] [ 701: 701] Signal 23: delivering to handler D0713 08:45:18.879145 345762 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.879177 345762 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc000c922d0 13 D0713 08:45:18.879189 345762 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:18.882438 345762 task_signals.go:470] [ 701: 701] Notified of signal 23 D0713 08:45:18.882534 345762 task_signals.go:220] [ 701: 701] Signal 23: delivering to handler D0713 08:45:18.889783 345762 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.889825 345762 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc000c922d0 14 D0713 08:45:18.889841 345762 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:18.889908 345762 task_exit.go:204] [ 701: 701] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.889941 345762 task_exit.go:204] [ 701: 701] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.889965 345762 task_signals.go:204] [ 701: 704] Signal 701, PID: 704, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.889986 345762 task_exit.go:204] [ 701: 704] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.889959 345762 task_signals.go:204] [ 701: 702] Signal 701, PID: 702, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.889996 345762 task_exit.go:204] [ 701: 704] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.890003 345762 task_exit.go:204] [ 701: 704] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.889982 345762 task_signals.go:204] [ 701: 703] Signal 701, PID: 703, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.890023 345762 task_exit.go:204] [ 701: 703] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.890041 345762 task_exit.go:204] [ 701: 703] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.890067 345762 task_exit.go:204] [ 701: 703] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.889977 345762 task_signals.go:204] [ 701: 705] Signal 701, PID: 705, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.890078 345762 task_exit.go:204] [ 701: 705] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.890087 345762 task_exit.go:204] [ 701: 702] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.890196 345762 task_exit.go:204] [ 701: 705] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.890234 345762 task_exit.go:204] [ 701: 705] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.891682 345762 task_exit.go:204] [ 701: 702] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.891734 345762 task_exit.go:204] [ 701: 702] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.891760 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.891804 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.891828 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.891968 345762 task_exit.go:204] [ 701: 701] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.893335 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.894830 345762 syscalls.go:262] [ 706: 706] Allocating stack with size of 8388608 bytes D0713 08:45:18.894966 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.896049 345762 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.896082 345762 usertrap_amd64.go:106] [ 706: 706] Map a usertrap vma at 65000 D0713 08:45:18.896170 345762 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc001680bd0 1 D0713 08:45:18.896197 345762 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:18.896730 345762 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.896764 345762 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc001680bd0 2 D0713 08:45:18.896782 345762 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:18.897599 345762 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.897628 345762 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc001680bd0 3 D0713 08:45:18.897642 345762 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:18.903984 345762 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.904049 345762 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc001680bd0 4 D0713 08:45:18.904071 345762 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:18.905503 345762 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.905541 345762 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc001680bd0 5 D0713 08:45:18.905556 345762 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:18.905617 345762 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.905632 345762 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc001680bd0 6 D0713 08:45:18.905639 345762 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:18.906214 345762 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.906242 345762 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc001680bd0 7 D0713 08:45:18.906256 345762 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:18.906426 345762 usertrap_amd64.go:212] [ 706: 707] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.906443 345762 usertrap_amd64.go:122] [ 706: 707] Allocate a new trap: 0xc001680bd0 8 D0713 08:45:18.906453 345762 usertrap_amd64.go:225] [ 706: 707] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:18.906682 345762 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.906715 345762 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc001680bd0 9 D0713 08:45:18.906727 345762 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:18.906753 345762 usertrap_amd64.go:212] [ 706: 707] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.906760 345762 usertrap_amd64.go:122] [ 706: 707] Allocate a new trap: 0xc001680bd0 10 D0713 08:45:18.906768 345762 usertrap_amd64.go:225] [ 706: 707] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:18.915162 345762 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.915187 345762 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc001680bd0 11 D0713 08:45:18.915197 345762 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:18.918627 345762 usertrap_amd64.go:212] [ 706: 707] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.918657 345762 usertrap_amd64.go:122] [ 706: 707] Allocate a new trap: 0xc001680bd0 12 D0713 08:45:18.918676 345762 usertrap_amd64.go:225] [ 706: 707] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:18.918753 345762 usertrap_amd64.go:212] [ 706: 707] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.918781 345762 usertrap_amd64.go:122] [ 706: 707] Allocate a new trap: 0xc001680bd0 13 D0713 08:45:18.918796 345762 usertrap_amd64.go:225] [ 706: 707] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:18.918851 345762 task_signals.go:470] [ 706: 706] Notified of signal 23 D0713 08:45:18.918937 345762 task_signals.go:220] [ 706: 706] Signal 23: delivering to handler D0713 08:45:18.925570 345762 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.925604 345762 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc001680bd0 14 D0713 08:45:18.925618 345762 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:18.925731 345762 task_exit.go:204] [ 706: 706] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.925762 345762 task_exit.go:204] [ 706: 706] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.925778 345762 task_signals.go:204] [ 706: 708] Signal 706, PID: 708, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.925793 345762 task_signals.go:204] [ 706: 709] Signal 706, PID: 709, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.925817 345762 task_exit.go:204] [ 706: 709] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.925819 345762 task_signals.go:204] [ 706: 710] Signal 706, PID: 710, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.925820 345762 task_signals.go:204] [ 706: 707] Signal 706, PID: 707, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.925835 345762 task_exit.go:204] [ 706: 710] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.925868 345762 task_exit.go:204] [ 706: 710] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.925882 345762 task_exit.go:204] [ 706: 710] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.925903 345762 task_exit.go:204] [ 706: 708] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.925914 345762 task_exit.go:204] [ 706: 708] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.925922 345762 task_exit.go:204] [ 706: 708] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.925938 345762 task_exit.go:204] [ 706: 709] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.925972 345762 task_exit.go:204] [ 706: 709] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.926014 345762 task_exit.go:204] [ 706: 707] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.928121 345762 task_exit.go:204] [ 706: 707] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.928153 345762 task_exit.go:204] [ 706: 707] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.928171 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.928198 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.928210 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.928361 345762 task_exit.go:204] [ 706: 706] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.928514 345762 task_signals.go:470] [ 5: 16] Notified of signal 23 D0713 08:45:18.928593 345762 task_signals.go:220] [ 5: 16] Signal 23: delivering to handler D0713 08:45:18.929117 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.930714 345762 syscalls.go:262] [ 711: 711] Allocating stack with size of 8388608 bytes D0713 08:45:18.930838 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.931978 345762 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.932015 345762 usertrap_amd64.go:106] [ 711: 711] Map a usertrap vma at 68000 D0713 08:45:18.932095 345762 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc000730990 1 D0713 08:45:18.932111 345762 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:45:18.932424 345762 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.932442 345762 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc000730990 2 D0713 08:45:18.932449 345762 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:45:18.933156 345762 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.933187 345762 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc000730990 3 D0713 08:45:18.933198 345762 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:45:18.939013 345762 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.939047 345762 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc000730990 4 D0713 08:45:18.939058 345762 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:45:18.940183 345762 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.940201 345762 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc000730990 5 D0713 08:45:18.940208 345762 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:45:18.940222 345762 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.940230 345762 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc000730990 6 D0713 08:45:18.940235 345762 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:45:18.940597 345762 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.940603 345762 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc000730990 7 D0713 08:45:18.940608 345762 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:45:18.940699 345762 usertrap_amd64.go:212] [ 711: 712] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.940715 345762 usertrap_amd64.go:122] [ 711: 712] Allocate a new trap: 0xc000730990 8 D0713 08:45:18.940722 345762 usertrap_amd64.go:225] [ 711: 712] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:45:18.940889 345762 usertrap_amd64.go:212] [ 711: 712] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.940913 345762 usertrap_amd64.go:122] [ 711: 712] Allocate a new trap: 0xc000730990 9 D0713 08:45:18.940926 345762 usertrap_amd64.go:225] [ 711: 712] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:45:18.941052 345762 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.941062 345762 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc000730990 10 D0713 08:45:18.941069 345762 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:45:18.949886 345762 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.949921 345762 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc000730990 11 D0713 08:45:18.949934 345762 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:45:18.953009 345762 usertrap_amd64.go:212] [ 711: 712] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.953044 345762 usertrap_amd64.go:122] [ 711: 712] Allocate a new trap: 0xc000730990 12 D0713 08:45:18.953058 345762 usertrap_amd64.go:225] [ 711: 712] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:45:18.953108 345762 usertrap_amd64.go:212] [ 711: 712] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.953140 345762 usertrap_amd64.go:122] [ 711: 712] Allocate a new trap: 0xc000730990 13 D0713 08:45:18.953151 345762 usertrap_amd64.go:225] [ 711: 712] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:45:18.953217 345762 task_signals.go:470] [ 711: 711] Notified of signal 23 D0713 08:45:18.953332 345762 task_signals.go:220] [ 711: 711] Signal 23: delivering to handler D0713 08:45:18.960136 345762 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.960166 345762 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc000730990 14 D0713 08:45:18.960183 345762 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:45:18.960253 345762 task_exit.go:204] [ 711: 711] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.960278 345762 task_exit.go:204] [ 711: 711] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.960301 345762 task_signals.go:204] [ 711: 714] Signal 711, PID: 714, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.960296 345762 task_signals.go:204] [ 711: 713] Signal 711, PID: 713, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.960334 345762 task_signals.go:204] [ 711: 716] Signal 711, PID: 716, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.960334 345762 task_signals.go:204] [ 711: 712] Signal 711, PID: 712, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.960347 345762 task_exit.go:204] [ 711: 714] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.960332 345762 task_signals.go:204] [ 711: 715] Signal 711, PID: 715, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.960369 345762 task_exit.go:204] [ 711: 714] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.960375 345762 task_exit.go:204] [ 711: 714] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.960392 345762 task_exit.go:204] [ 711: 713] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.960400 345762 task_exit.go:204] [ 711: 713] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.960406 345762 task_exit.go:204] [ 711: 713] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.960416 345762 task_exit.go:204] [ 711: 715] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.960425 345762 task_exit.go:204] [ 711: 715] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.960430 345762 task_exit.go:204] [ 711: 715] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.960447 345762 task_exit.go:204] [ 711: 716] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.960471 345762 task_exit.go:204] [ 711: 716] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.960476 345762 task_exit.go:204] [ 711: 716] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.960489 345762 task_exit.go:204] [ 711: 712] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.961918 345762 task_exit.go:204] [ 711: 712] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.961944 345762 task_exit.go:204] [ 711: 712] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.961957 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.961984 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.961995 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.962148 345762 task_exit.go:204] [ 711: 711] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.962716 345762 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.964263 345762 syscalls.go:262] [ 717: 717] Allocating stack with size of 8388608 bytes D0713 08:45:18.964362 345762 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.965803 345762 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.965842 345762 usertrap_amd64.go:106] [ 717: 717] Map a usertrap vma at 60000 D0713 08:45:18.965934 345762 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc000730ba0 1 D0713 08:45:18.965954 345762 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:18.966272 345762 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.966294 345762 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc000730ba0 2 D0713 08:45:18.966309 345762 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:18.966832 345762 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.966863 345762 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc000730ba0 3 D0713 08:45:18.966876 345762 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:18.973671 345762 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.973697 345762 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc000730ba0 4 D0713 08:45:18.973707 345762 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:18.974770 345762 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.974790 345762 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc000730ba0 5 D0713 08:45:18.974797 345762 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:18.974812 345762 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.974817 345762 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc000730ba0 6 D0713 08:45:18.974823 345762 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:18.975186 345762 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.975201 345762 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc000730ba0 7 D0713 08:45:18.975208 345762 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:18.975360 345762 usertrap_amd64.go:212] [ 717: 718] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.975376 345762 usertrap_amd64.go:122] [ 717: 718] Allocate a new trap: 0xc000730ba0 8 D0713 08:45:18.975384 345762 usertrap_amd64.go:225] [ 717: 718] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:18.975795 345762 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.975836 345762 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc000730ba0 9 D0713 08:45:18.975856 345762 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:18.975899 345762 usertrap_amd64.go:212] [ 717: 718] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.975908 345762 usertrap_amd64.go:122] [ 717: 718] Allocate a new trap: 0xc000730ba0 10 D0713 08:45:18.975920 345762 usertrap_amd64.go:225] [ 717: 718] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:18.983333 345762 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.983391 345762 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc000730ba0 11 D0713 08:45:18.983412 345762 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:18.986128 345762 usertrap_amd64.go:212] [ 717: 718] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.986169 345762 usertrap_amd64.go:122] [ 717: 718] Allocate a new trap: 0xc000730ba0 12 D0713 08:45:18.986181 345762 usertrap_amd64.go:225] [ 717: 718] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:18.986233 345762 usertrap_amd64.go:212] [ 717: 718] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.986240 345762 usertrap_amd64.go:122] [ 717: 718] Allocate a new trap: 0xc000730ba0 13 D0713 08:45:18.986247 345762 usertrap_amd64.go:225] [ 717: 718] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:18.986265 345762 task_signals.go:470] [ 717: 717] Notified of signal 23 D0713 08:45:18.986349 345762 task_signals.go:220] [ 717: 717] Signal 23: delivering to handler D0713 08:45:18.994591 345762 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.994631 345762 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc000730ba0 14 D0713 08:45:18.994647 345762 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:18.994703 345762 task_exit.go:204] [ 717: 717] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.994739 345762 task_signals.go:204] [ 717: 720] Signal 717, PID: 720, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.994769 345762 task_exit.go:204] [ 717: 717] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.994804 345762 task_signals.go:204] [ 717: 719] Signal 717, PID: 719, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.994815 345762 task_exit.go:204] [ 717: 719] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.994823 345762 task_exit.go:204] [ 717: 719] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.994770 345762 task_signals.go:204] [ 717: 718] Signal 717, PID: 718, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.994829 345762 task_exit.go:204] [ 717: 719] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.994812 345762 task_signals.go:204] [ 717: 722] Signal 717, PID: 722, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.994813 345762 task_signals.go:204] [ 717: 721] Signal 717, PID: 721, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.994896 345762 task_exit.go:204] [ 717: 722] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.995271 345762 task_exit.go:204] [ 717: 722] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.995280 345762 task_exit.go:204] [ 717: 722] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.995297 345762 task_exit.go:204] [ 717: 720] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.995307 345762 task_exit.go:204] [ 717: 720] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.995320 345762 task_exit.go:204] [ 717: 720] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.995331 345762 task_exit.go:204] [ 717: 718] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.995339 345762 task_exit.go:204] [ 717: 718] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.995343 345762 task_exit.go:204] [ 717: 718] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.995352 345762 task_exit.go:204] [ 717: 721] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.997048 345762 task_exit.go:204] [ 717: 721] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.997073 345762 task_exit.go:204] [ 717: 721] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.997087 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:18.997144 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.997190 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:18.997317 345762 task_exit.go:204] [ 717: 717] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.998359 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.000024 345762 syscalls.go:262] [ 723: 723] Allocating stack with size of 8388608 bytes D0713 08:45:19.000154 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.001771 345762 usertrap_amd64.go:212] [ 723: 723] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.001812 345762 usertrap_amd64.go:106] [ 723: 723] Map a usertrap vma at 67000 D0713 08:45:19.001928 345762 usertrap_amd64.go:122] [ 723: 723] Allocate a new trap: 0xc000730f60 1 D0713 08:45:19.001952 345762 usertrap_amd64.go:225] [ 723: 723] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:19.002493 345762 usertrap_amd64.go:212] [ 723: 723] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.002513 345762 usertrap_amd64.go:122] [ 723: 723] Allocate a new trap: 0xc000730f60 2 D0713 08:45:19.002521 345762 usertrap_amd64.go:225] [ 723: 723] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:19.003362 345762 usertrap_amd64.go:212] [ 723: 723] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.003389 345762 usertrap_amd64.go:122] [ 723: 723] Allocate a new trap: 0xc000730f60 3 D0713 08:45:19.003401 345762 usertrap_amd64.go:225] [ 723: 723] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:19.010223 345762 usertrap_amd64.go:212] [ 723: 723] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.010253 345762 usertrap_amd64.go:122] [ 723: 723] Allocate a new trap: 0xc000730f60 4 D0713 08:45:19.010265 345762 usertrap_amd64.go:225] [ 723: 723] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:19.011486 345762 usertrap_amd64.go:212] [ 723: 723] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.011524 345762 usertrap_amd64.go:122] [ 723: 723] Allocate a new trap: 0xc000730f60 5 D0713 08:45:19.011537 345762 usertrap_amd64.go:225] [ 723: 723] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:19.011602 345762 usertrap_amd64.go:212] [ 723: 723] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.011610 345762 usertrap_amd64.go:122] [ 723: 723] Allocate a new trap: 0xc000730f60 6 D0713 08:45:19.011618 345762 usertrap_amd64.go:225] [ 723: 723] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:19.011817 345762 usertrap_amd64.go:212] [ 723: 723] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.011836 345762 usertrap_amd64.go:122] [ 723: 723] Allocate a new trap: 0xc000730f60 7 D0713 08:45:19.011844 345762 usertrap_amd64.go:225] [ 723: 723] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:19.012000 345762 usertrap_amd64.go:212] [ 723: 724] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.012027 345762 usertrap_amd64.go:122] [ 723: 724] Allocate a new trap: 0xc000730f60 8 D0713 08:45:19.012040 345762 usertrap_amd64.go:225] [ 723: 724] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:19.012156 345762 usertrap_amd64.go:212] [ 723: 724] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.012184 345762 usertrap_amd64.go:122] [ 723: 724] Allocate a new trap: 0xc000730f60 9 D0713 08:45:19.012199 345762 usertrap_amd64.go:225] [ 723: 724] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:19.012281 345762 usertrap_amd64.go:212] [ 723: 723] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.012309 345762 usertrap_amd64.go:122] [ 723: 723] Allocate a new trap: 0xc000730f60 10 D0713 08:45:19.012325 345762 usertrap_amd64.go:225] [ 723: 723] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:19.021433 345762 usertrap_amd64.go:212] [ 723: 723] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.021463 345762 usertrap_amd64.go:122] [ 723: 723] Allocate a new trap: 0xc000730f60 11 D0713 08:45:19.021474 345762 usertrap_amd64.go:225] [ 723: 723] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:19.023718 345762 usertrap_amd64.go:212] [ 723: 724] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.023747 345762 usertrap_amd64.go:122] [ 723: 724] Allocate a new trap: 0xc000730f60 12 D0713 08:45:19.023764 345762 usertrap_amd64.go:225] [ 723: 724] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:19.023853 345762 usertrap_amd64.go:212] [ 723: 724] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.023872 345762 usertrap_amd64.go:122] [ 723: 724] Allocate a new trap: 0xc000730f60 13 D0713 08:45:19.023883 345762 usertrap_amd64.go:225] [ 723: 724] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:19.023957 345762 task_signals.go:470] [ 723: 723] Notified of signal 23 D0713 08:45:19.024119 345762 task_signals.go:220] [ 723: 723] Signal 23: delivering to handler I0713 08:45:19.032423 345762 compat.go:120] Unsupported syscall sys_451(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_451 for more information. D0713 08:45:19.032505 345762 usertrap_amd64.go:212] [ 723: 723] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.032522 345762 usertrap_amd64.go:122] [ 723: 723] Allocate a new trap: 0xc000730f60 14 D0713 08:45:19.032532 345762 usertrap_amd64.go:225] [ 723: 723] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:19.032573 345762 task_exit.go:204] [ 723: 723] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.032584 345762 task_exit.go:204] [ 723: 723] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.032605 345762 task_signals.go:204] [ 723: 726] Signal 723, PID: 726, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.032624 345762 task_exit.go:204] [ 723: 726] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.032631 345762 task_exit.go:204] [ 723: 726] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.032636 345762 task_exit.go:204] [ 723: 726] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.032630 345762 task_signals.go:204] [ 723: 725] Signal 723, PID: 725, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.032693 345762 task_exit.go:204] [ 723: 725] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.032653 345762 task_signals.go:204] [ 723: 727] Signal 723, PID: 727, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.032657 345762 task_signals.go:204] [ 723: 724] Signal 723, PID: 724, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.032719 345762 task_exit.go:204] [ 723: 725] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.032735 345762 task_exit.go:204] [ 723: 725] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.032752 345762 task_exit.go:204] [ 723: 727] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.032763 345762 task_exit.go:204] [ 723: 727] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.032767 345762 task_exit.go:204] [ 723: 727] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.032777 345762 task_exit.go:204] [ 723: 724] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.034174 345762 task_exit.go:204] [ 723: 724] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.034209 345762 task_exit.go:204] [ 723: 724] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.034232 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.034266 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.034277 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.034505 345762 task_exit.go:204] [ 723: 723] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.035098 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.036704 345762 syscalls.go:262] [ 728: 728] Allocating stack with size of 8388608 bytes D0713 08:45:19.036803 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.038551 345762 usertrap_amd64.go:212] [ 728: 728] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.038593 345762 usertrap_amd64.go:106] [ 728: 728] Map a usertrap vma at 65000 D0713 08:45:19.038810 345762 usertrap_amd64.go:122] [ 728: 728] Allocate a new trap: 0xc0013a6f90 1 D0713 08:45:19.038839 345762 usertrap_amd64.go:225] [ 728: 728] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:19.039772 345762 usertrap_amd64.go:212] [ 728: 728] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.039804 345762 usertrap_amd64.go:122] [ 728: 728] Allocate a new trap: 0xc0013a6f90 2 D0713 08:45:19.039816 345762 usertrap_amd64.go:225] [ 728: 728] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:19.041020 345762 usertrap_amd64.go:212] [ 728: 728] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.041040 345762 usertrap_amd64.go:122] [ 728: 728] Allocate a new trap: 0xc0013a6f90 3 D0713 08:45:19.041051 345762 usertrap_amd64.go:225] [ 728: 728] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:19.047889 345762 usertrap_amd64.go:212] [ 728: 728] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.047920 345762 usertrap_amd64.go:122] [ 728: 728] Allocate a new trap: 0xc0013a6f90 4 D0713 08:45:19.047937 345762 usertrap_amd64.go:225] [ 728: 728] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:19.049277 345762 usertrap_amd64.go:212] [ 728: 728] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.049301 345762 usertrap_amd64.go:122] [ 728: 728] Allocate a new trap: 0xc0013a6f90 5 D0713 08:45:19.049311 345762 usertrap_amd64.go:225] [ 728: 728] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:19.049367 345762 usertrap_amd64.go:212] [ 728: 728] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.049380 345762 usertrap_amd64.go:122] [ 728: 728] Allocate a new trap: 0xc0013a6f90 6 D0713 08:45:19.049387 345762 usertrap_amd64.go:225] [ 728: 728] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:19.049746 345762 usertrap_amd64.go:212] [ 728: 728] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.049766 345762 usertrap_amd64.go:122] [ 728: 728] Allocate a new trap: 0xc0013a6f90 7 D0713 08:45:19.049775 345762 usertrap_amd64.go:225] [ 728: 728] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:19.049951 345762 usertrap_amd64.go:212] [ 728: 729] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.049981 345762 usertrap_amd64.go:122] [ 728: 729] Allocate a new trap: 0xc0013a6f90 8 D0713 08:45:19.049996 345762 usertrap_amd64.go:225] [ 728: 729] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:19.050245 345762 usertrap_amd64.go:212] [ 728: 729] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.050275 345762 usertrap_amd64.go:122] [ 728: 729] Allocate a new trap: 0xc0013a6f90 9 D0713 08:45:19.050290 345762 usertrap_amd64.go:225] [ 728: 729] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:19.050401 345762 usertrap_amd64.go:212] [ 728: 728] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.050434 345762 usertrap_amd64.go:122] [ 728: 728] Allocate a new trap: 0xc0013a6f90 10 D0713 08:45:19.050450 345762 usertrap_amd64.go:225] [ 728: 728] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:19.050483 345762 usertrap_amd64.go:212] [ 728: 731] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:19.050501 345762 usertrap_amd64.go:122] [ 728: 731] Allocate a new trap: 0xc0013a6f90 11 D0713 08:45:19.050515 345762 usertrap_amd64.go:225] [ 728: 731] Apply the binary patch addr 46b6e0 trap addr 65370 ([184 24 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:19.058314 345762 usertrap_amd64.go:212] [ 728: 728] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.058348 345762 usertrap_amd64.go:122] [ 728: 728] Allocate a new trap: 0xc0013a6f90 12 D0713 08:45:19.058359 345762 usertrap_amd64.go:225] [ 728: 728] Apply the binary patch addr 46af29 trap addr 653c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:19.061409 345762 usertrap_amd64.go:212] [ 728: 729] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.061442 345762 usertrap_amd64.go:122] [ 728: 729] Allocate a new trap: 0xc0013a6f90 13 D0713 08:45:19.061453 345762 usertrap_amd64.go:225] [ 728: 729] Apply the binary patch addr 46b020 trap addr 65410 ([184 39 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:19.061515 345762 usertrap_amd64.go:212] [ 728: 729] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.061521 345762 usertrap_amd64.go:122] [ 728: 729] Allocate a new trap: 0xc0013a6f90 14 D0713 08:45:19.061529 345762 usertrap_amd64.go:225] [ 728: 729] Apply the binary patch addr 46b04f trap addr 65460 ([184 234 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:19.061596 345762 task_signals.go:470] [ 728: 728] Notified of signal 23 D0713 08:45:19.061687 345762 task_signals.go:220] [ 728: 728] Signal 23: delivering to handler D0713 08:45:19.069302 345762 usertrap_amd64.go:212] [ 728: 728] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.069332 345762 usertrap_amd64.go:122] [ 728: 728] Allocate a new trap: 0xc0013a6f90 15 D0713 08:45:19.069344 345762 usertrap_amd64.go:225] [ 728: 728] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0713 08:45:19.069413 345762 task_exit.go:204] [ 728: 728] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.069439 345762 task_exit.go:204] [ 728: 728] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.069476 345762 task_signals.go:204] [ 728: 729] Signal 728, PID: 729, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.069488 345762 task_signals.go:204] [ 728: 732] Signal 728, PID: 732, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.069490 345762 task_signals.go:204] [ 728: 731] Signal 728, PID: 731, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.069505 345762 task_signals.go:204] [ 728: 730] Signal 728, PID: 730, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.069530 345762 task_exit.go:204] [ 728: 729] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.069547 345762 task_exit.go:204] [ 728: 729] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.069554 345762 task_exit.go:204] [ 728: 729] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.069572 345762 task_exit.go:204] [ 728: 732] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.069585 345762 task_exit.go:204] [ 728: 732] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.069596 345762 task_exit.go:204] [ 728: 732] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.069613 345762 task_exit.go:204] [ 728: 730] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.069671 345762 task_exit.go:204] [ 728: 730] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.069688 345762 task_exit.go:204] [ 728: 730] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.069715 345762 task_exit.go:204] [ 728: 731] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.071060 345762 task_exit.go:204] [ 728: 731] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.071099 345762 task_exit.go:204] [ 728: 731] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.071120 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.071154 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.071180 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.071326 345762 task_exit.go:204] [ 728: 728] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.072002 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.073711 345762 syscalls.go:262] [ 733: 733] Allocating stack with size of 8388608 bytes D0713 08:45:19.073837 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.075674 345762 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.075729 345762 usertrap_amd64.go:106] [ 733: 733] Map a usertrap vma at 60000 D0713 08:45:19.075847 345762 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc001681110 1 D0713 08:45:19.075892 345762 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:19.076359 345762 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.076399 345762 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc001681110 2 D0713 08:45:19.076413 345762 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:19.077447 345762 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.077513 345762 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc001681110 3 D0713 08:45:19.077536 345762 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:19.085140 345762 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.085189 345762 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc001681110 4 D0713 08:45:19.085210 345762 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:19.086609 345762 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.086637 345762 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc001681110 5 D0713 08:45:19.086649 345762 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:19.086722 345762 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.086736 345762 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc001681110 6 D0713 08:45:19.086745 345762 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:19.087229 345762 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.087254 345762 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc001681110 7 D0713 08:45:19.087264 345762 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:19.087473 345762 usertrap_amd64.go:212] [ 733: 734] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.087516 345762 usertrap_amd64.go:122] [ 733: 734] Allocate a new trap: 0xc001681110 8 D0713 08:45:19.087533 345762 usertrap_amd64.go:225] [ 733: 734] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:19.087922 345762 usertrap_amd64.go:212] [ 733: 734] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.087951 345762 usertrap_amd64.go:122] [ 733: 734] Allocate a new trap: 0xc001681110 9 D0713 08:45:19.087967 345762 usertrap_amd64.go:225] [ 733: 734] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:19.087984 345762 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.087991 345762 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc001681110 10 D0713 08:45:19.088001 345762 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:19.097055 345762 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.097132 345762 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc001681110 11 D0713 08:45:19.097162 345762 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:19.100589 345762 usertrap_amd64.go:212] [ 733: 734] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.100628 345762 usertrap_amd64.go:122] [ 733: 734] Allocate a new trap: 0xc001681110 12 D0713 08:45:19.100641 345762 usertrap_amd64.go:225] [ 733: 734] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:19.100668 345762 usertrap_amd64.go:212] [ 733: 734] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.100673 345762 usertrap_amd64.go:122] [ 733: 734] Allocate a new trap: 0xc001681110 13 D0713 08:45:19.100680 345762 usertrap_amd64.go:225] [ 733: 734] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:19.100701 345762 task_signals.go:470] [ 733: 733] Notified of signal 23 D0713 08:45:19.100745 345762 task_signals.go:220] [ 733: 733] Signal 23: delivering to handler I0713 08:45:19.108131 345762 compat.go:120] Unsupported syscall membarrier(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/membarrier for more information. D0713 08:45:19.108219 345762 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.108236 345762 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc001681110 14 D0713 08:45:19.108246 345762 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:19.108304 345762 task_exit.go:204] [ 733: 733] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.108319 345762 task_exit.go:204] [ 733: 733] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.108339 345762 task_signals.go:204] [ 733: 734] Signal 733, PID: 734, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.108350 345762 task_exit.go:204] [ 733: 734] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.108356 345762 task_exit.go:204] [ 733: 734] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.108360 345762 task_exit.go:204] [ 733: 734] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.108362 345762 task_signals.go:204] [ 733: 736] Signal 733, PID: 736, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.108388 345762 task_signals.go:204] [ 733: 735] Signal 733, PID: 735, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.108389 345762 task_exit.go:204] [ 733: 736] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.108426 345762 task_exit.go:204] [ 733: 736] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.108432 345762 task_exit.go:204] [ 733: 736] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.108375 345762 task_signals.go:204] [ 733: 738] Signal 733, PID: 738, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.108443 345762 task_exit.go:204] [ 733: 738] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.108448 345762 task_exit.go:204] [ 733: 738] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.108453 345762 task_exit.go:204] [ 733: 738] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.108384 345762 task_signals.go:204] [ 733: 737] Signal 733, PID: 737, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.108462 345762 task_exit.go:204] [ 733: 735] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.108468 345762 task_exit.go:204] [ 733: 735] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.108475 345762 task_exit.go:204] [ 733: 735] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.108493 345762 task_exit.go:204] [ 733: 737] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.110299 345762 task_exit.go:204] [ 733: 737] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.110321 345762 task_exit.go:204] [ 733: 737] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.110332 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.110363 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.110369 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.110489 345762 task_exit.go:204] [ 733: 733] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.111026 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.112652 345762 syscalls.go:262] [ 739: 739] Allocating stack with size of 8388608 bytes D0713 08:45:19.112752 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.113900 345762 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.113952 345762 usertrap_amd64.go:106] [ 739: 739] Map a usertrap vma at 62000 D0713 08:45:19.114099 345762 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc000a239b0 1 D0713 08:45:19.114135 345762 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:19.114925 345762 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.114953 345762 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc000a239b0 2 D0713 08:45:19.114964 345762 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:19.115585 345762 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.115613 345762 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc000a239b0 3 D0713 08:45:19.115628 345762 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:19.121535 345762 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.121572 345762 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc000a239b0 4 D0713 08:45:19.121585 345762 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:19.122724 345762 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.122758 345762 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc000a239b0 5 D0713 08:45:19.122771 345762 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:19.122826 345762 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.122843 345762 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc000a239b0 6 D0713 08:45:19.122850 345762 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:19.123192 345762 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.123222 345762 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc000a239b0 7 D0713 08:45:19.123232 345762 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:19.123468 345762 usertrap_amd64.go:212] [ 739: 740] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.123499 345762 usertrap_amd64.go:122] [ 739: 740] Allocate a new trap: 0xc000a239b0 8 D0713 08:45:19.123515 345762 usertrap_amd64.go:225] [ 739: 740] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:19.123758 345762 usertrap_amd64.go:212] [ 739: 740] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.123791 345762 usertrap_amd64.go:122] [ 739: 740] Allocate a new trap: 0xc000a239b0 9 D0713 08:45:19.123803 345762 usertrap_amd64.go:225] [ 739: 740] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:19.124011 345762 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.124104 345762 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc000a239b0 10 D0713 08:45:19.124135 345762 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:19.131815 345762 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.131854 345762 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc000a239b0 11 D0713 08:45:19.131867 345762 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:19.134560 345762 usertrap_amd64.go:212] [ 739: 740] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.134599 345762 usertrap_amd64.go:122] [ 739: 740] Allocate a new trap: 0xc000a239b0 12 D0713 08:45:19.134614 345762 usertrap_amd64.go:225] [ 739: 740] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:19.134663 345762 usertrap_amd64.go:212] [ 739: 740] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.134694 345762 usertrap_amd64.go:122] [ 739: 740] Allocate a new trap: 0xc000a239b0 13 D0713 08:45:19.134713 345762 usertrap_amd64.go:225] [ 739: 740] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:19.134789 345762 task_signals.go:470] [ 739: 739] Notified of signal 23 D0713 08:45:19.134880 345762 task_signals.go:220] [ 739: 739] Signal 23: delivering to handler D0713 08:45:19.141599 345762 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.141630 345762 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc000a239b0 14 D0713 08:45:19.141640 345762 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:19.141697 345762 task_exit.go:204] [ 739: 739] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.141746 345762 task_signals.go:204] [ 739: 740] Signal 739, PID: 740, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.141768 345762 task_exit.go:204] [ 739: 739] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.141793 345762 task_exit.go:204] [ 739: 740] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.141812 345762 task_signals.go:204] [ 739: 743] Signal 739, PID: 743, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.141839 345762 task_signals.go:204] [ 739: 741] Signal 739, PID: 741, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.141887 345762 task_signals.go:204] [ 739: 742] Signal 739, PID: 742, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.141901 345762 task_exit.go:204] [ 739: 740] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.141908 345762 task_exit.go:204] [ 739: 740] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.141921 345762 task_exit.go:204] [ 739: 743] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.141937 345762 task_exit.go:204] [ 739: 743] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.141941 345762 task_exit.go:204] [ 739: 743] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.141949 345762 task_exit.go:204] [ 739: 742] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.141957 345762 task_exit.go:204] [ 739: 742] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.141961 345762 task_exit.go:204] [ 739: 742] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.141969 345762 task_exit.go:204] [ 739: 741] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.143456 345762 task_exit.go:204] [ 739: 741] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.143481 345762 task_exit.go:204] [ 739: 741] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.143499 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.143525 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.143545 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.143615 345762 task_exit.go:204] [ 739: 739] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.144269 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.145822 345762 syscalls.go:262] [ 744: 744] Allocating stack with size of 8388608 bytes D0713 08:45:19.145922 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.147426 345762 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.147472 345762 usertrap_amd64.go:106] [ 744: 744] Map a usertrap vma at 65000 D0713 08:45:19.147574 345762 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc000c569f0 1 D0713 08:45:19.147602 345762 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:19.147940 345762 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.147961 345762 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc000c569f0 2 D0713 08:45:19.147971 345762 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:19.148848 345762 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.148889 345762 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc000c569f0 3 D0713 08:45:19.148903 345762 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:19.154696 345762 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.154728 345762 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc000c569f0 4 D0713 08:45:19.154740 345762 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:19.156020 345762 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.156040 345762 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc000c569f0 5 D0713 08:45:19.156048 345762 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:19.156092 345762 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.156115 345762 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc000c569f0 6 D0713 08:45:19.156121 345762 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:19.156642 345762 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.156672 345762 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc000c569f0 7 D0713 08:45:19.156683 345762 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:19.156828 345762 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.156843 345762 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc000c569f0 8 D0713 08:45:19.156850 345762 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:19.157087 345762 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.157113 345762 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc000c569f0 9 D0713 08:45:19.157122 345762 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:19.157132 345762 usertrap_amd64.go:212] [ 744: 747] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.157143 345762 usertrap_amd64.go:122] [ 744: 747] Allocate a new trap: 0xc000c569f0 10 D0713 08:45:19.157150 345762 usertrap_amd64.go:225] [ 744: 747] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:19.164873 345762 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.164897 345762 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc000c569f0 11 D0713 08:45:19.164906 345762 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:19.168615 345762 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.168661 345762 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc000c569f0 12 D0713 08:45:19.168675 345762 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:19.168767 345762 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.168776 345762 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc000c569f0 13 D0713 08:45:19.168787 345762 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:19.168805 345762 task_signals.go:470] [ 744: 744] Notified of signal 23 D0713 08:45:19.168859 345762 task_signals.go:220] [ 744: 744] Signal 23: delivering to handler I0713 08:45:19.177593 345762 compat.go:120] Unsupported syscall sys_447(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_447 for more information. D0713 08:45:19.177708 345762 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.177723 345762 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc000c569f0 14 D0713 08:45:19.177740 345762 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:19.177823 345762 task_exit.go:204] [ 744: 744] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.177855 345762 task_exit.go:204] [ 744: 744] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.177878 345762 task_signals.go:204] [ 744: 747] Signal 744, PID: 747, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.177903 345762 task_exit.go:204] [ 744: 747] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.177887 345762 task_signals.go:204] [ 744: 745] Signal 744, PID: 745, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.177906 345762 task_signals.go:204] [ 744: 746] Signal 744, PID: 746, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.177922 345762 task_exit.go:204] [ 744: 747] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.177956 345762 task_exit.go:204] [ 744: 747] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.177985 345762 task_signals.go:204] [ 744: 748] Signal 744, PID: 748, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.177994 345762 task_exit.go:204] [ 744: 745] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.178049 345762 task_exit.go:204] [ 744: 745] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.178070 345762 task_exit.go:204] [ 744: 745] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.178086 345762 task_exit.go:204] [ 744: 748] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.178102 345762 task_exit.go:204] [ 744: 748] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.178107 345762 task_exit.go:204] [ 744: 748] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.178117 345762 task_exit.go:204] [ 744: 746] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.179641 345762 task_exit.go:204] [ 744: 746] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.179651 345762 task_exit.go:204] [ 744: 746] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.179666 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.179698 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.179718 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.179797 345762 task_exit.go:204] [ 744: 744] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.179904 345762 task_signals.go:470] [ 5: 16] Notified of signal 23 D0713 08:45:19.179969 345762 task_signals.go:220] [ 5: 16] Signal 23: delivering to handler D0713 08:45:19.180363 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.181912 345762 syscalls.go:262] [ 749: 749] Allocating stack with size of 8388608 bytes D0713 08:45:19.182036 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.183092 345762 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.183126 345762 usertrap_amd64.go:106] [ 749: 749] Map a usertrap vma at 64000 D0713 08:45:19.183565 345762 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc000731a40 1 D0713 08:45:19.183601 345762 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:19.184081 345762 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.184102 345762 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc000731a40 2 D0713 08:45:19.184111 345762 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:19.184784 345762 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.184806 345762 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc000731a40 3 D0713 08:45:19.184816 345762 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:19.191798 345762 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.191869 345762 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc000731a40 4 D0713 08:45:19.191898 345762 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:19.193142 345762 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.193171 345762 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc000731a40 5 D0713 08:45:19.193180 345762 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:19.193265 345762 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.193275 345762 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc000731a40 6 D0713 08:45:19.193284 345762 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:19.193581 345762 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.193616 345762 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc000731a40 7 D0713 08:45:19.193628 345762 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:19.193819 345762 usertrap_amd64.go:212] [ 749: 750] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.193840 345762 usertrap_amd64.go:122] [ 749: 750] Allocate a new trap: 0xc000731a40 8 D0713 08:45:19.193848 345762 usertrap_amd64.go:225] [ 749: 750] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:19.194023 345762 usertrap_amd64.go:212] [ 749: 750] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.194031 345762 usertrap_amd64.go:122] [ 749: 750] Allocate a new trap: 0xc000731a40 9 D0713 08:45:19.194037 345762 usertrap_amd64.go:225] [ 749: 750] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:19.194135 345762 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.194160 345762 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc000731a40 10 D0713 08:45:19.194172 345762 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:19.201346 345762 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.201377 345762 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc000731a40 11 D0713 08:45:19.201388 345762 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:19.205320 345762 usertrap_amd64.go:212] [ 749: 750] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.205351 345762 usertrap_amd64.go:122] [ 749: 750] Allocate a new trap: 0xc000731a40 12 D0713 08:45:19.205361 345762 usertrap_amd64.go:225] [ 749: 750] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:19.205416 345762 usertrap_amd64.go:212] [ 749: 750] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.205422 345762 usertrap_amd64.go:122] [ 749: 750] Allocate a new trap: 0xc000731a40 13 D0713 08:45:19.205428 345762 usertrap_amd64.go:225] [ 749: 750] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:19.205454 345762 task_signals.go:470] [ 749: 749] Notified of signal 23 D0713 08:45:19.205515 345762 task_signals.go:220] [ 749: 749] Signal 23: delivering to handler I0713 08:45:19.212993 345762 compat.go:120] Unsupported syscall migrate_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/migrate_pages for more information. D0713 08:45:19.213314 345762 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.213366 345762 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc000731a40 14 D0713 08:45:19.213396 345762 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:19.213529 345762 task_exit.go:204] [ 749: 749] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.213575 345762 task_exit.go:204] [ 749: 749] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.213625 345762 task_signals.go:204] [ 749: 751] Signal 749, PID: 751, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.213635 345762 task_signals.go:204] [ 749: 750] Signal 749, PID: 750, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.213671 345762 task_exit.go:204] [ 749: 750] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.213694 345762 task_signals.go:204] [ 749: 752] Signal 749, PID: 752, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.213727 345762 task_exit.go:204] [ 749: 750] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.213739 345762 task_exit.go:204] [ 749: 750] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.213726 345762 task_signals.go:204] [ 749: 753] Signal 749, PID: 753, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.213757 345762 task_exit.go:204] [ 749: 751] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.213833 345762 task_exit.go:204] [ 749: 751] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.213890 345762 task_exit.go:204] [ 749: 751] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.213919 345762 task_exit.go:204] [ 749: 752] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.213950 345762 task_exit.go:204] [ 749: 752] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.213957 345762 task_exit.go:204] [ 749: 752] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.213970 345762 task_exit.go:204] [ 749: 753] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.215517 345762 task_exit.go:204] [ 749: 753] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.215545 345762 task_exit.go:204] [ 749: 753] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.215555 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.215583 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.215591 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.215711 345762 task_exit.go:204] [ 749: 749] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.216365 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.217542 345762 syscalls.go:262] [ 754: 754] Allocating stack with size of 8388608 bytes D0713 08:45:19.217698 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.219304 345762 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.219348 345762 usertrap_amd64.go:106] [ 754: 754] Map a usertrap vma at 60000 D0713 08:45:19.219448 345762 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc000731dd0 1 D0713 08:45:19.219480 345762 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:19.219987 345762 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.220015 345762 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc000731dd0 2 D0713 08:45:19.220025 345762 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:19.220869 345762 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.220896 345762 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc000731dd0 3 D0713 08:45:19.220906 345762 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:19.227945 345762 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.228015 345762 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc000731dd0 4 D0713 08:45:19.228034 345762 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:19.229297 345762 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.229330 345762 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc000731dd0 5 D0713 08:45:19.229342 345762 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:19.229399 345762 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.229411 345762 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc000731dd0 6 D0713 08:45:19.229418 345762 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:19.229818 345762 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.229837 345762 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc000731dd0 7 D0713 08:45:19.229845 345762 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:19.230025 345762 usertrap_amd64.go:212] [ 754: 755] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.230081 345762 usertrap_amd64.go:122] [ 754: 755] Allocate a new trap: 0xc000731dd0 8 D0713 08:45:19.230103 345762 usertrap_amd64.go:225] [ 754: 755] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:19.230278 345762 usertrap_amd64.go:212] [ 754: 755] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.230303 345762 usertrap_amd64.go:122] [ 754: 755] Allocate a new trap: 0xc000731dd0 9 D0713 08:45:19.230314 345762 usertrap_amd64.go:225] [ 754: 755] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:19.230423 345762 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.230459 345762 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc000731dd0 10 D0713 08:45:19.230472 345762 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:19.238817 345762 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.238875 345762 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc000731dd0 11 D0713 08:45:19.238891 345762 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:19.242105 345762 usertrap_amd64.go:212] [ 754: 755] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.242191 345762 usertrap_amd64.go:122] [ 754: 755] Allocate a new trap: 0xc000731dd0 12 D0713 08:45:19.242212 345762 usertrap_amd64.go:225] [ 754: 755] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:19.242251 345762 usertrap_amd64.go:212] [ 754: 755] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.242269 345762 usertrap_amd64.go:122] [ 754: 755] Allocate a new trap: 0xc000731dd0 13 D0713 08:45:19.242276 345762 usertrap_amd64.go:225] [ 754: 755] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:19.242313 345762 task_signals.go:470] [ 754: 754] Notified of signal 23 D0713 08:45:19.242457 345762 task_signals.go:220] [ 754: 754] Signal 23: delivering to handler D0713 08:45:19.252813 345762 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.252854 345762 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc000731dd0 14 D0713 08:45:19.252879 345762 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:19.253012 345762 task_exit.go:204] [ 754: 754] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.253049 345762 task_exit.go:204] [ 754: 754] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.253090 345762 task_signals.go:204] [ 754: 755] Signal 754, PID: 755, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.253116 345762 task_exit.go:204] [ 754: 755] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.253106 345762 task_signals.go:204] [ 754: 757] Signal 754, PID: 757, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.253125 345762 task_exit.go:204] [ 754: 755] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.253156 345762 task_exit.go:204] [ 754: 755] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.253190 345762 task_signals.go:204] [ 754: 756] Signal 754, PID: 756, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.253225 345762 task_exit.go:204] [ 754: 756] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.253270 345762 task_signals.go:204] [ 754: 758] Signal 754, PID: 758, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.253302 345762 task_exit.go:204] [ 754: 756] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.253318 345762 task_exit.go:204] [ 754: 756] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.253339 345762 task_exit.go:204] [ 754: 757] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.253361 345762 task_exit.go:204] [ 754: 757] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.253368 345762 task_exit.go:204] [ 754: 757] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.253381 345762 task_exit.go:204] [ 754: 758] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.255638 345762 task_exit.go:204] [ 754: 758] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.255684 345762 task_exit.go:204] [ 754: 758] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.255703 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.255744 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.255770 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.255842 345762 task_exit.go:204] [ 754: 754] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.256524 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.258106 345762 syscalls.go:262] [ 759: 759] Allocating stack with size of 8388608 bytes D0713 08:45:19.258229 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.260453 345762 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.260505 345762 usertrap_amd64.go:106] [ 759: 759] Map a usertrap vma at 64000 D0713 08:45:19.260629 345762 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc000c571a0 1 D0713 08:45:19.260664 345762 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:19.261003 345762 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.261026 345762 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc000c571a0 2 D0713 08:45:19.261036 345762 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:19.261811 345762 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.261841 345762 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc000c571a0 3 D0713 08:45:19.261854 345762 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:19.267877 345762 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.267905 345762 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc000c571a0 4 D0713 08:45:19.267916 345762 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:19.269119 345762 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.269149 345762 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc000c571a0 5 D0713 08:45:19.269157 345762 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:19.269301 345762 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.269318 345762 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc000c571a0 6 D0713 08:45:19.269324 345762 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:19.269802 345762 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.269822 345762 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc000c571a0 7 D0713 08:45:19.269828 345762 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:19.269948 345762 usertrap_amd64.go:212] [ 759: 760] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.269965 345762 usertrap_amd64.go:122] [ 759: 760] Allocate a new trap: 0xc000c571a0 8 D0713 08:45:19.269977 345762 usertrap_amd64.go:225] [ 759: 760] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:19.270139 345762 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.270161 345762 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc000c571a0 9 D0713 08:45:19.270170 345762 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:19.270179 345762 usertrap_amd64.go:212] [ 759: 760] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.270186 345762 usertrap_amd64.go:122] [ 759: 760] Allocate a new trap: 0xc000c571a0 10 D0713 08:45:19.270194 345762 usertrap_amd64.go:225] [ 759: 760] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:19.270299 345762 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:19.270324 345762 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc000c571a0 11 D0713 08:45:19.270334 345762 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46b6e0 trap addr 64370 ([184 24 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:19.277463 345762 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.277489 345762 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc000c571a0 12 D0713 08:45:19.277497 345762 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:19.281205 345762 usertrap_amd64.go:212] [ 759: 760] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.281245 345762 usertrap_amd64.go:122] [ 759: 760] Allocate a new trap: 0xc000c571a0 13 D0713 08:45:19.281259 345762 usertrap_amd64.go:225] [ 759: 760] Apply the binary patch addr 46b020 trap addr 64410 ([184 39 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:19.281369 345762 usertrap_amd64.go:212] [ 759: 760] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.281439 345762 usertrap_amd64.go:122] [ 759: 760] Allocate a new trap: 0xc000c571a0 14 D0713 08:45:19.281457 345762 usertrap_amd64.go:225] [ 759: 760] Apply the binary patch addr 46b04f trap addr 64460 ([184 234 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:19.281512 345762 task_signals.go:470] [ 759: 759] Notified of signal 23 D0713 08:45:19.281604 345762 task_signals.go:220] [ 759: 759] Signal 23: delivering to handler D0713 08:45:19.287887 345762 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.287912 345762 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc000c571a0 15 D0713 08:45:19.287924 345762 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0713 08:45:19.288031 345762 task_exit.go:204] [ 759: 759] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.288058 345762 task_exit.go:204] [ 759: 759] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.288080 345762 task_signals.go:204] [ 759: 762] Signal 759, PID: 762, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.288079 345762 task_signals.go:204] [ 759: 761] Signal 759, PID: 761, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.288097 345762 task_signals.go:204] [ 759: 763] Signal 759, PID: 763, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.288103 345762 task_exit.go:204] [ 759: 762] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.288135 345762 task_signals.go:204] [ 759: 760] Signal 759, PID: 760, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.288141 345762 task_exit.go:204] [ 759: 762] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.288163 345762 task_exit.go:204] [ 759: 762] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.288185 345762 task_exit.go:204] [ 759: 760] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.288195 345762 task_exit.go:204] [ 759: 760] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.288202 345762 task_exit.go:204] [ 759: 760] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.288242 345762 task_exit.go:204] [ 759: 761] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.288263 345762 task_exit.go:204] [ 759: 761] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.288275 345762 task_exit.go:204] [ 759: 761] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.288294 345762 task_exit.go:204] [ 759: 763] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.289708 345762 task_exit.go:204] [ 759: 763] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.289729 345762 task_exit.go:204] [ 759: 763] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.289747 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.289776 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.289802 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.289963 345762 task_exit.go:204] [ 759: 759] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.290200 345762 task_signals.go:470] [ 5: 21] Notified of signal 23 D0713 08:45:19.290372 345762 task_signals.go:220] [ 5: 21] Signal 23: delivering to handler D0713 08:45:19.290839 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.292927 345762 syscalls.go:262] [ 764: 764] Allocating stack with size of 8388608 bytes D0713 08:45:19.293106 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.293994 345762 usertrap_amd64.go:212] [ 764: 764] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.294036 345762 usertrap_amd64.go:106] [ 764: 764] Map a usertrap vma at 63000 D0713 08:45:19.294156 345762 usertrap_amd64.go:122] [ 764: 764] Allocate a new trap: 0xc001681da0 1 D0713 08:45:19.294188 345762 usertrap_amd64.go:225] [ 764: 764] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:19.294630 345762 usertrap_amd64.go:212] [ 764: 764] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.294655 345762 usertrap_amd64.go:122] [ 764: 764] Allocate a new trap: 0xc001681da0 2 D0713 08:45:19.294663 345762 usertrap_amd64.go:225] [ 764: 764] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:19.295129 345762 usertrap_amd64.go:212] [ 764: 764] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.295146 345762 usertrap_amd64.go:122] [ 764: 764] Allocate a new trap: 0xc001681da0 3 D0713 08:45:19.295152 345762 usertrap_amd64.go:225] [ 764: 764] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:19.301202 345762 usertrap_amd64.go:212] [ 764: 764] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.301273 345762 usertrap_amd64.go:122] [ 764: 764] Allocate a new trap: 0xc001681da0 4 D0713 08:45:19.301296 345762 usertrap_amd64.go:225] [ 764: 764] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:19.302419 345762 usertrap_amd64.go:212] [ 764: 764] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.302448 345762 usertrap_amd64.go:122] [ 764: 764] Allocate a new trap: 0xc001681da0 5 D0713 08:45:19.302458 345762 usertrap_amd64.go:225] [ 764: 764] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:19.302498 345762 usertrap_amd64.go:212] [ 764: 764] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.302505 345762 usertrap_amd64.go:122] [ 764: 764] Allocate a new trap: 0xc001681da0 6 D0713 08:45:19.302510 345762 usertrap_amd64.go:225] [ 764: 764] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:19.302684 345762 usertrap_amd64.go:212] [ 764: 764] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.302701 345762 usertrap_amd64.go:122] [ 764: 764] Allocate a new trap: 0xc001681da0 7 D0713 08:45:19.302708 345762 usertrap_amd64.go:225] [ 764: 764] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:19.302825 345762 usertrap_amd64.go:212] [ 764: 765] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.302849 345762 usertrap_amd64.go:122] [ 764: 765] Allocate a new trap: 0xc001681da0 8 D0713 08:45:19.302858 345762 usertrap_amd64.go:225] [ 764: 765] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:19.303031 345762 usertrap_amd64.go:212] [ 764: 765] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.303084 345762 usertrap_amd64.go:122] [ 764: 765] Allocate a new trap: 0xc001681da0 9 D0713 08:45:19.303101 345762 usertrap_amd64.go:225] [ 764: 765] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:19.303207 345762 usertrap_amd64.go:212] [ 764: 764] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.303258 345762 usertrap_amd64.go:122] [ 764: 764] Allocate a new trap: 0xc001681da0 10 D0713 08:45:19.303276 345762 usertrap_amd64.go:225] [ 764: 764] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:19.310949 345762 usertrap_amd64.go:212] [ 764: 764] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.310982 345762 usertrap_amd64.go:122] [ 764: 764] Allocate a new trap: 0xc001681da0 11 D0713 08:45:19.311001 345762 usertrap_amd64.go:225] [ 764: 764] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:19.313707 345762 usertrap_amd64.go:212] [ 764: 765] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.313736 345762 usertrap_amd64.go:122] [ 764: 765] Allocate a new trap: 0xc001681da0 12 D0713 08:45:19.313748 345762 usertrap_amd64.go:225] [ 764: 765] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:19.313880 345762 usertrap_amd64.go:212] [ 764: 765] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.313899 345762 usertrap_amd64.go:122] [ 764: 765] Allocate a new trap: 0xc001681da0 13 D0713 08:45:19.313907 345762 usertrap_amd64.go:225] [ 764: 765] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:19.313941 345762 task_signals.go:470] [ 764: 764] Notified of signal 23 D0713 08:45:19.314049 345762 task_signals.go:220] [ 764: 764] Signal 23: delivering to handler D0713 08:45:19.322702 345762 usertrap_amd64.go:212] [ 764: 764] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.322735 345762 usertrap_amd64.go:122] [ 764: 764] Allocate a new trap: 0xc001681da0 14 D0713 08:45:19.322754 345762 usertrap_amd64.go:225] [ 764: 764] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:19.322826 345762 task_exit.go:204] [ 764: 764] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.322861 345762 task_exit.go:204] [ 764: 764] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.322863 345762 task_signals.go:204] [ 764: 765] Signal 764, PID: 765, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.322896 345762 task_exit.go:204] [ 764: 765] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.322896 345762 task_signals.go:204] [ 764: 768] Signal 764, PID: 768, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.322914 345762 task_exit.go:204] [ 764: 765] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.322927 345762 task_exit.go:204] [ 764: 765] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.322945 345762 task_signals.go:204] [ 764: 767] Signal 764, PID: 767, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.322961 345762 task_exit.go:204] [ 764: 767] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.322968 345762 task_signals.go:204] [ 764: 766] Signal 764, PID: 766, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.322978 345762 task_exit.go:204] [ 764: 767] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.322982 345762 task_exit.go:204] [ 764: 767] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.322994 345762 task_exit.go:204] [ 764: 766] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.323003 345762 task_exit.go:204] [ 764: 766] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.323007 345762 task_exit.go:204] [ 764: 766] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.323020 345762 task_exit.go:204] [ 764: 768] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.324506 345762 task_exit.go:204] [ 764: 768] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.324516 345762 task_exit.go:204] [ 764: 768] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.324528 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.324599 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.324633 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.324774 345762 task_exit.go:204] [ 764: 764] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.325505 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.326902 345762 syscalls.go:262] [ 769: 769] Allocating stack with size of 8388608 bytes D0713 08:45:19.327000 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.329176 345762 usertrap_amd64.go:212] [ 769: 769] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.329260 345762 usertrap_amd64.go:106] [ 769: 769] Map a usertrap vma at 64000 D0713 08:45:19.329369 345762 usertrap_amd64.go:122] [ 769: 769] Allocate a new trap: 0xc001f480f0 1 D0713 08:45:19.329405 345762 usertrap_amd64.go:225] [ 769: 769] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:19.330053 345762 usertrap_amd64.go:212] [ 769: 769] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.330082 345762 usertrap_amd64.go:122] [ 769: 769] Allocate a new trap: 0xc001f480f0 2 D0713 08:45:19.330093 345762 usertrap_amd64.go:225] [ 769: 769] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:19.330833 345762 usertrap_amd64.go:212] [ 769: 769] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.330850 345762 usertrap_amd64.go:122] [ 769: 769] Allocate a new trap: 0xc001f480f0 3 D0713 08:45:19.330862 345762 usertrap_amd64.go:225] [ 769: 769] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:19.337837 345762 usertrap_amd64.go:212] [ 769: 769] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.337884 345762 usertrap_amd64.go:122] [ 769: 769] Allocate a new trap: 0xc001f480f0 4 D0713 08:45:19.337903 345762 usertrap_amd64.go:225] [ 769: 769] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:19.339525 345762 usertrap_amd64.go:212] [ 769: 769] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.339549 345762 usertrap_amd64.go:122] [ 769: 769] Allocate a new trap: 0xc001f480f0 5 D0713 08:45:19.339559 345762 usertrap_amd64.go:225] [ 769: 769] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:19.339635 345762 usertrap_amd64.go:212] [ 769: 769] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.339640 345762 usertrap_amd64.go:122] [ 769: 769] Allocate a new trap: 0xc001f480f0 6 D0713 08:45:19.339645 345762 usertrap_amd64.go:225] [ 769: 769] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:19.340096 345762 usertrap_amd64.go:212] [ 769: 769] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.340115 345762 usertrap_amd64.go:122] [ 769: 769] Allocate a new trap: 0xc001f480f0 7 D0713 08:45:19.340122 345762 usertrap_amd64.go:225] [ 769: 769] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:19.340255 345762 usertrap_amd64.go:212] [ 769: 770] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.340285 345762 usertrap_amd64.go:122] [ 769: 770] Allocate a new trap: 0xc001f480f0 8 D0713 08:45:19.340296 345762 usertrap_amd64.go:225] [ 769: 770] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:19.340371 345762 usertrap_amd64.go:212] [ 769: 770] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.340384 345762 usertrap_amd64.go:122] [ 769: 770] Allocate a new trap: 0xc001f480f0 9 D0713 08:45:19.340389 345762 usertrap_amd64.go:225] [ 769: 770] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:19.340520 345762 usertrap_amd64.go:212] [ 769: 769] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.340538 345762 usertrap_amd64.go:122] [ 769: 769] Allocate a new trap: 0xc001f480f0 10 D0713 08:45:19.340544 345762 usertrap_amd64.go:225] [ 769: 769] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:19.340783 345762 usertrap_amd64.go:212] [ 769: 772] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:19.340800 345762 usertrap_amd64.go:122] [ 769: 772] Allocate a new trap: 0xc001f480f0 11 D0713 08:45:19.340807 345762 usertrap_amd64.go:225] [ 769: 772] Apply the binary patch addr 46b6e0 trap addr 64370 ([184 24 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:19.341228 345762 usertrap_amd64.go:212] [ 769: 770] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.341253 345762 usertrap_amd64.go:122] [ 769: 770] Allocate a new trap: 0xc001f480f0 12 D0713 08:45:19.341261 345762 usertrap_amd64.go:225] [ 769: 770] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:19.341322 345762 usertrap_amd64.go:212] [ 769: 770] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.341339 345762 usertrap_amd64.go:122] [ 769: 770] Allocate a new trap: 0xc001f480f0 13 D0713 08:45:19.341350 345762 usertrap_amd64.go:225] [ 769: 770] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:19.341378 345762 task_signals.go:470] [ 769: 769] Notified of signal 23 D0713 08:45:19.341449 345762 task_signals.go:220] [ 769: 769] Signal 23: delivering to handler D0713 08:45:19.347929 345762 usertrap_amd64.go:212] [ 769: 769] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.347957 345762 usertrap_amd64.go:122] [ 769: 769] Allocate a new trap: 0xc001f480f0 14 D0713 08:45:19.347967 345762 usertrap_amd64.go:225] [ 769: 769] Apply the binary patch addr 46af29 trap addr 64460 ([184 37 1 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:19.352644 345762 task_signals.go:470] [ 769: 769] Notified of signal 23 D0713 08:45:19.352701 345762 task_signals.go:220] [ 769: 769] Signal 23: delivering to handler D0713 08:45:19.359541 345762 usertrap_amd64.go:212] [ 769: 769] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.359570 345762 usertrap_amd64.go:122] [ 769: 769] Allocate a new trap: 0xc001f480f0 15 D0713 08:45:19.359581 345762 usertrap_amd64.go:225] [ 769: 769] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0713 08:45:19.359654 345762 task_exit.go:204] [ 769: 769] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.359679 345762 task_exit.go:204] [ 769: 769] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.359703 345762 task_signals.go:204] [ 769: 773] Signal 769, PID: 773, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.359703 345762 task_signals.go:204] [ 769: 771] Signal 769, PID: 771, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.359714 345762 task_exit.go:204] [ 769: 773] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.359727 345762 task_exit.go:204] [ 769: 773] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.359743 345762 task_exit.go:204] [ 769: 773] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.359762 345762 task_signals.go:204] [ 769: 770] Signal 769, PID: 770, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.359793 345762 task_exit.go:204] [ 769: 771] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.359818 345762 task_signals.go:204] [ 769: 772] Signal 769, PID: 772, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.359830 345762 task_exit.go:204] [ 769: 771] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.359840 345762 task_exit.go:204] [ 769: 771] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.359852 345762 task_exit.go:204] [ 769: 770] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.359864 345762 task_exit.go:204] [ 769: 770] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.359867 345762 task_exit.go:204] [ 769: 770] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.359876 345762 task_exit.go:204] [ 769: 772] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.361269 345762 task_exit.go:204] [ 769: 772] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.361293 345762 task_exit.go:204] [ 769: 772] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.361305 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.361346 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.361360 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.361497 345762 task_exit.go:204] [ 769: 769] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.362152 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.363473 345762 syscalls.go:262] [ 774: 774] Allocating stack with size of 8388608 bytes D0713 08:45:19.363572 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.364494 345762 usertrap_amd64.go:212] [ 774: 774] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.364530 345762 usertrap_amd64.go:106] [ 774: 774] Map a usertrap vma at 68000 D0713 08:45:19.364599 345762 usertrap_amd64.go:122] [ 774: 774] Allocate a new trap: 0xc000c93620 1 D0713 08:45:19.364613 345762 usertrap_amd64.go:225] [ 774: 774] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:45:19.364861 345762 usertrap_amd64.go:212] [ 774: 774] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.364874 345762 usertrap_amd64.go:122] [ 774: 774] Allocate a new trap: 0xc000c93620 2 D0713 08:45:19.364880 345762 usertrap_amd64.go:225] [ 774: 774] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:45:19.365482 345762 usertrap_amd64.go:212] [ 774: 774] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.365496 345762 usertrap_amd64.go:122] [ 774: 774] Allocate a new trap: 0xc000c93620 3 D0713 08:45:19.365505 345762 usertrap_amd64.go:225] [ 774: 774] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:45:19.372223 345762 usertrap_amd64.go:212] [ 774: 774] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.372259 345762 usertrap_amd64.go:122] [ 774: 774] Allocate a new trap: 0xc000c93620 4 D0713 08:45:19.372270 345762 usertrap_amd64.go:225] [ 774: 774] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:45:19.374001 345762 usertrap_amd64.go:212] [ 774: 774] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.374040 345762 usertrap_amd64.go:122] [ 774: 774] Allocate a new trap: 0xc000c93620 5 D0713 08:45:19.374050 345762 usertrap_amd64.go:225] [ 774: 774] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:45:19.374120 345762 usertrap_amd64.go:212] [ 774: 774] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.374134 345762 usertrap_amd64.go:122] [ 774: 774] Allocate a new trap: 0xc000c93620 6 D0713 08:45:19.374139 345762 usertrap_amd64.go:225] [ 774: 774] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:45:19.374354 345762 usertrap_amd64.go:212] [ 774: 774] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.374377 345762 usertrap_amd64.go:122] [ 774: 774] Allocate a new trap: 0xc000c93620 7 D0713 08:45:19.374383 345762 usertrap_amd64.go:225] [ 774: 774] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:45:19.374512 345762 usertrap_amd64.go:212] [ 774: 775] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.374545 345762 usertrap_amd64.go:122] [ 774: 775] Allocate a new trap: 0xc000c93620 8 D0713 08:45:19.374557 345762 usertrap_amd64.go:225] [ 774: 775] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:45:19.374855 345762 usertrap_amd64.go:212] [ 774: 775] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.374878 345762 usertrap_amd64.go:122] [ 774: 775] Allocate a new trap: 0xc000c93620 9 D0713 08:45:19.374888 345762 usertrap_amd64.go:225] [ 774: 775] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:45:19.374900 345762 usertrap_amd64.go:212] [ 774: 774] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.374909 345762 usertrap_amd64.go:122] [ 774: 774] Allocate a new trap: 0xc000c93620 10 D0713 08:45:19.374926 345762 usertrap_amd64.go:225] [ 774: 774] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:45:19.375095 345762 usertrap_amd64.go:212] [ 774: 777] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:19.375122 345762 usertrap_amd64.go:122] [ 774: 777] Allocate a new trap: 0xc000c93620 11 D0713 08:45:19.375131 345762 usertrap_amd64.go:225] [ 774: 777] Apply the binary patch addr 46b6e0 trap addr 68370 ([184 24 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:45:19.375509 345762 usertrap_amd64.go:212] [ 774: 775] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.375527 345762 usertrap_amd64.go:122] [ 774: 775] Allocate a new trap: 0xc000c93620 12 D0713 08:45:19.375533 345762 usertrap_amd64.go:225] [ 774: 775] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:45:19.375543 345762 usertrap_amd64.go:212] [ 774: 775] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.375547 345762 usertrap_amd64.go:122] [ 774: 775] Allocate a new trap: 0xc000c93620 13 D0713 08:45:19.375556 345762 usertrap_amd64.go:225] [ 774: 775] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:45:19.375570 345762 task_signals.go:470] [ 774: 774] Notified of signal 23 D0713 08:45:19.375614 345762 task_signals.go:220] [ 774: 774] Signal 23: delivering to handler D0713 08:45:19.382042 345762 usertrap_amd64.go:212] [ 774: 774] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.382117 345762 usertrap_amd64.go:122] [ 774: 774] Allocate a new trap: 0xc000c93620 14 D0713 08:45:19.382135 345762 usertrap_amd64.go:225] [ 774: 774] Apply the binary patch addr 46af29 trap addr 68460 ([184 37 1 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:45:19.385839 345762 task_signals.go:470] [ 774: 774] Notified of signal 23 D0713 08:45:19.385892 345762 task_signals.go:220] [ 774: 774] Signal 23: delivering to handler D0713 08:45:19.393838 345762 usertrap_amd64.go:212] [ 774: 774] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.393880 345762 usertrap_amd64.go:122] [ 774: 774] Allocate a new trap: 0xc000c93620 15 D0713 08:45:19.393900 345762 usertrap_amd64.go:225] [ 774: 774] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0713 08:45:19.393981 345762 task_exit.go:204] [ 774: 774] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.394002 345762 task_exit.go:204] [ 774: 774] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.394036 345762 task_signals.go:204] [ 774: 777] Signal 774, PID: 777, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.394068 345762 task_exit.go:204] [ 774: 777] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.394076 345762 task_exit.go:204] [ 774: 777] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.394042 345762 task_signals.go:204] [ 774: 776] Signal 774, PID: 776, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.394082 345762 task_exit.go:204] [ 774: 777] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.394066 345762 task_signals.go:204] [ 774: 775] Signal 774, PID: 775, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.394154 345762 task_exit.go:204] [ 774: 775] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.394201 345762 task_signals.go:204] [ 774: 778] Signal 774, PID: 778, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.394222 345762 task_exit.go:204] [ 774: 775] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.394236 345762 task_exit.go:204] [ 774: 775] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.394253 345762 task_exit.go:204] [ 774: 776] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.394263 345762 task_exit.go:204] [ 774: 776] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.394270 345762 task_exit.go:204] [ 774: 776] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.394283 345762 task_exit.go:204] [ 774: 778] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.395541 345762 task_exit.go:204] [ 774: 778] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.395568 345762 task_exit.go:204] [ 774: 778] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.395584 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.395608 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.395618 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.395680 345762 task_exit.go:204] [ 774: 774] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.396420 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.397653 345762 syscalls.go:262] [ 779: 779] Allocating stack with size of 8388608 bytes D0713 08:45:19.397774 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.399009 345762 usertrap_amd64.go:212] [ 779: 779] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.399044 345762 usertrap_amd64.go:106] [ 779: 779] Map a usertrap vma at 66000 D0713 08:45:19.399115 345762 usertrap_amd64.go:122] [ 779: 779] Allocate a new trap: 0xc001f485d0 1 D0713 08:45:19.399132 345762 usertrap_amd64.go:225] [ 779: 779] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:19.399438 345762 usertrap_amd64.go:212] [ 779: 779] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.399447 345762 usertrap_amd64.go:122] [ 779: 779] Allocate a new trap: 0xc001f485d0 2 D0713 08:45:19.399453 345762 usertrap_amd64.go:225] [ 779: 779] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:19.399905 345762 usertrap_amd64.go:212] [ 779: 779] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.399913 345762 usertrap_amd64.go:122] [ 779: 779] Allocate a new trap: 0xc001f485d0 3 D0713 08:45:19.399925 345762 usertrap_amd64.go:225] [ 779: 779] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:19.406126 345762 usertrap_amd64.go:212] [ 779: 779] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.406157 345762 usertrap_amd64.go:122] [ 779: 779] Allocate a new trap: 0xc001f485d0 4 D0713 08:45:19.406167 345762 usertrap_amd64.go:225] [ 779: 779] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:19.407226 345762 usertrap_amd64.go:212] [ 779: 779] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.407246 345762 usertrap_amd64.go:122] [ 779: 779] Allocate a new trap: 0xc001f485d0 5 D0713 08:45:19.407253 345762 usertrap_amd64.go:225] [ 779: 779] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:19.407307 345762 usertrap_amd64.go:212] [ 779: 779] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.407320 345762 usertrap_amd64.go:122] [ 779: 779] Allocate a new trap: 0xc001f485d0 6 D0713 08:45:19.407325 345762 usertrap_amd64.go:225] [ 779: 779] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:19.407641 345762 usertrap_amd64.go:212] [ 779: 779] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.407654 345762 usertrap_amd64.go:122] [ 779: 779] Allocate a new trap: 0xc001f485d0 7 D0713 08:45:19.407659 345762 usertrap_amd64.go:225] [ 779: 779] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:19.407786 345762 usertrap_amd64.go:212] [ 779: 780] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.407806 345762 usertrap_amd64.go:122] [ 779: 780] Allocate a new trap: 0xc001f485d0 8 D0713 08:45:19.407816 345762 usertrap_amd64.go:225] [ 779: 780] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:19.407982 345762 usertrap_amd64.go:212] [ 779: 780] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.408013 345762 usertrap_amd64.go:122] [ 779: 780] Allocate a new trap: 0xc001f485d0 9 D0713 08:45:19.408023 345762 usertrap_amd64.go:225] [ 779: 780] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:19.408078 345762 usertrap_amd64.go:212] [ 779: 779] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.408090 345762 usertrap_amd64.go:122] [ 779: 779] Allocate a new trap: 0xc001f485d0 10 D0713 08:45:19.408095 345762 usertrap_amd64.go:225] [ 779: 779] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:19.408279 345762 usertrap_amd64.go:212] [ 779: 779] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:19.408302 345762 usertrap_amd64.go:122] [ 779: 779] Allocate a new trap: 0xc001f485d0 11 D0713 08:45:19.408313 345762 usertrap_amd64.go:225] [ 779: 779] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:19.408696 345762 usertrap_amd64.go:212] [ 779: 780] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.408719 345762 usertrap_amd64.go:122] [ 779: 780] Allocate a new trap: 0xc001f485d0 12 D0713 08:45:19.408727 345762 usertrap_amd64.go:225] [ 779: 780] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:19.408770 345762 usertrap_amd64.go:212] [ 779: 780] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.408794 345762 usertrap_amd64.go:122] [ 779: 780] Allocate a new trap: 0xc001f485d0 13 D0713 08:45:19.408804 345762 usertrap_amd64.go:225] [ 779: 780] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:19.408858 345762 task_signals.go:470] [ 779: 779] Notified of signal 23 D0713 08:45:19.408899 345762 task_signals.go:220] [ 779: 779] Signal 23: delivering to handler D0713 08:45:19.416897 345762 usertrap_amd64.go:212] [ 779: 779] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.416927 345762 usertrap_amd64.go:122] [ 779: 779] Allocate a new trap: 0xc001f485d0 14 D0713 08:45:19.416960 345762 usertrap_amd64.go:225] [ 779: 779] Apply the binary patch addr 46af29 trap addr 66460 ([184 37 1 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:19.419475 345762 task_signals.go:470] [ 779: 779] Notified of signal 23 D0713 08:45:19.419544 345762 task_signals.go:220] [ 779: 779] Signal 23: delivering to handler D0713 08:45:19.428346 345762 usertrap_amd64.go:212] [ 779: 779] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.428374 345762 usertrap_amd64.go:122] [ 779: 779] Allocate a new trap: 0xc001f485d0 15 D0713 08:45:19.428384 345762 usertrap_amd64.go:225] [ 779: 779] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 08:45:19.428464 345762 task_exit.go:204] [ 779: 779] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.428494 345762 task_exit.go:204] [ 779: 779] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.428506 345762 task_signals.go:204] [ 779: 781] Signal 779, PID: 781, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.428528 345762 task_signals.go:204] [ 779: 783] Signal 779, PID: 783, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.428532 345762 task_exit.go:204] [ 779: 781] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.428547 345762 task_exit.go:204] [ 779: 781] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.428553 345762 task_exit.go:204] [ 779: 781] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.428550 345762 task_signals.go:204] [ 779: 780] Signal 779, PID: 780, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.428517 345762 task_signals.go:204] [ 779: 782] Signal 779, PID: 782, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.428571 345762 task_exit.go:204] [ 779: 783] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.428595 345762 task_exit.go:204] [ 779: 783] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.428608 345762 task_exit.go:204] [ 779: 783] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.428624 345762 task_exit.go:204] [ 779: 780] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.428641 345762 task_exit.go:204] [ 779: 780] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.428647 345762 task_exit.go:204] [ 779: 780] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.428660 345762 task_exit.go:204] [ 779: 782] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.430244 345762 task_exit.go:204] [ 779: 782] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.430281 345762 task_exit.go:204] [ 779: 782] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.430301 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.430331 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.430351 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.430460 345762 task_exit.go:204] [ 779: 779] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.431232 345762 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.433121 345762 syscalls.go:262] [ 784: 784] Allocating stack with size of 8388608 bytes D0713 08:45:19.433314 345762 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.434952 345762 usertrap_amd64.go:212] [ 784: 784] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.434994 345762 usertrap_amd64.go:106] [ 784: 784] Map a usertrap vma at 66000 D0713 08:45:19.435141 345762 usertrap_amd64.go:122] [ 784: 784] Allocate a new trap: 0xc001e5e210 1 D0713 08:45:19.435180 345762 usertrap_amd64.go:225] [ 784: 784] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:19.435749 345762 usertrap_amd64.go:212] [ 784: 784] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.435774 345762 usertrap_amd64.go:122] [ 784: 784] Allocate a new trap: 0xc001e5e210 2 D0713 08:45:19.435783 345762 usertrap_amd64.go:225] [ 784: 784] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:19.436613 345762 usertrap_amd64.go:212] [ 784: 784] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.436632 345762 usertrap_amd64.go:122] [ 784: 784] Allocate a new trap: 0xc001e5e210 3 D0713 08:45:19.436639 345762 usertrap_amd64.go:225] [ 784: 784] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:19.443278 345762 usertrap_amd64.go:212] [ 784: 784] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.443340 345762 usertrap_amd64.go:122] [ 784: 784] Allocate a new trap: 0xc001e5e210 4 D0713 08:45:19.443357 345762 usertrap_amd64.go:225] [ 784: 784] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:19.444919 345762 usertrap_amd64.go:212] [ 784: 784] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.445003 345762 usertrap_amd64.go:122] [ 784: 784] Allocate a new trap: 0xc001e5e210 5 D0713 08:45:19.445021 345762 usertrap_amd64.go:225] [ 784: 784] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:19.445121 345762 usertrap_amd64.go:212] [ 784: 784] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.445158 345762 usertrap_amd64.go:122] [ 784: 784] Allocate a new trap: 0xc001e5e210 6 D0713 08:45:19.445178 345762 usertrap_amd64.go:225] [ 784: 784] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:19.445477 345762 usertrap_amd64.go:212] [ 784: 784] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.445499 345762 usertrap_amd64.go:122] [ 784: 784] Allocate a new trap: 0xc001e5e210 7 D0713 08:45:19.445507 345762 usertrap_amd64.go:225] [ 784: 784] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:19.445737 345762 usertrap_amd64.go:212] [ 784: 785] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.445799 345762 usertrap_amd64.go:122] [ 784: 785] Allocate a new trap: 0xc001e5e210 8 D0713 08:45:19.445818 345762 usertrap_amd64.go:225] [ 784: 785] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:19.446189 345762 usertrap_amd64.go:212] [ 784: 785] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.446213 345762 usertrap_amd64.go:122] [ 784: 785] Allocate a new trap: 0xc001e5e210 9 D0713 08:45:19.446228 345762 usertrap_amd64.go:225] [ 784: 785] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:19.446247 345762 usertrap_amd64.go:212] [ 784: 784] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.446252 345762 usertrap_amd64.go:122] [ 784: 784] Allocate a new trap: 0xc001e5e210 10 D0713 08:45:19.446263 345762 usertrap_amd64.go:225] [ 784: 784] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:19.454870 345762 usertrap_amd64.go:212] [ 784: 784] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.454939 345762 usertrap_amd64.go:122] [ 784: 784] Allocate a new trap: 0xc001e5e210 11 D0713 08:45:19.454961 345762 usertrap_amd64.go:225] [ 784: 784] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:19.458840 345762 usertrap_amd64.go:212] [ 784: 785] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.458920 345762 usertrap_amd64.go:122] [ 784: 785] Allocate a new trap: 0xc001e5e210 12 D0713 08:45:19.458950 345762 usertrap_amd64.go:225] [ 784: 785] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:19.459044 345762 usertrap_amd64.go:212] [ 784: 785] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.459055 345762 usertrap_amd64.go:122] [ 784: 785] Allocate a new trap: 0xc001e5e210 13 D0713 08:45:19.459067 345762 usertrap_amd64.go:225] [ 784: 785] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:19.459093 345762 task_signals.go:470] [ 784: 784] Notified of signal 23 D0713 08:45:19.459229 345762 task_signals.go:220] [ 784: 784] Signal 23: delivering to handler D0713 08:45:19.468403 345762 usertrap_amd64.go:212] [ 784: 784] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.468451 345762 usertrap_amd64.go:122] [ 784: 784] Allocate a new trap: 0xc001e5e210 14 D0713 08:45:19.468464 345762 usertrap_amd64.go:225] [ 784: 784] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:19.468584 345762 task_exit.go:204] [ 784: 784] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.468623 345762 task_exit.go:204] [ 784: 784] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.468660 345762 task_signals.go:204] [ 784: 787] Signal 784, PID: 787, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.468666 345762 task_signals.go:204] [ 784: 786] Signal 784, PID: 786, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.468686 345762 task_exit.go:204] [ 784: 787] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.468694 345762 task_exit.go:204] [ 784: 787] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.468698 345762 task_exit.go:204] [ 784: 787] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.468715 345762 task_exit.go:204] [ 784: 786] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.468723 345762 task_exit.go:204] [ 784: 786] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.468717 345762 task_signals.go:204] [ 784: 788] Signal 784, PID: 788, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.468728 345762 task_exit.go:204] [ 784: 786] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.468768 345762 task_signals.go:204] [ 784: 785] Signal 784, PID: 785, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.468783 345762 task_exit.go:204] [ 784: 785] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.468799 345762 task_exit.go:204] [ 784: 785] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.468814 345762 task_exit.go:204] [ 784: 785] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.468827 345762 task_exit.go:204] [ 784: 788] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.470725 345762 task_exit.go:204] [ 784: 788] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.470821 345762 task_exit.go:204] [ 784: 788] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.470851 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.470893 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.470934 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.470983 345762 task_exit.go:204] [ 784: 784] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.471110 345762 task_signals.go:470] [ 5: 9] Notified of signal 23 D0713 08:45:19.471181 345762 task_signals.go:220] [ 5: 9] Signal 23: delivering to handler D0713 08:45:19.471994 345762 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.476783 345762 syscalls.go:262] [ 789: 789] Allocating stack with size of 8388608 bytes D0713 08:45:19.476915 345762 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.478367 345762 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.478411 345762 usertrap_amd64.go:106] [ 789: 789] Map a usertrap vma at 60000 D0713 08:45:19.478530 345762 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc001dec030 1 D0713 08:45:19.478586 345762 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:19.479148 345762 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.479181 345762 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc001dec030 2 D0713 08:45:19.479199 345762 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:19.480008 345762 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.480051 345762 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc001dec030 3 D0713 08:45:19.480067 345762 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:19.486100 345762 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.486127 345762 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc001dec030 4 D0713 08:45:19.486139 345762 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:19.487301 345762 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.487322 345762 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc001dec030 5 D0713 08:45:19.487331 345762 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:19.487384 345762 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.487397 345762 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc001dec030 6 D0713 08:45:19.487402 345762 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:19.487555 345762 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.487566 345762 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc001dec030 7 D0713 08:45:19.487572 345762 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:19.487677 345762 usertrap_amd64.go:212] [ 789: 790] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.487689 345762 usertrap_amd64.go:122] [ 789: 790] Allocate a new trap: 0xc001dec030 8 D0713 08:45:19.487695 345762 usertrap_amd64.go:225] [ 789: 790] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:19.487834 345762 usertrap_amd64.go:212] [ 789: 790] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.487862 345762 usertrap_amd64.go:122] [ 789: 790] Allocate a new trap: 0xc001dec030 9 D0713 08:45:19.487878 345762 usertrap_amd64.go:225] [ 789: 790] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:19.487944 345762 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.487956 345762 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc001dec030 10 D0713 08:45:19.487963 345762 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:19.495156 345762 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.495177 345762 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc001dec030 11 D0713 08:45:19.495187 345762 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:19.498782 345762 usertrap_amd64.go:212] [ 789: 790] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.498806 345762 usertrap_amd64.go:122] [ 789: 790] Allocate a new trap: 0xc001dec030 12 D0713 08:45:19.498816 345762 usertrap_amd64.go:225] [ 789: 790] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:19.498844 345762 usertrap_amd64.go:212] [ 789: 790] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.498853 345762 usertrap_amd64.go:122] [ 789: 790] Allocate a new trap: 0xc001dec030 13 D0713 08:45:19.498862 345762 usertrap_amd64.go:225] [ 789: 790] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:19.498912 345762 task_signals.go:470] [ 789: 789] Notified of signal 23 D0713 08:45:19.499052 345762 task_signals.go:220] [ 789: 789] Signal 23: delivering to handler D0713 08:45:19.506337 345762 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.506366 345762 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc001dec030 14 D0713 08:45:19.506376 345762 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:19.506459 345762 task_exit.go:204] [ 789: 789] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.506496 345762 task_signals.go:204] [ 789: 793] Signal 789, PID: 793, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.506510 345762 task_exit.go:204] [ 789: 789] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.506527 345762 task_signals.go:204] [ 789: 790] Signal 789, PID: 790, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.506546 345762 task_signals.go:204] [ 789: 792] Signal 789, PID: 792, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.506547 345762 task_exit.go:204] [ 789: 790] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.506561 345762 task_exit.go:204] [ 789: 793] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.506591 345762 task_signals.go:204] [ 789: 791] Signal 789, PID: 791, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.506614 345762 task_exit.go:204] [ 789: 793] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.506619 345762 task_exit.go:204] [ 789: 793] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.506631 345762 task_exit.go:204] [ 789: 790] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.506635 345762 task_exit.go:204] [ 789: 790] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.506642 345762 task_exit.go:204] [ 789: 792] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.506648 345762 task_exit.go:204] [ 789: 792] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.506668 345762 task_exit.go:204] [ 789: 792] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.506675 345762 task_exit.go:204] [ 789: 791] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.508210 345762 task_exit.go:204] [ 789: 791] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.508231 345762 task_exit.go:204] [ 789: 791] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.508242 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.508290 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.508346 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.508456 345762 task_exit.go:204] [ 789: 789] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.509845 345762 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.511568 345762 syscalls.go:262] [ 794: 794] Allocating stack with size of 8388608 bytes D0713 08:45:19.511700 345762 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.512829 345762 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.512887 345762 usertrap_amd64.go:106] [ 794: 794] Map a usertrap vma at 69000 D0713 08:45:19.513041 345762 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc001dec0c0 1 D0713 08:45:19.513066 345762 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:19.513516 345762 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.513537 345762 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc001dec0c0 2 D0713 08:45:19.513544 345762 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:19.514265 345762 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.514284 345762 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc001dec0c0 3 D0713 08:45:19.514291 345762 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:19.520507 345762 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.520539 345762 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc001dec0c0 4 D0713 08:45:19.520551 345762 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:19.521717 345762 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.521746 345762 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc001dec0c0 5 D0713 08:45:19.521755 345762 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:19.521814 345762 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.521820 345762 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc001dec0c0 6 D0713 08:45:19.521826 345762 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:19.522135 345762 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.522149 345762 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc001dec0c0 7 D0713 08:45:19.522154 345762 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:19.522284 345762 usertrap_amd64.go:212] [ 794: 795] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.522308 345762 usertrap_amd64.go:122] [ 794: 795] Allocate a new trap: 0xc001dec0c0 8 D0713 08:45:19.522315 345762 usertrap_amd64.go:225] [ 794: 795] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:19.522487 345762 usertrap_amd64.go:212] [ 794: 795] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.522509 345762 usertrap_amd64.go:122] [ 794: 795] Allocate a new trap: 0xc001dec0c0 9 D0713 08:45:19.522521 345762 usertrap_amd64.go:225] [ 794: 795] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:19.522622 345762 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.522660 345762 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc001dec0c0 10 D0713 08:45:19.522673 345762 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:19.529582 345762 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.529609 345762 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc001dec0c0 11 D0713 08:45:19.529622 345762 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:19.533435 345762 usertrap_amd64.go:212] [ 794: 795] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.533501 345762 usertrap_amd64.go:122] [ 794: 795] Allocate a new trap: 0xc001dec0c0 12 D0713 08:45:19.533522 345762 usertrap_amd64.go:225] [ 794: 795] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:19.533580 345762 usertrap_amd64.go:212] [ 794: 795] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.533613 345762 usertrap_amd64.go:122] [ 794: 795] Allocate a new trap: 0xc001dec0c0 13 D0713 08:45:19.533627 345762 usertrap_amd64.go:225] [ 794: 795] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:19.533650 345762 task_signals.go:470] [ 794: 794] Notified of signal 23 D0713 08:45:19.533706 345762 task_signals.go:220] [ 794: 794] Signal 23: delivering to handler D0713 08:45:19.540579 345762 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.540604 345762 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc001dec0c0 14 D0713 08:45:19.540612 345762 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:19.540669 345762 task_exit.go:204] [ 794: 794] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.540694 345762 task_exit.go:204] [ 794: 794] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.540712 345762 task_signals.go:204] [ 794: 796] Signal 794, PID: 796, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.540715 345762 task_signals.go:204] [ 794: 798] Signal 794, PID: 798, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.540728 345762 task_exit.go:204] [ 794: 796] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.540741 345762 task_signals.go:204] [ 794: 795] Signal 794, PID: 795, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.540752 345762 task_exit.go:204] [ 794: 796] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.540769 345762 task_exit.go:204] [ 794: 796] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.540784 345762 task_signals.go:204] [ 794: 797] Signal 794, PID: 797, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.540798 345762 task_exit.go:204] [ 794: 797] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.540804 345762 task_exit.go:204] [ 794: 797] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.540808 345762 task_exit.go:204] [ 794: 797] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.540816 345762 task_exit.go:204] [ 794: 798] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.540826 345762 task_exit.go:204] [ 794: 798] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.540831 345762 task_exit.go:204] [ 794: 798] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.540841 345762 task_exit.go:204] [ 794: 795] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.542138 345762 task_exit.go:204] [ 794: 795] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.542158 345762 task_exit.go:204] [ 794: 795] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.542187 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.542212 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.542221 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.542354 345762 task_exit.go:204] [ 794: 794] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.543059 345762 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.544521 345762 syscalls.go:262] [ 799: 799] Allocating stack with size of 8388608 bytes D0713 08:45:19.544659 345762 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.545644 345762 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.545691 345762 usertrap_amd64.go:106] [ 799: 799] Map a usertrap vma at 66000 D0713 08:45:19.545770 345762 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc000c56300 1 D0713 08:45:19.545786 345762 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:19.546061 345762 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.546090 345762 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc000c56300 2 D0713 08:45:19.546103 345762 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:19.546978 345762 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.547002 345762 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc000c56300 3 D0713 08:45:19.547010 345762 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:19.553892 345762 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.553933 345762 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc000c56300 4 D0713 08:45:19.553948 345762 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:19.555354 345762 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.555394 345762 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc000c56300 5 D0713 08:45:19.555415 345762 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:19.555569 345762 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.555603 345762 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc000c56300 6 D0713 08:45:19.555616 345762 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:19.556013 345762 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.556034 345762 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc000c56300 7 D0713 08:45:19.556042 345762 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:19.556175 345762 usertrap_amd64.go:212] [ 799: 800] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.556203 345762 usertrap_amd64.go:122] [ 799: 800] Allocate a new trap: 0xc000c56300 8 D0713 08:45:19.556216 345762 usertrap_amd64.go:225] [ 799: 800] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:19.556358 345762 usertrap_amd64.go:212] [ 799: 800] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.556380 345762 usertrap_amd64.go:122] [ 799: 800] Allocate a new trap: 0xc000c56300 9 D0713 08:45:19.556388 345762 usertrap_amd64.go:225] [ 799: 800] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:19.556423 345762 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.556434 345762 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc000c56300 10 D0713 08:45:19.556443 345762 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:19.563825 345762 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.563859 345762 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc000c56300 11 D0713 08:45:19.563872 345762 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:19.567589 345762 usertrap_amd64.go:212] [ 799: 800] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.567615 345762 usertrap_amd64.go:122] [ 799: 800] Allocate a new trap: 0xc000c56300 12 D0713 08:45:19.567624 345762 usertrap_amd64.go:225] [ 799: 800] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:19.567645 345762 usertrap_amd64.go:212] [ 799: 800] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.567661 345762 usertrap_amd64.go:122] [ 799: 800] Allocate a new trap: 0xc000c56300 13 D0713 08:45:19.567671 345762 usertrap_amd64.go:225] [ 799: 800] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:19.567706 345762 task_signals.go:470] [ 799: 799] Notified of signal 23 D0713 08:45:19.567771 345762 task_signals.go:220] [ 799: 799] Signal 23: delivering to handler D0713 08:45:19.573459 345762 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.573499 345762 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc000c56300 14 D0713 08:45:19.573512 345762 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:19.573577 345762 task_exit.go:204] [ 799: 799] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.573628 345762 task_exit.go:204] [ 799: 799] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.573651 345762 task_signals.go:204] [ 799: 802] Signal 799, PID: 802, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.573673 345762 task_exit.go:204] [ 799: 802] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.573658 345762 task_signals.go:204] [ 799: 801] Signal 799, PID: 801, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.573688 345762 task_signals.go:204] [ 799: 803] Signal 799, PID: 803, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.573688 345762 task_signals.go:204] [ 799: 800] Signal 799, PID: 800, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.573704 345762 task_exit.go:204] [ 799: 802] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.573711 345762 task_exit.go:204] [ 799: 802] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.573726 345762 task_exit.go:204] [ 799: 801] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.573739 345762 task_exit.go:204] [ 799: 801] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.573746 345762 task_exit.go:204] [ 799: 801] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.573757 345762 task_exit.go:204] [ 799: 800] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.573765 345762 task_exit.go:204] [ 799: 800] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.573772 345762 task_exit.go:204] [ 799: 800] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.573781 345762 task_exit.go:204] [ 799: 803] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.575657 345762 task_exit.go:204] [ 799: 803] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.575730 345762 task_exit.go:204] [ 799: 803] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.575769 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.575880 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.576108 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.576489 345762 task_exit.go:204] [ 799: 799] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.577440 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.578943 345762 syscalls.go:262] [ 804: 804] Allocating stack with size of 8388608 bytes D0713 08:45:19.579037 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.580127 345762 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.580162 345762 usertrap_amd64.go:106] [ 804: 804] Map a usertrap vma at 66000 D0713 08:45:19.580269 345762 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc002184630 1 D0713 08:45:19.580300 345762 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:19.580654 345762 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.580671 345762 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc002184630 2 D0713 08:45:19.580678 345762 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:19.581280 345762 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.581305 345762 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc002184630 3 D0713 08:45:19.581316 345762 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:19.586635 345762 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.586661 345762 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc002184630 4 D0713 08:45:19.586670 345762 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:19.587648 345762 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.587666 345762 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc002184630 5 D0713 08:45:19.587673 345762 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:19.587696 345762 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.587714 345762 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc002184630 6 D0713 08:45:19.587736 345762 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:19.588184 345762 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.588216 345762 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc002184630 7 D0713 08:45:19.588223 345762 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:19.588349 345762 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.588364 345762 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc002184630 8 D0713 08:45:19.588372 345762 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:19.588444 345762 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.588458 345762 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc002184630 9 D0713 08:45:19.588465 345762 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:19.588597 345762 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.588612 345762 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc002184630 10 D0713 08:45:19.588619 345762 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:19.596318 345762 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.596353 345762 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc002184630 11 D0713 08:45:19.596365 345762 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:19.599172 345762 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.599197 345762 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc002184630 12 D0713 08:45:19.599207 345762 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:19.599253 345762 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.599268 345762 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc002184630 13 D0713 08:45:19.599274 345762 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:19.599291 345762 task_signals.go:470] [ 804: 804] Notified of signal 23 D0713 08:45:19.599365 345762 task_signals.go:220] [ 804: 804] Signal 23: delivering to handler D0713 08:45:19.606616 345762 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.606640 345762 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc002184630 14 D0713 08:45:19.606651 345762 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:19.606712 345762 task_exit.go:204] [ 804: 804] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.606724 345762 task_exit.go:204] [ 804: 804] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.606741 345762 task_signals.go:204] [ 804: 807] Signal 804, PID: 807, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.606750 345762 task_signals.go:204] [ 804: 806] Signal 804, PID: 806, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.606753 345762 task_exit.go:204] [ 804: 807] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.606798 345762 task_signals.go:204] [ 804: 805] Signal 804, PID: 805, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.606808 345762 task_signals.go:204] [ 804: 808] Signal 804, PID: 808, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.606817 345762 task_exit.go:204] [ 804: 807] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.606827 345762 task_exit.go:204] [ 804: 807] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.606839 345762 task_exit.go:204] [ 804: 806] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.606885 345762 task_exit.go:204] [ 804: 806] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.606894 345762 task_exit.go:204] [ 804: 806] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.606920 345762 task_exit.go:204] [ 804: 805] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.606928 345762 task_exit.go:204] [ 804: 805] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.606933 345762 task_exit.go:204] [ 804: 805] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.606961 345762 task_exit.go:204] [ 804: 808] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.608411 345762 task_exit.go:204] [ 804: 808] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.608442 345762 task_exit.go:204] [ 804: 808] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.608465 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.608501 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.608512 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.608712 345762 task_exit.go:204] [ 804: 804] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.609759 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.611123 345762 syscalls.go:262] [ 809: 809] Allocating stack with size of 8388608 bytes D0713 08:45:19.611252 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.612502 345762 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.612611 345762 usertrap_amd64.go:106] [ 809: 809] Map a usertrap vma at 6a000 D0713 08:45:19.612766 345762 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc0005401e0 1 D0713 08:45:19.612795 345762 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:19.613291 345762 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.613355 345762 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc0005401e0 2 D0713 08:45:19.613377 345762 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:19.614204 345762 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.614229 345762 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc0005401e0 3 D0713 08:45:19.614237 345762 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:19.620351 345762 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.620419 345762 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc0005401e0 4 D0713 08:45:19.620438 345762 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:19.621585 345762 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.621616 345762 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc0005401e0 5 D0713 08:45:19.621627 345762 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:19.621736 345762 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.621745 345762 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc0005401e0 6 D0713 08:45:19.621753 345762 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:19.622124 345762 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.622142 345762 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc0005401e0 7 D0713 08:45:19.622149 345762 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:19.622309 345762 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.622328 345762 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc0005401e0 8 D0713 08:45:19.622365 345762 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:19.622617 345762 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.622632 345762 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc0005401e0 9 D0713 08:45:19.622644 345762 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:19.622658 345762 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.622667 345762 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc0005401e0 10 D0713 08:45:19.622676 345762 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:19.630994 345762 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.631032 345762 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc0005401e0 11 D0713 08:45:19.631046 345762 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:19.633798 345762 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.633823 345762 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc0005401e0 12 D0713 08:45:19.633834 345762 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:19.633896 345762 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.633908 345762 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc0005401e0 13 D0713 08:45:19.633917 345762 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:19.633972 345762 task_signals.go:470] [ 809: 809] Notified of signal 23 D0713 08:45:19.634058 345762 task_signals.go:220] [ 809: 809] Signal 23: delivering to handler I0713 08:45:19.641737 345762 compat.go:120] Unsupported syscall sys_442(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_442 for more information. D0713 08:45:19.641830 345762 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.641838 345762 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc0005401e0 14 D0713 08:45:19.641845 345762 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:19.641875 345762 task_exit.go:204] [ 809: 809] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.641894 345762 task_exit.go:204] [ 809: 809] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.641911 345762 task_signals.go:204] [ 809: 810] Signal 809, PID: 810, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.641920 345762 task_exit.go:204] [ 809: 810] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.641925 345762 task_exit.go:204] [ 809: 810] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.641928 345762 task_exit.go:204] [ 809: 810] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.641948 345762 task_signals.go:204] [ 809: 812] Signal 809, PID: 812, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.641955 345762 task_exit.go:204] [ 809: 812] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.641960 345762 task_exit.go:204] [ 809: 812] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.641964 345762 task_exit.go:204] [ 809: 812] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.641957 345762 task_signals.go:204] [ 809: 813] Signal 809, PID: 813, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.641997 345762 task_exit.go:204] [ 809: 813] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.642024 345762 task_exit.go:204] [ 809: 813] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.642031 345762 task_exit.go:204] [ 809: 813] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.641975 345762 task_signals.go:204] [ 809: 811] Signal 809, PID: 811, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.642058 345762 task_exit.go:204] [ 809: 811] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.643796 345762 task_exit.go:204] [ 809: 811] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.643832 345762 task_exit.go:204] [ 809: 811] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.643856 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.643891 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.643929 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.644070 345762 task_exit.go:204] [ 809: 809] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.644284 345762 task_signals.go:470] [ 5: 16] Notified of signal 23 D0713 08:45:19.644339 345762 task_signals.go:220] [ 5: 16] Signal 23: delivering to handler D0713 08:45:19.644880 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.646318 345762 syscalls.go:262] [ 814: 814] Allocating stack with size of 8388608 bytes D0713 08:45:19.646419 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.648042 345762 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.648080 345762 usertrap_amd64.go:106] [ 814: 814] Map a usertrap vma at 68000 D0713 08:45:19.648170 345762 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000c56960 1 D0713 08:45:19.648199 345762 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:45:19.648742 345762 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.648816 345762 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000c56960 2 D0713 08:45:19.648874 345762 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:45:19.649852 345762 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.649945 345762 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000c56960 3 D0713 08:45:19.649968 345762 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:45:19.656861 345762 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.656917 345762 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000c56960 4 D0713 08:45:19.656932 345762 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:45:19.658125 345762 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.658140 345762 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000c56960 5 D0713 08:45:19.658149 345762 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:45:19.658178 345762 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.658190 345762 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000c56960 6 D0713 08:45:19.658196 345762 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:45:19.658561 345762 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.658568 345762 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000c56960 7 D0713 08:45:19.658575 345762 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:45:19.658754 345762 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.658804 345762 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc000c56960 8 D0713 08:45:19.658820 345762 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:45:19.659047 345762 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.659090 345762 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc000c56960 9 D0713 08:45:19.659109 345762 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:45:19.659219 345762 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.659249 345762 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000c56960 10 D0713 08:45:19.659260 345762 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:45:19.667302 345762 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.667343 345762 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000c56960 11 D0713 08:45:19.667359 345762 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:45:19.670291 345762 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.670321 345762 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc000c56960 12 D0713 08:45:19.670333 345762 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:45:19.670435 345762 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.670475 345762 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc000c56960 13 D0713 08:45:19.670491 345762 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:45:19.670552 345762 task_signals.go:470] [ 814: 814] Notified of signal 23 D0713 08:45:19.670637 345762 task_signals.go:220] [ 814: 814] Signal 23: delivering to handler I0713 08:45:19.678119 345762 compat.go:120] Unsupported syscall move_mount(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_mount for more information. D0713 08:45:19.678204 345762 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.678215 345762 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000c56960 14 D0713 08:45:19.678226 345762 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:45:19.678303 345762 task_exit.go:204] [ 814: 814] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.678334 345762 task_exit.go:204] [ 814: 814] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.678347 345762 task_signals.go:204] [ 814: 815] Signal 814, PID: 815, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.678370 345762 task_signals.go:204] [ 814: 816] Signal 814, PID: 816, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.678377 345762 task_exit.go:204] [ 814: 815] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.678358 345762 task_signals.go:204] [ 814: 817] Signal 814, PID: 817, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.678386 345762 task_signals.go:204] [ 814: 819] Signal 814, PID: 819, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.678397 345762 task_exit.go:204] [ 814: 815] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.678418 345762 task_exit.go:204] [ 814: 815] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.678458 345762 task_signals.go:204] [ 814: 818] Signal 814, PID: 818, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.678469 345762 task_exit.go:204] [ 814: 818] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.678481 345762 task_exit.go:204] [ 814: 818] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.678487 345762 task_exit.go:204] [ 814: 818] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.678495 345762 task_exit.go:204] [ 814: 817] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.678525 345762 task_exit.go:204] [ 814: 817] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.678538 345762 task_exit.go:204] [ 814: 817] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.678560 345762 task_exit.go:204] [ 814: 816] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.678590 345762 task_exit.go:204] [ 814: 816] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.678597 345762 task_exit.go:204] [ 814: 816] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.678609 345762 task_exit.go:204] [ 814: 819] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.680184 345762 task_exit.go:204] [ 814: 819] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.680208 345762 task_exit.go:204] [ 814: 819] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.680221 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.680252 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.680260 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.680482 345762 task_exit.go:204] [ 814: 814] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.681167 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.682624 345762 syscalls.go:262] [ 820: 820] Allocating stack with size of 8388608 bytes D0713 08:45:19.682729 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.684085 345762 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.684119 345762 usertrap_amd64.go:106] [ 820: 820] Map a usertrap vma at 68000 D0713 08:45:19.684187 345762 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc001ef6fc0 1 D0713 08:45:19.684204 345762 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:45:19.684520 345762 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.684539 345762 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc001ef6fc0 2 D0713 08:45:19.684546 345762 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:45:19.685019 345762 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.685040 345762 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc001ef6fc0 3 D0713 08:45:19.685048 345762 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:45:19.690453 345762 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.690477 345762 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc001ef6fc0 4 D0713 08:45:19.690486 345762 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:45:19.691794 345762 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.691814 345762 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc001ef6fc0 5 D0713 08:45:19.691822 345762 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:45:19.691877 345762 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.691882 345762 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc001ef6fc0 6 D0713 08:45:19.691889 345762 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:45:19.692251 345762 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.692266 345762 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc001ef6fc0 7 D0713 08:45:19.692272 345762 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:45:19.692406 345762 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.692437 345762 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc001ef6fc0 8 D0713 08:45:19.692452 345762 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:45:19.692617 345762 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.692643 345762 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc001ef6fc0 9 D0713 08:45:19.692653 345762 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:45:19.692670 345762 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.692674 345762 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc001ef6fc0 10 D0713 08:45:19.692680 345762 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:45:19.699949 345762 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.699976 345762 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc001ef6fc0 11 D0713 08:45:19.699986 345762 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:45:19.704144 345762 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.704175 345762 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc001ef6fc0 12 D0713 08:45:19.704187 345762 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:45:19.704245 345762 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.704260 345762 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc001ef6fc0 13 D0713 08:45:19.704267 345762 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:45:19.704349 345762 task_signals.go:470] [ 820: 820] Notified of signal 23 D0713 08:45:19.704394 345762 task_signals.go:220] [ 820: 820] Signal 23: delivering to handler I0713 08:45:19.712153 345762 compat.go:120] Unsupported syscall move_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_pages for more information. D0713 08:45:19.712287 345762 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.712306 345762 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc001ef6fc0 14 D0713 08:45:19.712324 345762 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:45:19.712406 345762 task_exit.go:204] [ 820: 820] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.712437 345762 task_exit.go:204] [ 820: 820] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.712463 345762 task_signals.go:204] [ 820: 823] Signal 820, PID: 823, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.712480 345762 task_exit.go:204] [ 820: 823] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.712487 345762 task_exit.go:204] [ 820: 823] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.712491 345762 task_exit.go:204] [ 820: 823] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.712508 345762 task_signals.go:204] [ 820: 824] Signal 820, PID: 824, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.712580 345762 task_exit.go:204] [ 820: 824] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.712607 345762 task_exit.go:204] [ 820: 824] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.712621 345762 task_exit.go:204] [ 820: 824] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.712490 345762 task_signals.go:204] [ 820: 822] Signal 820, PID: 822, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.712644 345762 task_exit.go:204] [ 820: 822] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.712651 345762 task_exit.go:204] [ 820: 822] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.712656 345762 task_exit.go:204] [ 820: 822] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.712528 345762 task_signals.go:204] [ 820: 821] Signal 820, PID: 821, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.712691 345762 task_exit.go:204] [ 820: 821] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.714242 345762 task_exit.go:204] [ 820: 821] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.714275 345762 task_exit.go:204] [ 820: 821] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.714316 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.714354 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.714375 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.714498 345762 task_exit.go:204] [ 820: 820] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.715011 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.716561 345762 syscalls.go:262] [ 825: 825] Allocating stack with size of 8388608 bytes D0713 08:45:19.716696 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.718363 345762 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.718412 345762 usertrap_amd64.go:106] [ 825: 825] Map a usertrap vma at 63000 D0713 08:45:19.718531 345762 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc002184d50 1 D0713 08:45:19.718556 345762 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:19.719020 345762 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.719048 345762 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc002184d50 2 D0713 08:45:19.719058 345762 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:19.719689 345762 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.719723 345762 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc002184d50 3 D0713 08:45:19.719738 345762 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:19.725505 345762 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.725556 345762 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc002184d50 4 D0713 08:45:19.725572 345762 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:19.727022 345762 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.727065 345762 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc002184d50 5 D0713 08:45:19.727096 345762 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:19.727361 345762 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.727388 345762 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc002184d50 6 D0713 08:45:19.727412 345762 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:19.727803 345762 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.727840 345762 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc002184d50 7 D0713 08:45:19.727861 345762 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:19.728170 345762 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.728194 345762 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc002184d50 8 D0713 08:45:19.728207 345762 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:19.728419 345762 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.728447 345762 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc002184d50 9 D0713 08:45:19.728459 345762 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:19.728732 345762 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.728757 345762 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc002184d50 10 D0713 08:45:19.728768 345762 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:19.737846 345762 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.737878 345762 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc002184d50 11 D0713 08:45:19.737894 345762 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:19.740416 345762 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.740440 345762 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc002184d50 12 D0713 08:45:19.740451 345762 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:19.740502 345762 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.740532 345762 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc002184d50 13 D0713 08:45:19.740547 345762 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:19.740621 345762 task_signals.go:470] [ 825: 825] Notified of signal 23 D0713 08:45:19.740691 345762 task_signals.go:220] [ 825: 825] Signal 23: delivering to handler D0713 08:45:19.750187 345762 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.750212 345762 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc002184d50 14 D0713 08:45:19.750222 345762 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:19.750289 345762 task_exit.go:204] [ 825: 825] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.750325 345762 task_exit.go:204] [ 825: 825] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.750342 345762 task_signals.go:204] [ 825: 826] Signal 825, PID: 826, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.750346 345762 task_signals.go:204] [ 825: 827] Signal 825, PID: 827, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.750362 345762 task_exit.go:204] [ 825: 826] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.750343 345762 task_signals.go:204] [ 825: 829] Signal 825, PID: 829, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.750377 345762 task_exit.go:204] [ 825: 826] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.750406 345762 task_exit.go:204] [ 825: 826] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.750434 345762 task_signals.go:204] [ 825: 828] Signal 825, PID: 828, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.750444 345762 task_exit.go:204] [ 825: 828] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.750457 345762 task_exit.go:204] [ 825: 828] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.750470 345762 task_exit.go:204] [ 825: 828] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.750487 345762 task_exit.go:204] [ 825: 827] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.750526 345762 task_exit.go:204] [ 825: 827] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.750537 345762 task_exit.go:204] [ 825: 827] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.750558 345762 task_exit.go:204] [ 825: 829] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.752375 345762 task_exit.go:204] [ 825: 829] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.752412 345762 task_exit.go:204] [ 825: 829] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.752430 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.752479 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.752541 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.752577 345762 task_exit.go:204] [ 825: 825] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.753536 345762 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.754982 345762 syscalls.go:262] [ 830: 830] Allocating stack with size of 8388608 bytes D0713 08:45:19.755094 345762 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.756413 345762 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.756461 345762 usertrap_amd64.go:106] [ 830: 830] Map a usertrap vma at 6a000 D0713 08:45:19.756542 345762 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc001dec1b0 1 D0713 08:45:19.756598 345762 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:19.757154 345762 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.757175 345762 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc001dec1b0 2 D0713 08:45:19.757191 345762 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:19.758079 345762 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.758104 345762 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc001dec1b0 3 D0713 08:45:19.758114 345762 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:19.765772 345762 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.765803 345762 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc001dec1b0 4 D0713 08:45:19.765814 345762 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:19.767129 345762 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.767154 345762 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc001dec1b0 5 D0713 08:45:19.767163 345762 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:19.767245 345762 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.767251 345762 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc001dec1b0 6 D0713 08:45:19.767258 345762 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:19.767631 345762 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.767647 345762 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc001dec1b0 7 D0713 08:45:19.767653 345762 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:19.767788 345762 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.767805 345762 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc001dec1b0 8 D0713 08:45:19.767811 345762 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:19.767902 345762 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.767919 345762 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc001dec1b0 9 D0713 08:45:19.767927 345762 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:19.768032 345762 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.768065 345762 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc001dec1b0 10 D0713 08:45:19.768184 345762 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46b020 trap addr 6a320 ([184 39 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:19.768265 345762 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.768284 345762 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc001dec1b0 11 D0713 08:45:19.768297 345762 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b57c trap addr 6a370 ([184 202 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:19.768322 345762 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.768331 345762 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc001dec1b0 12 D0713 08:45:19.768340 345762 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:19.768403 345762 task_signals.go:470] [ 830: 830] Notified of signal 23 D0713 08:45:19.768438 345762 task_signals.go:220] [ 830: 830] Signal 23: delivering to handler D0713 08:45:19.777256 345762 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.777290 345762 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc001dec1b0 13 D0713 08:45:19.777304 345762 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:19.778917 345762 task_signals.go:470] [ 830: 830] Notified of signal 23 D0713 08:45:19.779683 345762 task_signals.go:220] [ 830: 830] Signal 23: delivering to handler I0713 08:45:19.787662 345762 compat.go:120] Unsupported syscall mq_getsetattr(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_getsetattr for more information. D0713 08:45:19.787748 345762 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.787776 345762 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc001dec1b0 14 D0713 08:45:19.787794 345762 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:19.787846 345762 task_exit.go:204] [ 830: 830] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.787877 345762 task_exit.go:204] [ 830: 830] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.787893 345762 task_signals.go:204] [ 830: 833] Signal 830, PID: 833, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.787909 345762 task_signals.go:204] [ 830: 832] Signal 830, PID: 832, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.787911 345762 task_signals.go:204] [ 830: 834] Signal 830, PID: 834, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.787919 345762 task_exit.go:204] [ 830: 833] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.787960 345762 task_exit.go:204] [ 830: 833] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.787966 345762 task_exit.go:204] [ 830: 833] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.787895 345762 task_signals.go:204] [ 830: 831] Signal 830, PID: 831, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.787979 345762 task_exit.go:204] [ 830: 832] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.787996 345762 task_exit.go:204] [ 830: 832] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.788028 345762 task_exit.go:204] [ 830: 832] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.788040 345762 task_exit.go:204] [ 830: 834] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.788047 345762 task_exit.go:204] [ 830: 834] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.788051 345762 task_exit.go:204] [ 830: 834] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.788059 345762 task_exit.go:204] [ 830: 831] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.789703 345762 task_exit.go:204] [ 830: 831] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.789734 345762 task_exit.go:204] [ 830: 831] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.789753 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.789787 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.789801 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.789991 345762 task_exit.go:204] [ 830: 830] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.790490 345762 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.791564 345762 syscalls.go:262] [ 835: 835] Allocating stack with size of 8388608 bytes D0713 08:45:19.791685 345762 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.793222 345762 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.793270 345762 usertrap_amd64.go:106] [ 835: 835] Map a usertrap vma at 63000 D0713 08:45:19.793363 345762 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001dec780 1 D0713 08:45:19.793385 345762 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:19.793846 345762 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.793870 345762 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001dec780 2 D0713 08:45:19.793891 345762 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:19.794623 345762 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.794653 345762 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001dec780 3 D0713 08:45:19.794665 345762 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:19.800574 345762 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.800596 345762 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001dec780 4 D0713 08:45:19.800615 345762 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:19.801574 345762 sampler.go:191] Time: Adjusting syscall overhead down to 588 D0713 08:45:19.801929 345762 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.801959 345762 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001dec780 5 D0713 08:45:19.801973 345762 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:19.802036 345762 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.802052 345762 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001dec780 6 D0713 08:45:19.802060 345762 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:19.802433 345762 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.802440 345762 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001dec780 7 D0713 08:45:19.802448 345762 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:19.802590 345762 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.802615 345762 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc001dec780 8 D0713 08:45:19.802625 345762 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:19.802738 345762 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.802770 345762 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc001dec780 9 D0713 08:45:19.802784 345762 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:19.802911 345762 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.802935 345762 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001dec780 10 D0713 08:45:19.802946 345762 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:19.803406 345762 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.803431 345762 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc001dec780 11 D0713 08:45:19.803444 345762 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:19.803473 345762 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.803499 345762 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc001dec780 12 D0713 08:45:19.803510 345762 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:19.803576 345762 task_signals.go:470] [ 835: 835] Notified of signal 23 D0713 08:45:19.803630 345762 task_signals.go:220] [ 835: 835] Signal 23: delivering to handler D0713 08:45:19.810659 345762 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.810739 345762 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001dec780 13 D0713 08:45:19.810766 345762 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:19.814733 345762 task_signals.go:470] [ 835: 835] Notified of signal 23 D0713 08:45:19.814779 345762 task_signals.go:220] [ 835: 835] Signal 23: delivering to handler I0713 08:45:19.821486 345762 compat.go:120] Unsupported syscall mq_notify(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_notify for more information. D0713 08:45:19.821565 345762 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.821579 345762 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001dec780 14 D0713 08:45:19.821595 345762 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:19.821661 345762 task_exit.go:204] [ 835: 835] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.821702 345762 task_signals.go:204] [ 835: 836] Signal 835, PID: 836, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.821702 345762 task_signals.go:204] [ 835: 837] Signal 835, PID: 837, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.821730 345762 task_signals.go:204] [ 835: 838] Signal 835, PID: 838, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.821773 345762 task_exit.go:204] [ 835: 835] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.821809 345762 task_signals.go:204] [ 835: 839] Signal 835, PID: 839, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.821823 345762 task_exit.go:204] [ 835: 836] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.821858 345762 task_exit.go:204] [ 835: 836] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.821864 345762 task_exit.go:204] [ 835: 836] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.821877 345762 task_exit.go:204] [ 835: 839] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.821903 345762 task_exit.go:204] [ 835: 839] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.821912 345762 task_exit.go:204] [ 835: 839] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.821924 345762 task_exit.go:204] [ 835: 837] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.821937 345762 task_exit.go:204] [ 835: 837] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.821942 345762 task_exit.go:204] [ 835: 837] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.821953 345762 task_exit.go:204] [ 835: 838] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.823289 345762 task_exit.go:204] [ 835: 838] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.823326 345762 task_exit.go:204] [ 835: 838] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.823346 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.823381 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.823403 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.823493 345762 task_exit.go:204] [ 835: 835] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.824014 345762 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.825854 345762 syscalls.go:262] [ 840: 840] Allocating stack with size of 8388608 bytes D0713 08:45:19.825984 345762 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.827788 345762 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.827866 345762 usertrap_amd64.go:106] [ 840: 840] Map a usertrap vma at 6a000 D0713 08:45:19.828015 345762 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc002185350 1 D0713 08:45:19.828049 345762 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:19.828534 345762 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.828565 345762 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc002185350 2 D0713 08:45:19.828575 345762 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:19.829643 345762 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.829675 345762 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc002185350 3 D0713 08:45:19.829683 345762 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:19.838268 345762 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.838324 345762 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc002185350 4 D0713 08:45:19.838347 345762 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:19.840046 345762 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.840075 345762 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc002185350 5 D0713 08:45:19.840086 345762 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:19.840151 345762 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.840173 345762 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc002185350 6 D0713 08:45:19.840190 345762 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:19.840505 345762 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.840525 345762 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc002185350 7 D0713 08:45:19.840531 345762 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:19.840700 345762 usertrap_amd64.go:212] [ 840: 841] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.840734 345762 usertrap_amd64.go:122] [ 840: 841] Allocate a new trap: 0xc002185350 8 D0713 08:45:19.840746 345762 usertrap_amd64.go:225] [ 840: 841] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:19.841198 345762 usertrap_amd64.go:212] [ 840: 841] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.841232 345762 usertrap_amd64.go:122] [ 840: 841] Allocate a new trap: 0xc002185350 9 D0713 08:45:19.841295 345762 usertrap_amd64.go:225] [ 840: 841] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:19.841350 345762 usertrap_amd64.go:212] [ 840: 842] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.841396 345762 usertrap_amd64.go:122] [ 840: 842] Allocate a new trap: 0xc002185350 10 D0713 08:45:19.841406 345762 usertrap_amd64.go:225] [ 840: 842] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:19.849125 345762 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.849210 345762 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc002185350 11 D0713 08:45:19.849230 345762 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:19.852568 345762 usertrap_amd64.go:212] [ 840: 841] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.852627 345762 usertrap_amd64.go:122] [ 840: 841] Allocate a new trap: 0xc002185350 12 D0713 08:45:19.852649 345762 usertrap_amd64.go:225] [ 840: 841] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:19.852747 345762 usertrap_amd64.go:212] [ 840: 841] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.852767 345762 usertrap_amd64.go:122] [ 840: 841] Allocate a new trap: 0xc002185350 13 D0713 08:45:19.852775 345762 usertrap_amd64.go:225] [ 840: 841] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:19.852813 345762 task_signals.go:470] [ 840: 840] Notified of signal 23 D0713 08:45:19.852893 345762 task_signals.go:220] [ 840: 840] Signal 23: delivering to handler D0713 08:45:19.862204 345762 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.862260 345762 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc002185350 14 D0713 08:45:19.862275 345762 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:19.862378 345762 task_exit.go:204] [ 840: 840] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.862498 345762 task_exit.go:204] [ 840: 840] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.862543 345762 task_signals.go:204] [ 840: 841] Signal 840, PID: 841, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.862592 345762 task_exit.go:204] [ 840: 841] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.862612 345762 task_exit.go:204] [ 840: 841] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.862618 345762 task_exit.go:204] [ 840: 841] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.862650 345762 task_signals.go:204] [ 840: 843] Signal 840, PID: 843, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.862678 345762 task_exit.go:204] [ 840: 843] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.862691 345762 task_exit.go:204] [ 840: 843] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.862700 345762 task_exit.go:204] [ 840: 843] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.862726 345762 task_signals.go:204] [ 840: 842] Signal 840, PID: 842, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.862743 345762 task_exit.go:204] [ 840: 842] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.862749 345762 task_exit.go:204] [ 840: 842] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.862755 345762 task_exit.go:204] [ 840: 842] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.862771 345762 task_signals.go:204] [ 840: 844] Signal 840, PID: 844, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.862803 345762 task_exit.go:204] [ 840: 844] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.862814 345762 task_exit.go:204] [ 840: 844] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.862822 345762 task_exit.go:204] [ 840: 844] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.862878 345762 task_signals.go:204] [ 840: 845] Signal 840, PID: 845, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.862912 345762 task_exit.go:204] [ 840: 845] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.864627 345762 task_exit.go:204] [ 840: 845] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.864702 345762 task_exit.go:204] [ 840: 845] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.864729 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.864783 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.864799 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.864838 345762 task_exit.go:204] [ 840: 840] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.865869 345762 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.867828 345762 syscalls.go:262] [ 846: 846] Allocating stack with size of 8388608 bytes D0713 08:45:19.868034 345762 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.869338 345762 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.869479 345762 usertrap_amd64.go:106] [ 846: 846] Map a usertrap vma at 62000 D0713 08:45:19.869644 345762 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001decc60 1 D0713 08:45:19.869717 345762 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:19.870261 345762 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.870283 345762 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001decc60 2 D0713 08:45:19.870297 345762 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:19.871112 345762 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.871134 345762 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001decc60 3 D0713 08:45:19.871144 345762 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:19.877157 345762 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.877195 345762 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001decc60 4 D0713 08:45:19.877212 345762 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:19.878707 345762 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.878747 345762 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001decc60 5 D0713 08:45:19.878763 345762 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:19.878830 345762 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.878844 345762 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001decc60 6 D0713 08:45:19.878850 345762 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:19.879328 345762 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.879346 345762 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001decc60 7 D0713 08:45:19.879354 345762 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:19.879527 345762 usertrap_amd64.go:212] [ 846: 847] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.879544 345762 usertrap_amd64.go:122] [ 846: 847] Allocate a new trap: 0xc001decc60 8 D0713 08:45:19.879551 345762 usertrap_amd64.go:225] [ 846: 847] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:19.879733 345762 usertrap_amd64.go:212] [ 846: 847] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.879772 345762 usertrap_amd64.go:122] [ 846: 847] Allocate a new trap: 0xc001decc60 9 D0713 08:45:19.879792 345762 usertrap_amd64.go:225] [ 846: 847] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:19.879820 345762 usertrap_amd64.go:212] [ 846: 848] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:19.879840 345762 usertrap_amd64.go:122] [ 846: 848] Allocate a new trap: 0xc001decc60 10 D0713 08:45:19.879854 345762 usertrap_amd64.go:225] [ 846: 848] Apply the binary patch addr 46b6e0 trap addr 62320 ([184 24 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:19.879883 345762 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.879901 345762 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001decc60 11 D0713 08:45:19.879909 345762 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b57c trap addr 62370 ([184 202 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:19.888608 345762 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.888668 345762 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001decc60 12 D0713 08:45:19.888686 345762 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46af29 trap addr 623c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:19.891437 345762 usertrap_amd64.go:212] [ 846: 847] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.891471 345762 usertrap_amd64.go:122] [ 846: 847] Allocate a new trap: 0xc001decc60 13 D0713 08:45:19.891483 345762 usertrap_amd64.go:225] [ 846: 847] Apply the binary patch addr 46b020 trap addr 62410 ([184 39 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:19.891583 345762 usertrap_amd64.go:212] [ 846: 847] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.891620 345762 usertrap_amd64.go:122] [ 846: 847] Allocate a new trap: 0xc001decc60 14 D0713 08:45:19.891637 345762 usertrap_amd64.go:225] [ 846: 847] Apply the binary patch addr 46b04f trap addr 62460 ([184 234 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:19.891720 345762 task_signals.go:470] [ 846: 846] Notified of signal 23 D0713 08:45:19.891836 345762 task_signals.go:220] [ 846: 846] Signal 23: delivering to handler I0713 08:45:19.899624 345762 compat.go:120] Unsupported syscall mq_timedreceive(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedreceive for more information. D0713 08:45:19.899754 345762 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.899787 345762 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001decc60 15 D0713 08:45:19.899804 345762 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0713 08:45:19.899872 345762 task_exit.go:204] [ 846: 846] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.899911 345762 task_exit.go:204] [ 846: 846] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.899949 345762 task_signals.go:204] [ 846: 849] Signal 846, PID: 849, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.899986 345762 task_exit.go:204] [ 846: 849] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.899937 345762 task_signals.go:204] [ 846: 848] Signal 846, PID: 848, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.899999 345762 task_exit.go:204] [ 846: 849] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.900009 345762 task_exit.go:204] [ 846: 849] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.900012 345762 task_signals.go:204] [ 846: 847] Signal 846, PID: 847, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.900030 345762 task_signals.go:204] [ 846: 850] Signal 846, PID: 850, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.900045 345762 task_exit.go:204] [ 846: 848] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.900093 345762 task_exit.go:204] [ 846: 848] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.900107 345762 task_exit.go:204] [ 846: 848] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.900126 345762 task_exit.go:204] [ 846: 850] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.900136 345762 task_exit.go:204] [ 846: 850] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.900143 345762 task_exit.go:204] [ 846: 850] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.900157 345762 task_exit.go:204] [ 846: 847] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.901597 345762 task_exit.go:204] [ 846: 847] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.901624 345762 task_exit.go:204] [ 846: 847] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.901648 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.901682 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.901700 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.901831 345762 task_exit.go:204] [ 846: 846] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.902837 345762 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.904427 345762 syscalls.go:262] [ 851: 851] Allocating stack with size of 8388608 bytes D0713 08:45:19.904557 345762 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.905784 345762 usertrap_amd64.go:212] [ 851: 851] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.905838 345762 usertrap_amd64.go:106] [ 851: 851] Map a usertrap vma at 65000 D0713 08:45:19.905950 345762 usertrap_amd64.go:122] [ 851: 851] Allocate a new trap: 0xc0021856b0 1 D0713 08:45:19.905985 345762 usertrap_amd64.go:225] [ 851: 851] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:19.906591 345762 usertrap_amd64.go:212] [ 851: 851] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.906612 345762 usertrap_amd64.go:122] [ 851: 851] Allocate a new trap: 0xc0021856b0 2 D0713 08:45:19.906624 345762 usertrap_amd64.go:225] [ 851: 851] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:19.907234 345762 usertrap_amd64.go:212] [ 851: 851] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.907250 345762 usertrap_amd64.go:122] [ 851: 851] Allocate a new trap: 0xc0021856b0 3 D0713 08:45:19.907259 345762 usertrap_amd64.go:225] [ 851: 851] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:19.912915 345762 usertrap_amd64.go:212] [ 851: 851] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.912961 345762 usertrap_amd64.go:122] [ 851: 851] Allocate a new trap: 0xc0021856b0 4 D0713 08:45:19.912974 345762 usertrap_amd64.go:225] [ 851: 851] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:19.914387 345762 usertrap_amd64.go:212] [ 851: 851] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.914406 345762 usertrap_amd64.go:122] [ 851: 851] Allocate a new trap: 0xc0021856b0 5 D0713 08:45:19.914413 345762 usertrap_amd64.go:225] [ 851: 851] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:19.914460 345762 usertrap_amd64.go:212] [ 851: 851] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.914475 345762 usertrap_amd64.go:122] [ 851: 851] Allocate a new trap: 0xc0021856b0 6 D0713 08:45:19.914481 345762 usertrap_amd64.go:225] [ 851: 851] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:19.914641 345762 usertrap_amd64.go:212] [ 851: 851] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.914661 345762 usertrap_amd64.go:122] [ 851: 851] Allocate a new trap: 0xc0021856b0 7 D0713 08:45:19.914666 345762 usertrap_amd64.go:225] [ 851: 851] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:19.914853 345762 usertrap_amd64.go:212] [ 851: 852] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.914888 345762 usertrap_amd64.go:122] [ 851: 852] Allocate a new trap: 0xc0021856b0 8 D0713 08:45:19.914907 345762 usertrap_amd64.go:225] [ 851: 852] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:19.915150 345762 usertrap_amd64.go:212] [ 851: 852] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.915183 345762 usertrap_amd64.go:122] [ 851: 852] Allocate a new trap: 0xc0021856b0 9 D0713 08:45:19.915198 345762 usertrap_amd64.go:225] [ 851: 852] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:19.915367 345762 usertrap_amd64.go:212] [ 851: 851] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.915406 345762 usertrap_amd64.go:122] [ 851: 851] Allocate a new trap: 0xc0021856b0 10 D0713 08:45:19.915420 345762 usertrap_amd64.go:225] [ 851: 851] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:19.925515 345762 usertrap_amd64.go:212] [ 851: 851] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.925551 345762 usertrap_amd64.go:122] [ 851: 851] Allocate a new trap: 0xc0021856b0 11 D0713 08:45:19.925561 345762 usertrap_amd64.go:225] [ 851: 851] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:19.925854 345762 usertrap_amd64.go:212] [ 851: 852] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.925881 345762 usertrap_amd64.go:122] [ 851: 852] Allocate a new trap: 0xc0021856b0 12 D0713 08:45:19.925892 345762 usertrap_amd64.go:225] [ 851: 852] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:19.925915 345762 usertrap_amd64.go:212] [ 851: 852] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.925941 345762 usertrap_amd64.go:122] [ 851: 852] Allocate a new trap: 0xc0021856b0 13 D0713 08:45:19.925951 345762 usertrap_amd64.go:225] [ 851: 852] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:19.925987 345762 task_signals.go:470] [ 851: 851] Notified of signal 23 D0713 08:45:19.926229 345762 task_signals.go:220] [ 851: 851] Signal 23: delivering to handler D0713 08:45:19.936517 345762 task_signals.go:470] [ 851: 851] Notified of signal 23 D0713 08:45:19.936580 345762 task_signals.go:220] [ 851: 851] Signal 23: delivering to handler I0713 08:45:19.936850 345762 compat.go:120] Unsupported syscall mq_timedsend(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedsend for more information. D0713 08:45:19.936918 345762 usertrap_amd64.go:212] [ 851: 851] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.936935 345762 usertrap_amd64.go:122] [ 851: 851] Allocate a new trap: 0xc0021856b0 14 D0713 08:45:19.936970 345762 usertrap_amd64.go:225] [ 851: 851] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:19.937063 345762 task_exit.go:204] [ 851: 851] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.937092 345762 task_exit.go:204] [ 851: 851] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.937113 345762 task_signals.go:204] [ 851: 855] Signal 851, PID: 855, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.937108 345762 task_signals.go:204] [ 851: 854] Signal 851, PID: 854, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.937123 345762 task_signals.go:204] [ 851: 853] Signal 851, PID: 853, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.937131 345762 task_exit.go:204] [ 851: 855] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.937152 345762 task_signals.go:204] [ 851: 852] Signal 851, PID: 852, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.937179 345762 task_exit.go:204] [ 851: 855] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.937189 345762 task_exit.go:204] [ 851: 855] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.937207 345762 task_exit.go:204] [ 851: 854] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.937213 345762 task_exit.go:204] [ 851: 854] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.937218 345762 task_exit.go:204] [ 851: 854] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.937225 345762 task_exit.go:204] [ 851: 853] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.937231 345762 task_exit.go:204] [ 851: 853] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.937235 345762 task_exit.go:204] [ 851: 853] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.937243 345762 task_exit.go:204] [ 851: 852] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.938577 345762 task_exit.go:204] [ 851: 852] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.938597 345762 task_exit.go:204] [ 851: 852] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.938609 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.938639 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.938665 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.938865 345762 task_exit.go:204] [ 851: 851] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.939335 345762 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.940689 345762 syscalls.go:262] [ 856: 856] Allocating stack with size of 8388608 bytes D0713 08:45:19.940790 345762 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.942079 345762 usertrap_amd64.go:212] [ 856: 856] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.942174 345762 usertrap_amd64.go:106] [ 856: 856] Map a usertrap vma at 60000 D0713 08:45:19.942385 345762 usertrap_amd64.go:122] [ 856: 856] Allocate a new trap: 0xc001ef7b90 1 D0713 08:45:19.942441 345762 usertrap_amd64.go:225] [ 856: 856] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:19.942842 345762 usertrap_amd64.go:212] [ 856: 856] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.942868 345762 usertrap_amd64.go:122] [ 856: 856] Allocate a new trap: 0xc001ef7b90 2 D0713 08:45:19.942883 345762 usertrap_amd64.go:225] [ 856: 856] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:19.943433 345762 usertrap_amd64.go:212] [ 856: 856] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.943452 345762 usertrap_amd64.go:122] [ 856: 856] Allocate a new trap: 0xc001ef7b90 3 D0713 08:45:19.943461 345762 usertrap_amd64.go:225] [ 856: 856] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:19.948628 345762 usertrap_amd64.go:212] [ 856: 856] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.948656 345762 usertrap_amd64.go:122] [ 856: 856] Allocate a new trap: 0xc001ef7b90 4 D0713 08:45:19.948665 345762 usertrap_amd64.go:225] [ 856: 856] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:19.949745 345762 usertrap_amd64.go:212] [ 856: 856] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.949778 345762 usertrap_amd64.go:122] [ 856: 856] Allocate a new trap: 0xc001ef7b90 5 D0713 08:45:19.949791 345762 usertrap_amd64.go:225] [ 856: 856] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:19.949839 345762 usertrap_amd64.go:212] [ 856: 856] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.949857 345762 usertrap_amd64.go:122] [ 856: 856] Allocate a new trap: 0xc001ef7b90 6 D0713 08:45:19.949865 345762 usertrap_amd64.go:225] [ 856: 856] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:19.950386 345762 usertrap_amd64.go:212] [ 856: 856] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.950406 345762 usertrap_amd64.go:122] [ 856: 856] Allocate a new trap: 0xc001ef7b90 7 D0713 08:45:19.950413 345762 usertrap_amd64.go:225] [ 856: 856] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:19.950536 345762 usertrap_amd64.go:212] [ 856: 857] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.950558 345762 usertrap_amd64.go:122] [ 856: 857] Allocate a new trap: 0xc001ef7b90 8 D0713 08:45:19.950565 345762 usertrap_amd64.go:225] [ 856: 857] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:19.950613 345762 usertrap_amd64.go:212] [ 856: 857] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.950626 345762 usertrap_amd64.go:122] [ 856: 857] Allocate a new trap: 0xc001ef7b90 9 D0713 08:45:19.950634 345762 usertrap_amd64.go:225] [ 856: 857] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:19.950748 345762 usertrap_amd64.go:212] [ 856: 856] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.950772 345762 usertrap_amd64.go:122] [ 856: 856] Allocate a new trap: 0xc001ef7b90 10 D0713 08:45:19.950782 345762 usertrap_amd64.go:225] [ 856: 856] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:19.951515 345762 usertrap_amd64.go:212] [ 856: 857] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.951543 345762 usertrap_amd64.go:122] [ 856: 857] Allocate a new trap: 0xc001ef7b90 11 D0713 08:45:19.951559 345762 usertrap_amd64.go:225] [ 856: 857] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:19.951602 345762 usertrap_amd64.go:212] [ 856: 857] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.951629 345762 usertrap_amd64.go:122] [ 856: 857] Allocate a new trap: 0xc001ef7b90 12 D0713 08:45:19.951640 345762 usertrap_amd64.go:225] [ 856: 857] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:19.951661 345762 task_signals.go:470] [ 856: 856] Notified of signal 23 D0713 08:45:19.951799 345762 task_signals.go:220] [ 856: 856] Signal 23: delivering to handler D0713 08:45:19.959097 345762 usertrap_amd64.go:212] [ 856: 856] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.959129 345762 usertrap_amd64.go:122] [ 856: 856] Allocate a new trap: 0xc001ef7b90 13 D0713 08:45:19.959142 345762 usertrap_amd64.go:225] [ 856: 856] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:19.962549 345762 task_signals.go:470] [ 856: 856] Notified of signal 23 D0713 08:45:19.962589 345762 task_signals.go:220] [ 856: 856] Signal 23: delivering to handler D0713 08:45:19.971184 345762 usertrap_amd64.go:212] [ 856: 856] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.971208 345762 usertrap_amd64.go:122] [ 856: 856] Allocate a new trap: 0xc001ef7b90 14 D0713 08:45:19.971219 345762 usertrap_amd64.go:225] [ 856: 856] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:19.971279 345762 task_exit.go:204] [ 856: 856] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.971300 345762 task_exit.go:204] [ 856: 856] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.971301 345762 task_signals.go:204] [ 856: 857] Signal 856, PID: 857, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.971322 345762 task_exit.go:204] [ 856: 857] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.971343 345762 task_exit.go:204] [ 856: 857] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.971348 345762 task_exit.go:204] [ 856: 857] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.971320 345762 task_signals.go:204] [ 856: 860] Signal 856, PID: 860, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.971366 345762 task_signals.go:204] [ 856: 858] Signal 856, PID: 858, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.971372 345762 task_exit.go:204] [ 856: 860] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.971358 345762 task_signals.go:204] [ 856: 859] Signal 856, PID: 859, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.971383 345762 task_exit.go:204] [ 856: 860] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.971388 345762 task_exit.go:204] [ 856: 860] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.971412 345762 task_exit.go:204] [ 856: 859] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.971422 345762 task_exit.go:204] [ 856: 859] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.971428 345762 task_exit.go:204] [ 856: 859] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.971438 345762 task_exit.go:204] [ 856: 858] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.972602 345762 task_exit.go:204] [ 856: 858] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.972627 345762 task_exit.go:204] [ 856: 858] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.972636 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:19.972663 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.972679 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:19.972819 345762 task_exit.go:204] [ 856: 856] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.973371 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.974615 345762 syscalls.go:262] [ 861: 861] Allocating stack with size of 8388608 bytes D0713 08:45:19.974708 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.975626 345762 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.975664 345762 usertrap_amd64.go:106] [ 861: 861] Map a usertrap vma at 69000 D0713 08:45:19.975761 345762 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc001f48450 1 D0713 08:45:19.975799 345762 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:19.976038 345762 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.976057 345762 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc001f48450 2 D0713 08:45:19.976066 345762 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:19.976364 345762 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.976402 345762 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc001f48450 3 D0713 08:45:19.976411 345762 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:19.981555 345762 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.981587 345762 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc001f48450 4 D0713 08:45:19.981596 345762 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:19.982604 345762 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.982628 345762 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc001f48450 5 D0713 08:45:19.982637 345762 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:19.982682 345762 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.982700 345762 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc001f48450 6 D0713 08:45:19.982709 345762 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:19.982927 345762 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.982944 345762 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc001f48450 7 D0713 08:45:19.982952 345762 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:19.983054 345762 usertrap_amd64.go:212] [ 861: 862] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.983065 345762 usertrap_amd64.go:122] [ 861: 862] Allocate a new trap: 0xc001f48450 8 D0713 08:45:19.983075 345762 usertrap_amd64.go:225] [ 861: 862] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:19.983237 345762 usertrap_amd64.go:212] [ 861: 862] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.983304 345762 usertrap_amd64.go:122] [ 861: 862] Allocate a new trap: 0xc001f48450 9 D0713 08:45:19.983321 345762 usertrap_amd64.go:225] [ 861: 862] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:19.983334 345762 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.983339 345762 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc001f48450 10 D0713 08:45:19.983347 345762 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:19.990310 345762 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.990370 345762 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc001f48450 11 D0713 08:45:19.990389 345762 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:19.994111 345762 usertrap_amd64.go:212] [ 861: 862] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.994147 345762 usertrap_amd64.go:122] [ 861: 862] Allocate a new trap: 0xc001f48450 12 D0713 08:45:19.994160 345762 usertrap_amd64.go:225] [ 861: 862] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:19.994212 345762 usertrap_amd64.go:212] [ 861: 862] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.994222 345762 usertrap_amd64.go:122] [ 861: 862] Allocate a new trap: 0xc001f48450 13 D0713 08:45:19.994228 345762 usertrap_amd64.go:225] [ 861: 862] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:19.994253 345762 task_signals.go:470] [ 861: 861] Notified of signal 23 D0713 08:45:19.994313 345762 task_signals.go:220] [ 861: 861] Signal 23: delivering to handler D0713 08:45:20.001240 345762 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.001257 345762 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc001f48450 14 D0713 08:45:20.001269 345762 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:20.001343 345762 task_exit.go:204] [ 861: 861] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.001366 345762 task_exit.go:204] [ 861: 861] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.001388 345762 task_signals.go:204] [ 861: 864] Signal 861, PID: 864, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.001401 345762 task_exit.go:204] [ 861: 864] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.001407 345762 task_exit.go:204] [ 861: 864] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.001385 345762 task_signals.go:204] [ 861: 863] Signal 861, PID: 863, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.001411 345762 task_exit.go:204] [ 861: 864] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.001397 345762 task_signals.go:204] [ 861: 862] Signal 861, PID: 862, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.001486 345762 task_signals.go:204] [ 861: 865] Signal 861, PID: 865, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.001496 345762 task_exit.go:204] [ 861: 862] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.001535 345762 task_signals.go:204] [ 861: 866] Signal 861, PID: 866, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.001571 345762 task_exit.go:204] [ 861: 862] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.001585 345762 task_exit.go:204] [ 861: 862] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.001595 345762 task_exit.go:204] [ 861: 863] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.001610 345762 task_exit.go:204] [ 861: 863] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.001614 345762 task_exit.go:204] [ 861: 863] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.001624 345762 task_exit.go:204] [ 861: 865] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.001632 345762 task_exit.go:204] [ 861: 865] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.001636 345762 task_exit.go:204] [ 861: 865] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.001648 345762 task_exit.go:204] [ 861: 866] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.002830 345762 task_exit.go:204] [ 861: 866] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.002877 345762 task_exit.go:204] [ 861: 866] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.002891 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.002926 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.002937 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.003264 345762 task_exit.go:204] [ 861: 861] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.004327 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.005842 345762 syscalls.go:262] [ 867: 867] Allocating stack with size of 8388608 bytes D0713 08:45:20.006161 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.007172 345762 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.007228 345762 usertrap_amd64.go:106] [ 867: 867] Map a usertrap vma at 61000 D0713 08:45:20.007322 345762 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc001e5f980 1 D0713 08:45:20.007348 345762 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:20.007743 345762 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.007759 345762 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc001e5f980 2 D0713 08:45:20.007766 345762 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:20.008375 345762 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.008417 345762 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc001e5f980 3 D0713 08:45:20.008432 345762 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:45:20.014605 345762 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.014646 345762 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc001e5f980 4 D0713 08:45:20.014658 345762 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:45:20.015782 345762 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.015821 345762 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc001e5f980 5 D0713 08:45:20.015835 345762 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:45:20.015917 345762 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.015927 345762 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc001e5f980 6 D0713 08:45:20.015935 345762 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:45:20.016572 345762 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.016639 345762 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc001e5f980 7 D0713 08:45:20.016664 345762 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:45:20.016899 345762 usertrap_amd64.go:212] [ 867: 868] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.016914 345762 usertrap_amd64.go:122] [ 867: 868] Allocate a new trap: 0xc001e5f980 8 D0713 08:45:20.016924 345762 usertrap_amd64.go:225] [ 867: 868] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:45:20.017230 345762 usertrap_amd64.go:212] [ 867: 868] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.017279 345762 usertrap_amd64.go:122] [ 867: 868] Allocate a new trap: 0xc001e5f980 9 D0713 08:45:20.017293 345762 usertrap_amd64.go:225] [ 867: 868] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:45:20.017466 345762 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.017512 345762 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc001e5f980 10 D0713 08:45:20.017528 345762 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:45:20.026687 345762 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.026728 345762 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc001e5f980 11 D0713 08:45:20.026742 345762 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:45:20.029257 345762 usertrap_amd64.go:212] [ 867: 868] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.029296 345762 usertrap_amd64.go:122] [ 867: 868] Allocate a new trap: 0xc001e5f980 12 D0713 08:45:20.029310 345762 usertrap_amd64.go:225] [ 867: 868] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:45:20.029329 345762 usertrap_amd64.go:212] [ 867: 868] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.029335 345762 usertrap_amd64.go:122] [ 867: 868] Allocate a new trap: 0xc001e5f980 13 D0713 08:45:20.029340 345762 usertrap_amd64.go:225] [ 867: 868] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:45:20.029362 345762 task_signals.go:470] [ 867: 867] Notified of signal 23 D0713 08:45:20.029430 345762 task_signals.go:220] [ 867: 867] Signal 23: delivering to handler D0713 08:45:20.037542 345762 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.037575 345762 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc001e5f980 14 D0713 08:45:20.037594 345762 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:45:20.037671 345762 task_exit.go:204] [ 867: 867] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.037704 345762 task_exit.go:204] [ 867: 867] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.037727 345762 task_signals.go:204] [ 867: 870] Signal 867, PID: 870, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.037747 345762 task_signals.go:204] [ 867: 868] Signal 867, PID: 868, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.037754 345762 task_exit.go:204] [ 867: 870] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.037728 345762 task_signals.go:204] [ 867: 869] Signal 867, PID: 869, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.037767 345762 task_exit.go:204] [ 867: 870] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.037774 345762 task_exit.go:204] [ 867: 870] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.037791 345762 task_signals.go:204] [ 867: 871] Signal 867, PID: 871, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.037810 345762 task_exit.go:204] [ 867: 871] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.037816 345762 task_exit.go:204] [ 867: 871] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.037820 345762 task_exit.go:204] [ 867: 871] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.037832 345762 task_exit.go:204] [ 867: 869] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.037880 345762 task_exit.go:204] [ 867: 869] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.037884 345762 task_exit.go:204] [ 867: 869] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.037891 345762 task_exit.go:204] [ 867: 868] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.039923 345762 task_exit.go:204] [ 867: 868] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.039960 345762 task_exit.go:204] [ 867: 868] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.039974 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.040003 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.040010 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.040086 345762 task_exit.go:204] [ 867: 867] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.040278 345762 task_signals.go:470] [ 5: 9] Notified of signal 23 D0713 08:45:20.040342 345762 task_signals.go:220] [ 5: 9] Signal 23: delivering to handler D0713 08:45:20.040720 345762 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.043276 345762 syscalls.go:262] [ 872: 872] Allocating stack with size of 8388608 bytes D0713 08:45:20.043584 345762 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.045094 345762 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.045138 345762 usertrap_amd64.go:106] [ 872: 872] Map a usertrap vma at 67000 D0713 08:45:20.045242 345762 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc001ded470 1 D0713 08:45:20.045271 345762 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:20.045720 345762 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.045741 345762 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc001ded470 2 D0713 08:45:20.045748 345762 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:20.046312 345762 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.046331 345762 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc001ded470 3 D0713 08:45:20.046337 345762 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:20.052531 345762 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.052559 345762 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc001ded470 4 D0713 08:45:20.052568 345762 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:20.053841 345762 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.053860 345762 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc001ded470 5 D0713 08:45:20.053867 345762 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:20.053883 345762 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.053887 345762 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc001ded470 6 D0713 08:45:20.053892 345762 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:20.054443 345762 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.054461 345762 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc001ded470 7 D0713 08:45:20.054483 345762 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:20.054664 345762 usertrap_amd64.go:212] [ 872: 873] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.054694 345762 usertrap_amd64.go:122] [ 872: 873] Allocate a new trap: 0xc001ded470 8 D0713 08:45:20.054707 345762 usertrap_amd64.go:225] [ 872: 873] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:20.054865 345762 usertrap_amd64.go:212] [ 872: 873] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.054886 345762 usertrap_amd64.go:122] [ 872: 873] Allocate a new trap: 0xc001ded470 9 D0713 08:45:20.054896 345762 usertrap_amd64.go:225] [ 872: 873] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:20.055086 345762 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.055107 345762 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc001ded470 10 D0713 08:45:20.055116 345762 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:20.055621 345762 usertrap_amd64.go:212] [ 872: 873] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.055684 345762 usertrap_amd64.go:122] [ 872: 873] Allocate a new trap: 0xc001ded470 11 D0713 08:45:20.055705 345762 usertrap_amd64.go:225] [ 872: 873] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:20.055731 345762 usertrap_amd64.go:212] [ 872: 873] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.055753 345762 usertrap_amd64.go:122] [ 872: 873] Allocate a new trap: 0xc001ded470 12 D0713 08:45:20.055764 345762 usertrap_amd64.go:225] [ 872: 873] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:20.055864 345762 task_signals.go:470] [ 872: 872] Notified of signal 23 D0713 08:45:20.055950 345762 task_signals.go:220] [ 872: 872] Signal 23: delivering to handler D0713 08:45:20.063516 345762 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.063545 345762 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc001ded470 13 D0713 08:45:20.063556 345762 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:20.066292 345762 task_signals.go:470] [ 872: 872] Notified of signal 23 D0713 08:45:20.066361 345762 task_signals.go:220] [ 872: 872] Signal 23: delivering to handler D0713 08:45:20.076304 345762 usertrap_amd64.go:212] [ 872: 872] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.076383 345762 usertrap_amd64.go:122] [ 872: 872] Allocate a new trap: 0xc001ded470 14 D0713 08:45:20.076404 345762 usertrap_amd64.go:225] [ 872: 872] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:20.076485 345762 task_exit.go:204] [ 872: 872] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.076517 345762 task_exit.go:204] [ 872: 872] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.076535 345762 task_signals.go:204] [ 872: 874] Signal 872, PID: 874, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.076572 345762 task_exit.go:204] [ 872: 874] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.076590 345762 task_exit.go:204] [ 872: 874] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.076609 345762 task_exit.go:204] [ 872: 874] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.076581 345762 task_signals.go:204] [ 872: 873] Signal 872, PID: 873, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.076634 345762 task_exit.go:204] [ 872: 873] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.076659 345762 task_exit.go:204] [ 872: 873] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.076664 345762 task_exit.go:204] [ 872: 873] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.076553 345762 task_signals.go:204] [ 872: 875] Signal 872, PID: 875, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.076571 345762 task_signals.go:204] [ 872: 876] Signal 872, PID: 876, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.076678 345762 task_exit.go:204] [ 872: 875] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.076688 345762 task_exit.go:204] [ 872: 876] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.076723 345762 task_exit.go:204] [ 872: 875] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.076756 345762 task_exit.go:204] [ 872: 875] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.078245 345762 task_exit.go:204] [ 872: 876] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.078299 345762 task_exit.go:204] [ 872: 876] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.078315 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.078366 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.078402 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.078407 345762 task_exit.go:204] [ 872: 872] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.079079 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.081034 345762 syscalls.go:262] [ 877: 877] Allocating stack with size of 8388608 bytes D0713 08:45:20.081174 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.082462 345762 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.082507 345762 usertrap_amd64.go:106] [ 877: 877] Map a usertrap vma at 65000 D0713 08:45:20.082612 345762 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc0006cc8d0 1 D0713 08:45:20.082639 345762 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:20.083030 345762 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.083047 345762 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc0006cc8d0 2 D0713 08:45:20.083054 345762 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:20.083791 345762 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.083823 345762 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc0006cc8d0 3 D0713 08:45:20.083841 345762 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:20.090215 345762 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.090243 345762 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc0006cc8d0 4 D0713 08:45:20.090254 345762 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:20.091391 345762 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.091416 345762 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc0006cc8d0 5 D0713 08:45:20.091429 345762 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:20.091487 345762 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.091492 345762 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc0006cc8d0 6 D0713 08:45:20.091498 345762 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:20.091853 345762 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.091885 345762 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc0006cc8d0 7 D0713 08:45:20.091890 345762 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:20.092040 345762 usertrap_amd64.go:212] [ 877: 878] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.092060 345762 usertrap_amd64.go:122] [ 877: 878] Allocate a new trap: 0xc0006cc8d0 8 D0713 08:45:20.092066 345762 usertrap_amd64.go:225] [ 877: 878] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:20.092253 345762 usertrap_amd64.go:212] [ 877: 878] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.092277 345762 usertrap_amd64.go:122] [ 877: 878] Allocate a new trap: 0xc0006cc8d0 9 D0713 08:45:20.092288 345762 usertrap_amd64.go:225] [ 877: 878] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:20.092459 345762 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.092488 345762 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc0006cc8d0 10 D0713 08:45:20.092501 345762 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:20.093071 345762 usertrap_amd64.go:212] [ 877: 878] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.093098 345762 usertrap_amd64.go:122] [ 877: 878] Allocate a new trap: 0xc0006cc8d0 11 D0713 08:45:20.093110 345762 usertrap_amd64.go:225] [ 877: 878] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:20.093162 345762 usertrap_amd64.go:212] [ 877: 878] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.093184 345762 usertrap_amd64.go:122] [ 877: 878] Allocate a new trap: 0xc0006cc8d0 12 D0713 08:45:20.093193 345762 usertrap_amd64.go:225] [ 877: 878] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:20.093266 345762 task_signals.go:470] [ 877: 877] Notified of signal 23 D0713 08:45:20.093297 345762 task_signals.go:220] [ 877: 877] Signal 23: delivering to handler D0713 08:45:20.099922 345762 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.099946 345762 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc0006cc8d0 13 D0713 08:45:20.099955 345762 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:20.104423 345762 task_signals.go:470] [ 877: 877] Notified of signal 23 D0713 08:45:20.104489 345762 task_signals.go:220] [ 877: 877] Signal 23: delivering to handler D0713 08:45:20.110394 345762 usertrap_amd64.go:212] [ 877: 877] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.110428 345762 usertrap_amd64.go:122] [ 877: 877] Allocate a new trap: 0xc0006cc8d0 14 D0713 08:45:20.110441 345762 usertrap_amd64.go:225] [ 877: 877] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:20.110507 345762 task_exit.go:204] [ 877: 877] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.110547 345762 task_signals.go:204] [ 877: 878] Signal 877, PID: 878, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.110577 345762 task_signals.go:204] [ 877: 879] Signal 877, PID: 879, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.110583 345762 task_exit.go:204] [ 877: 877] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.110622 345762 task_signals.go:204] [ 877: 880] Signal 877, PID: 880, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.110643 345762 task_exit.go:204] [ 877: 880] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.110658 345762 task_signals.go:204] [ 877: 881] Signal 877, PID: 881, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.110674 345762 task_exit.go:204] [ 877: 881] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.110685 345762 task_exit.go:204] [ 877: 881] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.110690 345762 task_exit.go:204] [ 877: 881] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.110701 345762 task_exit.go:204] [ 877: 878] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.110710 345762 task_exit.go:204] [ 877: 878] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.110730 345762 task_exit.go:204] [ 877: 878] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.110739 345762 task_exit.go:204] [ 877: 879] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.110846 345762 task_exit.go:204] [ 877: 880] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.110865 345762 task_exit.go:204] [ 877: 880] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.112749 345762 task_exit.go:204] [ 877: 879] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.112786 345762 task_exit.go:204] [ 877: 879] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.112805 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.112841 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.112852 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.113051 345762 task_exit.go:204] [ 877: 877] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.113717 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.115051 345762 syscalls.go:262] [ 882: 882] Allocating stack with size of 8388608 bytes D0713 08:45:20.115135 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.116376 345762 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.116407 345762 usertrap_amd64.go:106] [ 882: 882] Map a usertrap vma at 67000 D0713 08:45:20.116510 345762 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc001ded8f0 1 D0713 08:45:20.116544 345762 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:20.117546 345762 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.117570 345762 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc001ded8f0 2 D0713 08:45:20.117578 345762 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:20.118587 345762 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.118606 345762 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc001ded8f0 3 D0713 08:45:20.118614 345762 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:20.124996 345762 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.125069 345762 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc001ded8f0 4 D0713 08:45:20.125090 345762 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:20.126245 345762 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.126270 345762 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc001ded8f0 5 D0713 08:45:20.126283 345762 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:20.126359 345762 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.126379 345762 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc001ded8f0 6 D0713 08:45:20.126392 345762 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:20.126673 345762 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.126703 345762 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc001ded8f0 7 D0713 08:45:20.126714 345762 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:20.126858 345762 usertrap_amd64.go:212] [ 882: 883] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.126880 345762 usertrap_amd64.go:122] [ 882: 883] Allocate a new trap: 0xc001ded8f0 8 D0713 08:45:20.126890 345762 usertrap_amd64.go:225] [ 882: 883] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:20.127093 345762 usertrap_amd64.go:212] [ 882: 883] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.127130 345762 usertrap_amd64.go:122] [ 882: 883] Allocate a new trap: 0xc001ded8f0 9 D0713 08:45:20.127143 345762 usertrap_amd64.go:225] [ 882: 883] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:20.127367 345762 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.127419 345762 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc001ded8f0 10 D0713 08:45:20.127453 345762 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) executing program D0713 08:45:20.135652 345762 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.135710 345762 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc001ded8f0 11 D0713 08:45:20.135726 345762 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:20.138703 345762 usertrap_amd64.go:212] [ 882: 883] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.138764 345762 usertrap_amd64.go:122] [ 882: 883] Allocate a new trap: 0xc001ded8f0 12 D0713 08:45:20.138780 345762 usertrap_amd64.go:225] [ 882: 883] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:20.138842 345762 usertrap_amd64.go:212] [ 882: 883] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.138864 345762 usertrap_amd64.go:122] [ 882: 883] Allocate a new trap: 0xc001ded8f0 13 D0713 08:45:20.138870 345762 usertrap_amd64.go:225] [ 882: 883] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:20.138899 345762 task_signals.go:470] [ 882: 882] Notified of signal 23 D0713 08:45:20.138986 345762 task_signals.go:220] [ 882: 882] Signal 23: delivering to handler D0713 08:45:20.147529 345762 usertrap_amd64.go:212] [ 882: 882] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.147571 345762 usertrap_amd64.go:122] [ 882: 882] Allocate a new trap: 0xc001ded8f0 14 D0713 08:45:20.147586 345762 usertrap_amd64.go:225] [ 882: 882] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:20.147654 345762 task_exit.go:204] [ 882: 882] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.147678 345762 task_exit.go:204] [ 882: 882] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.147712 345762 task_signals.go:204] [ 882: 886] Signal 882, PID: 886, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.147710 345762 task_signals.go:204] [ 882: 884] Signal 882, PID: 884, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.147739 345762 task_signals.go:204] [ 882: 887] Signal 882, PID: 887, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.147740 345762 task_exit.go:204] [ 882: 884] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.147757 345762 task_exit.go:204] [ 882: 884] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.147766 345762 task_exit.go:204] [ 882: 884] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.147740 345762 task_signals.go:204] [ 882: 883] Signal 882, PID: 883, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.147784 345762 task_signals.go:204] [ 882: 885] Signal 882, PID: 885, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.147790 345762 task_exit.go:204] [ 882: 887] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.147826 345762 task_exit.go:204] [ 882: 887] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.147841 345762 task_exit.go:204] [ 882: 887] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.147863 345762 task_exit.go:204] [ 882: 886] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.147881 345762 task_exit.go:204] [ 882: 886] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.147887 345762 task_exit.go:204] [ 882: 886] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.147900 345762 task_exit.go:204] [ 882: 885] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.147918 345762 task_exit.go:204] [ 882: 885] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.147922 345762 task_exit.go:204] [ 882: 885] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.147940 345762 task_exit.go:204] [ 882: 883] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.149905 345762 task_exit.go:204] [ 882: 883] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.149953 345762 task_exit.go:204] [ 882: 883] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.149973 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.150013 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.150023 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.150099 345762 task_exit.go:204] [ 882: 882] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.150966 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.152573 345762 syscalls.go:262] [ 888: 888] Allocating stack with size of 8388608 bytes D0713 08:45:20.152707 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.154825 345762 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.154869 345762 usertrap_amd64.go:106] [ 888: 888] Map a usertrap vma at 63000 D0713 08:45:20.154952 345762 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc001f49290 1 D0713 08:45:20.154980 345762 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:20.155365 345762 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.155392 345762 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc001f49290 2 D0713 08:45:20.155400 345762 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:20.155904 345762 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.155929 345762 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc001f49290 3 D0713 08:45:20.155940 345762 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:20.164600 345762 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.164688 345762 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc001f49290 4 D0713 08:45:20.164715 345762 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:20.166154 345762 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.166220 345762 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc001f49290 5 D0713 08:45:20.166241 345762 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:20.166312 345762 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.166334 345762 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc001f49290 6 D0713 08:45:20.166342 345762 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:20.166961 345762 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.167000 345762 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc001f49290 7 D0713 08:45:20.167013 345762 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:20.167287 345762 usertrap_amd64.go:212] [ 888: 889] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.167316 345762 usertrap_amd64.go:122] [ 888: 889] Allocate a new trap: 0xc001f49290 8 D0713 08:45:20.167330 345762 usertrap_amd64.go:225] [ 888: 889] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:20.167565 345762 usertrap_amd64.go:212] [ 888: 889] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.167593 345762 usertrap_amd64.go:122] [ 888: 889] Allocate a new trap: 0xc001f49290 9 D0713 08:45:20.167608 345762 usertrap_amd64.go:225] [ 888: 889] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:20.167755 345762 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.167799 345762 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc001f49290 10 D0713 08:45:20.167819 345762 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:20.167929 345762 usertrap_amd64.go:212] [ 888: 891] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:20.167960 345762 usertrap_amd64.go:122] [ 888: 891] Allocate a new trap: 0xc001f49290 11 D0713 08:45:20.168018 345762 usertrap_amd64.go:225] [ 888: 891] Apply the binary patch addr 46b6e0 trap addr 63370 ([184 24 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:20.168530 345762 usertrap_amd64.go:212] [ 888: 889] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.168573 345762 usertrap_amd64.go:122] [ 888: 889] Allocate a new trap: 0xc001f49290 12 D0713 08:45:20.168590 345762 usertrap_amd64.go:225] [ 888: 889] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:20.168649 345762 usertrap_amd64.go:212] [ 888: 889] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.168667 345762 usertrap_amd64.go:122] [ 888: 889] Allocate a new trap: 0xc001f49290 13 D0713 08:45:20.168678 345762 usertrap_amd64.go:225] [ 888: 889] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:20.168700 345762 task_signals.go:470] [ 888: 888] Notified of signal 23 D0713 08:45:20.168829 345762 task_signals.go:220] [ 888: 888] Signal 23: delivering to handler D0713 08:45:20.175610 345762 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.175640 345762 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc001f49290 14 D0713 08:45:20.175653 345762 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46af29 trap addr 63460 ([184 37 1 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:20.180134 345762 task_signals.go:470] [ 888: 888] Notified of signal 23 D0713 08:45:20.180223 345762 task_signals.go:220] [ 888: 888] Signal 23: delivering to handler D0713 08:45:20.187568 345762 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.187646 345762 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc001f49290 15 D0713 08:45:20.187672 345762 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0713 08:45:20.187769 345762 task_exit.go:204] [ 888: 888] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.187815 345762 task_exit.go:204] [ 888: 888] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.187819 345762 task_signals.go:204] [ 888: 891] Signal 888, PID: 891, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.187860 345762 task_signals.go:204] [ 888: 892] Signal 888, PID: 892, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.187861 345762 task_exit.go:204] [ 888: 891] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.187913 345762 task_exit.go:204] [ 888: 891] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.187922 345762 task_exit.go:204] [ 888: 891] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.187863 345762 task_signals.go:204] [ 888: 890] Signal 888, PID: 890, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.187943 345762 task_exit.go:204] [ 888: 890] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.187952 345762 task_exit.go:204] [ 888: 890] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.187958 345762 task_exit.go:204] [ 888: 890] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.187985 345762 task_signals.go:204] [ 888: 889] Signal 888, PID: 889, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.187998 345762 task_exit.go:204] [ 888: 889] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.188007 345762 task_exit.go:204] [ 888: 889] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.188014 345762 task_exit.go:204] [ 888: 889] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.188027 345762 task_exit.go:204] [ 888: 892] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.189893 345762 task_exit.go:204] [ 888: 892] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.189954 345762 task_exit.go:204] [ 888: 892] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.189974 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.190039 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.190071 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.190163 345762 task_exit.go:204] [ 888: 888] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.190303 345762 task_signals.go:470] [ 5: 21] Notified of signal 23 D0713 08:45:20.190437 345762 task_signals.go:220] [ 5: 21] Signal 23: delivering to handler D0713 08:45:20.191958 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.193840 345762 syscalls.go:262] [ 893: 893] Allocating stack with size of 8388608 bytes D0713 08:45:20.193955 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.195079 345762 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.195123 345762 usertrap_amd64.go:106] [ 893: 893] Map a usertrap vma at 67000 D0713 08:45:20.195222 345762 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc0012e8570 1 D0713 08:45:20.195260 345762 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:20.195720 345762 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.195751 345762 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc0012e8570 2 D0713 08:45:20.195762 345762 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:20.196516 345762 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.196558 345762 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc0012e8570 3 D0713 08:45:20.196574 345762 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:20.203994 345762 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.204157 345762 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc0012e8570 4 D0713 08:45:20.204197 345762 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:20.205693 345762 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.205752 345762 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc0012e8570 5 D0713 08:45:20.205763 345762 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:20.205881 345762 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.205898 345762 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc0012e8570 6 D0713 08:45:20.205904 345762 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:20.206260 345762 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.206280 345762 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc0012e8570 7 D0713 08:45:20.206287 345762 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:20.206404 345762 usertrap_amd64.go:212] [ 893: 894] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.206418 345762 usertrap_amd64.go:122] [ 893: 894] Allocate a new trap: 0xc0012e8570 8 D0713 08:45:20.206428 345762 usertrap_amd64.go:225] [ 893: 894] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:20.206690 345762 usertrap_amd64.go:212] [ 893: 894] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.206748 345762 usertrap_amd64.go:122] [ 893: 894] Allocate a new trap: 0xc0012e8570 9 D0713 08:45:20.206772 345762 usertrap_amd64.go:225] [ 893: 894] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:20.206804 345762 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.206824 345762 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc0012e8570 10 D0713 08:45:20.206844 345762 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:20.215566 345762 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.215619 345762 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc0012e8570 11 D0713 08:45:20.215633 345762 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:20.218300 345762 usertrap_amd64.go:212] [ 893: 894] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.218378 345762 usertrap_amd64.go:122] [ 893: 894] Allocate a new trap: 0xc0012e8570 12 D0713 08:45:20.218398 345762 usertrap_amd64.go:225] [ 893: 894] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:20.218611 345762 usertrap_amd64.go:212] [ 893: 894] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.218643 345762 usertrap_amd64.go:122] [ 893: 894] Allocate a new trap: 0xc0012e8570 13 D0713 08:45:20.218657 345762 usertrap_amd64.go:225] [ 893: 894] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:20.218705 345762 task_signals.go:470] [ 893: 893] Notified of signal 23 D0713 08:45:20.218825 345762 task_signals.go:220] [ 893: 893] Signal 23: delivering to handler D0713 08:45:20.227213 345762 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.227259 345762 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc0012e8570 14 D0713 08:45:20.227273 345762 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:20.227342 345762 task_exit.go:204] [ 893: 893] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.227392 345762 task_exit.go:204] [ 893: 893] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.227427 345762 task_signals.go:204] [ 893: 896] Signal 893, PID: 896, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.227467 345762 task_exit.go:204] [ 893: 896] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.227456 345762 task_signals.go:204] [ 893: 895] Signal 893, PID: 895, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.227480 345762 task_exit.go:204] [ 893: 896] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.227492 345762 task_exit.go:204] [ 893: 896] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.227436 345762 task_signals.go:204] [ 893: 894] Signal 893, PID: 894, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.227511 345762 task_exit.go:204] [ 893: 894] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.227518 345762 task_exit.go:204] [ 893: 894] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.227523 345762 task_exit.go:204] [ 893: 894] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.227454 345762 task_signals.go:204] [ 893: 897] Signal 893, PID: 897, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.227534 345762 task_exit.go:204] [ 893: 897] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.227540 345762 task_exit.go:204] [ 893: 897] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.227545 345762 task_exit.go:204] [ 893: 897] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.227558 345762 task_exit.go:204] [ 893: 895] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.229640 345762 task_exit.go:204] [ 893: 895] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.229686 345762 task_exit.go:204] [ 893: 895] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.229746 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.229955 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.230013 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.230129 345762 task_exit.go:204] [ 893: 893] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.231338 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.232902 345762 syscalls.go:262] [ 898: 898] Allocating stack with size of 8388608 bytes D0713 08:45:20.233082 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.234575 345762 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.234633 345762 usertrap_amd64.go:106] [ 898: 898] Map a usertrap vma at 64000 D0713 08:45:20.234736 345762 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc0012e8750 1 D0713 08:45:20.234764 345762 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:20.235246 345762 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.235270 345762 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc0012e8750 2 D0713 08:45:20.235282 345762 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:20.236163 345762 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.236198 345762 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc0012e8750 3 D0713 08:45:20.236212 345762 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:20.243103 345762 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.243144 345762 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc0012e8750 4 D0713 08:45:20.243158 345762 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:20.244514 345762 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.244552 345762 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc0012e8750 5 D0713 08:45:20.244568 345762 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:20.244646 345762 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.244652 345762 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc0012e8750 6 D0713 08:45:20.244659 345762 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:20.245279 345762 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.245301 345762 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc0012e8750 7 D0713 08:45:20.245309 345762 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:20.245516 345762 usertrap_amd64.go:212] [ 898: 899] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.245555 345762 usertrap_amd64.go:122] [ 898: 899] Allocate a new trap: 0xc0012e8750 8 D0713 08:45:20.245573 345762 usertrap_amd64.go:225] [ 898: 899] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:20.245734 345762 usertrap_amd64.go:212] [ 898: 899] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.245755 345762 usertrap_amd64.go:122] [ 898: 899] Allocate a new trap: 0xc0012e8750 9 D0713 08:45:20.245767 345762 usertrap_amd64.go:225] [ 898: 899] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:20.245853 345762 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.245871 345762 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc0012e8750 10 D0713 08:45:20.245880 345762 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:20.246589 345762 usertrap_amd64.go:212] [ 898: 899] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.246617 345762 usertrap_amd64.go:122] [ 898: 899] Allocate a new trap: 0xc0012e8750 11 D0713 08:45:20.246630 345762 usertrap_amd64.go:225] [ 898: 899] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:20.246731 345762 usertrap_amd64.go:212] [ 898: 899] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.246756 345762 usertrap_amd64.go:122] [ 898: 899] Allocate a new trap: 0xc0012e8750 12 D0713 08:45:20.246770 345762 usertrap_amd64.go:225] [ 898: 899] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:20.246833 345762 task_signals.go:470] [ 898: 898] Notified of signal 23 D0713 08:45:20.246872 345762 task_signals.go:220] [ 898: 898] Signal 23: delivering to handler D0713 08:45:20.254421 345762 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.254450 345762 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc0012e8750 13 D0713 08:45:20.254461 345762 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:20.257186 345762 task_signals.go:470] [ 898: 898] Notified of signal 23 D0713 08:45:20.257260 345762 task_signals.go:220] [ 898: 898] Signal 23: delivering to handler D0713 08:45:20.265679 345762 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.265717 345762 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc0012e8750 14 D0713 08:45:20.265730 345762 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:20.265793 345762 task_exit.go:204] [ 898: 898] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.265826 345762 task_exit.go:204] [ 898: 898] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.265849 345762 task_signals.go:204] [ 898: 901] Signal 898, PID: 901, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.265848 345762 task_signals.go:204] [ 898: 900] Signal 898, PID: 900, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.265869 345762 task_exit.go:204] [ 898: 901] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.265901 345762 task_exit.go:204] [ 898: 901] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.265915 345762 task_exit.go:204] [ 898: 901] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.265943 345762 task_signals.go:204] [ 898: 899] Signal 898, PID: 899, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.265957 345762 task_exit.go:204] [ 898: 900] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.265991 345762 task_exit.go:204] [ 898: 900] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.266000 345762 task_exit.go:204] [ 898: 900] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.266027 345762 task_signals.go:204] [ 898: 902] Signal 898, PID: 902, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.266047 345762 task_exit.go:204] [ 898: 902] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.266055 345762 task_exit.go:204] [ 898: 899] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.266098 345762 task_exit.go:204] [ 898: 899] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.266126 345762 task_exit.go:204] [ 898: 899] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.267759 345762 task_exit.go:204] [ 898: 902] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.267785 345762 task_exit.go:204] [ 898: 902] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.267800 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.267871 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.267896 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.267963 345762 task_exit.go:204] [ 898: 898] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.268610 345762 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.270385 345762 syscalls.go:262] [ 903: 903] Allocating stack with size of 8388608 bytes D0713 08:45:20.270502 345762 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.272490 345762 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.272526 345762 usertrap_amd64.go:106] [ 903: 903] Map a usertrap vma at 65000 D0713 08:45:20.272607 345762 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc0012e8bd0 1 D0713 08:45:20.272632 345762 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:20.272978 345762 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.273005 345762 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc0012e8bd0 2 D0713 08:45:20.273013 345762 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:20.273692 345762 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.273719 345762 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc0012e8bd0 3 D0713 08:45:20.273728 345762 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:20.280462 345762 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.280493 345762 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc0012e8bd0 4 D0713 08:45:20.280503 345762 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:20.281728 345762 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.281769 345762 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc0012e8bd0 5 D0713 08:45:20.281783 345762 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:20.281883 345762 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.281905 345762 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc0012e8bd0 6 D0713 08:45:20.281916 345762 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:20.282560 345762 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.282583 345762 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc0012e8bd0 7 D0713 08:45:20.282593 345762 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:20.282827 345762 usertrap_amd64.go:212] [ 903: 904] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.282843 345762 usertrap_amd64.go:122] [ 903: 904] Allocate a new trap: 0xc0012e8bd0 8 D0713 08:45:20.282852 345762 usertrap_amd64.go:225] [ 903: 904] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:20.283061 345762 usertrap_amd64.go:212] [ 903: 904] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.283123 345762 usertrap_amd64.go:122] [ 903: 904] Allocate a new trap: 0xc0012e8bd0 9 D0713 08:45:20.283141 345762 usertrap_amd64.go:225] [ 903: 904] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:20.283438 345762 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.283481 345762 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc0012e8bd0 10 D0713 08:45:20.283503 345762 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:20.291196 345762 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.291229 345762 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc0012e8bd0 11 D0713 08:45:20.291240 345762 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:20.293922 345762 usertrap_amd64.go:212] [ 903: 904] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.293942 345762 usertrap_amd64.go:122] [ 903: 904] Allocate a new trap: 0xc0012e8bd0 12 D0713 08:45:20.293965 345762 usertrap_amd64.go:225] [ 903: 904] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:20.294046 345762 usertrap_amd64.go:212] [ 903: 904] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.294071 345762 usertrap_amd64.go:122] [ 903: 904] Allocate a new trap: 0xc0012e8bd0 13 D0713 08:45:20.294081 345762 usertrap_amd64.go:225] [ 903: 904] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:20.294130 345762 task_signals.go:470] [ 903: 903] Notified of signal 23 D0713 08:45:20.294212 345762 task_signals.go:220] [ 903: 903] Signal 23: delivering to handler D0713 08:45:20.302224 345762 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.302278 345762 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc0012e8bd0 14 D0713 08:45:20.302295 345762 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:20.302367 345762 task_exit.go:204] [ 903: 903] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.302404 345762 task_signals.go:204] [ 903: 905] Signal 903, PID: 905, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.302427 345762 task_signals.go:204] [ 903: 907] Signal 903, PID: 907, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.302471 345762 task_exit.go:204] [ 903: 903] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.302499 345762 task_signals.go:204] [ 903: 904] Signal 903, PID: 904, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.302511 345762 task_signals.go:204] [ 903: 906] Signal 903, PID: 906, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.302518 345762 task_exit.go:204] [ 903: 904] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.302526 345762 task_exit.go:204] [ 903: 906] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.302544 345762 task_exit.go:204] [ 903: 904] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.302550 345762 task_exit.go:204] [ 903: 904] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.302573 345762 task_exit.go:204] [ 903: 905] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.302589 345762 task_exit.go:204] [ 903: 905] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.302602 345762 task_exit.go:204] [ 903: 905] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.302620 345762 task_exit.go:204] [ 903: 906] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.302652 345762 task_exit.go:204] [ 903: 906] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.302673 345762 task_exit.go:204] [ 903: 907] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.304400 345762 task_exit.go:204] [ 903: 907] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.304430 345762 task_exit.go:204] [ 903: 907] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.304441 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.304471 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.304480 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.304723 345762 task_exit.go:204] [ 903: 903] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.305011 345762 task_signals.go:470] [ 5: 15] Notified of signal 23 D0713 08:45:20.305198 345762 task_signals.go:220] [ 5: 15] Signal 23: delivering to handler D0713 08:45:20.305790 345762 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.307721 345762 syscalls.go:262] [ 908: 908] Allocating stack with size of 8388608 bytes D0713 08:45:20.307862 345762 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.309234 345762 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.309348 345762 usertrap_amd64.go:106] [ 908: 908] Map a usertrap vma at 69000 D0713 08:45:20.309490 345762 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc001a4ac90 1 D0713 08:45:20.309569 345762 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:20.310627 345762 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.310676 345762 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc001a4ac90 2 D0713 08:45:20.310693 345762 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:20.311758 345762 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.311791 345762 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc001a4ac90 3 D0713 08:45:20.311809 345762 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:20.318816 345762 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.318853 345762 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc001a4ac90 4 D0713 08:45:20.318864 345762 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:20.320582 345762 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.320659 345762 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc001a4ac90 5 D0713 08:45:20.320685 345762 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:20.320757 345762 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.320779 345762 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc001a4ac90 6 D0713 08:45:20.320789 345762 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:20.321310 345762 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.321329 345762 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc001a4ac90 7 D0713 08:45:20.321336 345762 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:20.321542 345762 usertrap_amd64.go:212] [ 908: 909] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.321551 345762 usertrap_amd64.go:122] [ 908: 909] Allocate a new trap: 0xc001a4ac90 8 D0713 08:45:20.321557 345762 usertrap_amd64.go:225] [ 908: 909] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:20.321851 345762 usertrap_amd64.go:212] [ 908: 909] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.321925 345762 usertrap_amd64.go:122] [ 908: 909] Allocate a new trap: 0xc001a4ac90 9 D0713 08:45:20.321946 345762 usertrap_amd64.go:225] [ 908: 909] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:20.321967 345762 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.321988 345762 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc001a4ac90 10 D0713 08:45:20.321997 345762 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:20.331048 345762 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.331095 345762 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc001a4ac90 11 D0713 08:45:20.331111 345762 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:20.333778 345762 usertrap_amd64.go:212] [ 908: 909] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.333838 345762 usertrap_amd64.go:122] [ 908: 909] Allocate a new trap: 0xc001a4ac90 12 D0713 08:45:20.333862 345762 usertrap_amd64.go:225] [ 908: 909] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:20.333919 345762 usertrap_amd64.go:212] [ 908: 909] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.333972 345762 usertrap_amd64.go:122] [ 908: 909] Allocate a new trap: 0xc001a4ac90 13 D0713 08:45:20.333987 345762 usertrap_amd64.go:225] [ 908: 909] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:20.334053 345762 task_signals.go:470] [ 908: 908] Notified of signal 23 D0713 08:45:20.334163 345762 task_signals.go:220] [ 908: 908] Signal 23: delivering to handler D0713 08:45:20.343028 345762 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.343070 345762 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc001a4ac90 14 D0713 08:45:20.343083 345762 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:20.343169 345762 task_exit.go:204] [ 908: 908] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.343196 345762 task_exit.go:204] [ 908: 908] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.343224 345762 task_signals.go:204] [ 908: 911] Signal 908, PID: 911, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.343246 345762 task_exit.go:204] [ 908: 911] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.343253 345762 task_exit.go:204] [ 908: 911] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.343258 345762 task_exit.go:204] [ 908: 911] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.343244 345762 task_signals.go:204] [ 908: 910] Signal 908, PID: 910, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.343330 345762 task_exit.go:204] [ 908: 910] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.343360 345762 task_exit.go:204] [ 908: 910] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.343370 345762 task_exit.go:204] [ 908: 910] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.343277 345762 task_signals.go:204] [ 908: 912] Signal 908, PID: 912, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.343396 345762 task_exit.go:204] [ 908: 912] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.343296 345762 task_signals.go:204] [ 908: 909] Signal 908, PID: 909, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.343402 345762 task_exit.go:204] [ 908: 912] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.343435 345762 task_exit.go:204] [ 908: 912] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.343476 345762 task_exit.go:204] [ 908: 909] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.345138 345762 task_exit.go:204] [ 908: 909] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.345174 345762 task_exit.go:204] [ 908: 909] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.345189 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.345305 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.345354 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.345490 345762 task_exit.go:204] [ 908: 908] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.346341 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.348094 345762 syscalls.go:262] [ 913: 913] Allocating stack with size of 8388608 bytes D0713 08:45:20.348403 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.349726 345762 usertrap_amd64.go:212] [ 913: 913] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.349768 345762 usertrap_amd64.go:106] [ 913: 913] Map a usertrap vma at 61000 D0713 08:45:20.349873 345762 usertrap_amd64.go:122] [ 913: 913] Allocate a new trap: 0xc0004ccd80 1 D0713 08:45:20.349905 345762 usertrap_amd64.go:225] [ 913: 913] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:20.350359 345762 usertrap_amd64.go:212] [ 913: 913] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.350383 345762 usertrap_amd64.go:122] [ 913: 913] Allocate a new trap: 0xc0004ccd80 2 D0713 08:45:20.350394 345762 usertrap_amd64.go:225] [ 913: 913] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:20.351096 345762 usertrap_amd64.go:212] [ 913: 913] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.351127 345762 usertrap_amd64.go:122] [ 913: 913] Allocate a new trap: 0xc0004ccd80 3 D0713 08:45:20.351142 345762 usertrap_amd64.go:225] [ 913: 913] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:45:20.356224 345762 usertrap_amd64.go:212] [ 913: 913] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.356252 345762 usertrap_amd64.go:122] [ 913: 913] Allocate a new trap: 0xc0004ccd80 4 D0713 08:45:20.356262 345762 usertrap_amd64.go:225] [ 913: 913] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:45:20.357914 345762 usertrap_amd64.go:212] [ 913: 913] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.357952 345762 usertrap_amd64.go:122] [ 913: 913] Allocate a new trap: 0xc0004ccd80 5 D0713 08:45:20.357965 345762 usertrap_amd64.go:225] [ 913: 913] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:45:20.358054 345762 usertrap_amd64.go:212] [ 913: 913] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.358076 345762 usertrap_amd64.go:122] [ 913: 913] Allocate a new trap: 0xc0004ccd80 6 D0713 08:45:20.358090 345762 usertrap_amd64.go:225] [ 913: 913] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:45:20.358449 345762 usertrap_amd64.go:212] [ 913: 913] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.358461 345762 usertrap_amd64.go:122] [ 913: 913] Allocate a new trap: 0xc0004ccd80 7 D0713 08:45:20.358471 345762 usertrap_amd64.go:225] [ 913: 913] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:45:20.358701 345762 usertrap_amd64.go:212] [ 913: 914] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.358723 345762 usertrap_amd64.go:122] [ 913: 914] Allocate a new trap: 0xc0004ccd80 8 D0713 08:45:20.358735 345762 usertrap_amd64.go:225] [ 913: 914] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:45:20.358900 345762 usertrap_amd64.go:212] [ 913: 914] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.358926 345762 usertrap_amd64.go:122] [ 913: 914] Allocate a new trap: 0xc0004ccd80 9 D0713 08:45:20.358937 345762 usertrap_amd64.go:225] [ 913: 914] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:45:20.359085 345762 usertrap_amd64.go:212] [ 913: 913] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.359110 345762 usertrap_amd64.go:122] [ 913: 913] Allocate a new trap: 0xc0004ccd80 10 D0713 08:45:20.359122 345762 usertrap_amd64.go:225] [ 913: 913] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:45:20.368448 345762 usertrap_amd64.go:212] [ 913: 913] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.368472 345762 usertrap_amd64.go:122] [ 913: 913] Allocate a new trap: 0xc0004ccd80 11 D0713 08:45:20.368482 345762 usertrap_amd64.go:225] [ 913: 913] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:45:20.369210 345762 usertrap_amd64.go:212] [ 913: 914] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.369237 345762 usertrap_amd64.go:122] [ 913: 914] Allocate a new trap: 0xc0004ccd80 12 D0713 08:45:20.369248 345762 usertrap_amd64.go:225] [ 913: 914] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:45:20.369293 345762 usertrap_amd64.go:212] [ 913: 914] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.369307 345762 usertrap_amd64.go:122] [ 913: 914] Allocate a new trap: 0xc0004ccd80 13 D0713 08:45:20.369314 345762 usertrap_amd64.go:225] [ 913: 914] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:45:20.371145 345762 task_signals.go:470] [ 913: 913] Notified of signal 23 D0713 08:45:20.371169 345762 task_signals.go:220] [ 913: 913] Signal 23: delivering to handler D0713 08:45:20.379531 345762 usertrap_amd64.go:212] [ 913: 913] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.379617 345762 usertrap_amd64.go:122] [ 913: 913] Allocate a new trap: 0xc0004ccd80 14 D0713 08:45:20.379647 345762 usertrap_amd64.go:225] [ 913: 913] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:45:20.379743 345762 task_exit.go:204] [ 913: 913] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.379798 345762 task_exit.go:204] [ 913: 913] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.379838 345762 task_signals.go:204] [ 913: 916] Signal 913, PID: 916, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.379874 345762 task_exit.go:204] [ 913: 916] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.379872 345762 task_signals.go:204] [ 913: 917] Signal 913, PID: 917, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.379880 345762 task_exit.go:204] [ 913: 916] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.379896 345762 task_exit.go:204] [ 913: 916] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.379841 345762 task_signals.go:204] [ 913: 915] Signal 913, PID: 915, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.379964 345762 task_exit.go:204] [ 913: 915] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.379991 345762 task_exit.go:204] [ 913: 915] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.379999 345762 task_exit.go:204] [ 913: 915] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.379871 345762 task_signals.go:204] [ 913: 914] Signal 913, PID: 914, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.380051 345762 task_exit.go:204] [ 913: 917] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.380149 345762 task_exit.go:204] [ 913: 917] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.380242 345762 task_exit.go:204] [ 913: 917] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.380296 345762 task_exit.go:204] [ 913: 914] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.382230 345762 task_exit.go:204] [ 913: 914] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.382266 345762 task_exit.go:204] [ 913: 914] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.382282 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.382357 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.382387 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.382434 345762 task_exit.go:204] [ 913: 913] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.383452 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.384999 345762 syscalls.go:262] [ 918: 918] Allocating stack with size of 8388608 bytes D0713 08:45:20.385166 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.386502 345762 usertrap_amd64.go:212] [ 918: 918] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.386548 345762 usertrap_amd64.go:106] [ 918: 918] Map a usertrap vma at 65000 D0713 08:45:20.386639 345762 usertrap_amd64.go:122] [ 918: 918] Allocate a new trap: 0xc0009921b0 1 D0713 08:45:20.386678 345762 usertrap_amd64.go:225] [ 918: 918] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:20.387200 345762 usertrap_amd64.go:212] [ 918: 918] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.387222 345762 usertrap_amd64.go:122] [ 918: 918] Allocate a new trap: 0xc0009921b0 2 D0713 08:45:20.387232 345762 usertrap_amd64.go:225] [ 918: 918] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:20.387910 345762 usertrap_amd64.go:212] [ 918: 918] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.387929 345762 usertrap_amd64.go:122] [ 918: 918] Allocate a new trap: 0xc0009921b0 3 D0713 08:45:20.387938 345762 usertrap_amd64.go:225] [ 918: 918] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:20.394046 345762 usertrap_amd64.go:212] [ 918: 918] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.394100 345762 usertrap_amd64.go:122] [ 918: 918] Allocate a new trap: 0xc0009921b0 4 D0713 08:45:20.394113 345762 usertrap_amd64.go:225] [ 918: 918] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:20.395686 345762 usertrap_amd64.go:212] [ 918: 918] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.395729 345762 usertrap_amd64.go:122] [ 918: 918] Allocate a new trap: 0xc0009921b0 5 D0713 08:45:20.395746 345762 usertrap_amd64.go:225] [ 918: 918] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:20.395885 345762 usertrap_amd64.go:212] [ 918: 918] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.395905 345762 usertrap_amd64.go:122] [ 918: 918] Allocate a new trap: 0xc0009921b0 6 D0713 08:45:20.395916 345762 usertrap_amd64.go:225] [ 918: 918] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:20.396935 345762 usertrap_amd64.go:212] [ 918: 918] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.396986 345762 usertrap_amd64.go:122] [ 918: 918] Allocate a new trap: 0xc0009921b0 7 D0713 08:45:20.396997 345762 usertrap_amd64.go:225] [ 918: 918] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:20.397286 345762 usertrap_amd64.go:212] [ 918: 919] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.397324 345762 usertrap_amd64.go:122] [ 918: 919] Allocate a new trap: 0xc0009921b0 8 D0713 08:45:20.397342 345762 usertrap_amd64.go:225] [ 918: 919] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:20.397660 345762 usertrap_amd64.go:212] [ 918: 919] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.397728 345762 usertrap_amd64.go:122] [ 918: 919] Allocate a new trap: 0xc0009921b0 9 D0713 08:45:20.397753 345762 usertrap_amd64.go:225] [ 918: 919] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:20.397838 345762 usertrap_amd64.go:212] [ 918: 918] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.397878 345762 usertrap_amd64.go:122] [ 918: 918] Allocate a new trap: 0xc0009921b0 10 D0713 08:45:20.397898 345762 usertrap_amd64.go:225] [ 918: 918] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:20.407116 345762 usertrap_amd64.go:212] [ 918: 918] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.407137 345762 usertrap_amd64.go:122] [ 918: 918] Allocate a new trap: 0xc0009921b0 11 D0713 08:45:20.407151 345762 usertrap_amd64.go:225] [ 918: 918] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:20.409944 345762 usertrap_amd64.go:212] [ 918: 919] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.410039 345762 usertrap_amd64.go:122] [ 918: 919] Allocate a new trap: 0xc0009921b0 12 D0713 08:45:20.410060 345762 usertrap_amd64.go:225] [ 918: 919] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:20.410284 345762 usertrap_amd64.go:212] [ 918: 919] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.410310 345762 usertrap_amd64.go:122] [ 918: 919] Allocate a new trap: 0xc0009921b0 13 D0713 08:45:20.410324 345762 usertrap_amd64.go:225] [ 918: 919] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:20.410386 345762 task_signals.go:470] [ 918: 918] Notified of signal 23 D0713 08:45:20.410486 345762 task_signals.go:220] [ 918: 918] Signal 23: delivering to handler D0713 08:45:20.419621 345762 usertrap_amd64.go:212] [ 918: 918] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.419680 345762 usertrap_amd64.go:122] [ 918: 918] Allocate a new trap: 0xc0009921b0 14 D0713 08:45:20.419710 345762 usertrap_amd64.go:225] [ 918: 918] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:20.419823 345762 task_exit.go:204] [ 918: 918] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.419862 345762 task_exit.go:204] [ 918: 918] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.419882 345762 task_signals.go:204] [ 918: 920] Signal 918, PID: 920, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.419917 345762 task_signals.go:204] [ 918: 919] Signal 918, PID: 919, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.419922 345762 task_exit.go:204] [ 918: 920] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.419943 345762 task_exit.go:204] [ 918: 920] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.419948 345762 task_exit.go:204] [ 918: 920] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.419897 345762 task_signals.go:204] [ 918: 921] Signal 918, PID: 921, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.419979 345762 task_exit.go:204] [ 918: 921] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.419988 345762 task_signals.go:204] [ 918: 922] Signal 918, PID: 922, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.420008 345762 task_exit.go:204] [ 918: 921] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.420014 345762 task_exit.go:204] [ 918: 921] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.420022 345762 task_exit.go:204] [ 918: 922] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.420053 345762 task_exit.go:204] [ 918: 922] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.420068 345762 task_exit.go:204] [ 918: 922] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.420081 345762 task_exit.go:204] [ 918: 919] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.421772 345762 task_exit.go:204] [ 918: 919] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.421796 345762 task_exit.go:204] [ 918: 919] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.421811 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.421875 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.421899 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.422028 345762 task_exit.go:204] [ 918: 918] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.422659 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.424859 345762 syscalls.go:262] [ 923: 923] Allocating stack with size of 8388608 bytes D0713 08:45:20.425117 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.426983 345762 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.427077 345762 usertrap_amd64.go:106] [ 923: 923] Map a usertrap vma at 65000 D0713 08:45:20.427177 345762 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000992210 1 D0713 08:45:20.427226 345762 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:20.427854 345762 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.427912 345762 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000992210 2 D0713 08:45:20.427929 345762 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:20.428620 345762 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.428640 345762 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000992210 3 D0713 08:45:20.428655 345762 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:20.437671 345762 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.437705 345762 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000992210 4 D0713 08:45:20.437721 345762 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:20.439020 345762 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.439083 345762 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000992210 5 D0713 08:45:20.439098 345762 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:20.439160 345762 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.439172 345762 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000992210 6 D0713 08:45:20.439179 345762 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:20.439570 345762 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.439588 345762 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000992210 7 D0713 08:45:20.439594 345762 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:20.439778 345762 usertrap_amd64.go:212] [ 923: 924] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.439810 345762 usertrap_amd64.go:122] [ 923: 924] Allocate a new trap: 0xc000992210 8 D0713 08:45:20.439827 345762 usertrap_amd64.go:225] [ 923: 924] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:20.440264 345762 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.440287 345762 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000992210 9 D0713 08:45:20.440302 345762 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:20.440330 345762 usertrap_amd64.go:212] [ 923: 924] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.440346 345762 usertrap_amd64.go:122] [ 923: 924] Allocate a new trap: 0xc000992210 10 D0713 08:45:20.440355 345762 usertrap_amd64.go:225] [ 923: 924] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:20.440579 345762 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:20.440633 345762 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000992210 11 D0713 08:45:20.440651 345762 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b6e0 trap addr 65370 ([184 24 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:20.449690 345762 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.449719 345762 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000992210 12 D0713 08:45:20.449731 345762 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46af29 trap addr 653c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:20.452638 345762 usertrap_amd64.go:212] [ 923: 924] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.452691 345762 usertrap_amd64.go:122] [ 923: 924] Allocate a new trap: 0xc000992210 13 D0713 08:45:20.452710 345762 usertrap_amd64.go:225] [ 923: 924] Apply the binary patch addr 46b020 trap addr 65410 ([184 39 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:20.452739 345762 usertrap_amd64.go:212] [ 923: 924] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.452759 345762 usertrap_amd64.go:122] [ 923: 924] Allocate a new trap: 0xc000992210 14 D0713 08:45:20.452766 345762 usertrap_amd64.go:225] [ 923: 924] Apply the binary patch addr 46b04f trap addr 65460 ([184 234 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:20.452874 345762 task_signals.go:470] [ 923: 923] Notified of signal 23 D0713 08:45:20.453041 345762 task_signals.go:220] [ 923: 923] Signal 23: delivering to handler D0713 08:45:20.460885 345762 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.460926 345762 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000992210 15 D0713 08:45:20.460964 345762 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0713 08:45:20.461088 345762 task_exit.go:204] [ 923: 923] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.461111 345762 task_exit.go:204] [ 923: 923] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.461138 345762 task_signals.go:204] [ 923: 926] Signal 923, PID: 926, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.461162 345762 task_exit.go:204] [ 923: 926] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.461170 345762 task_exit.go:204] [ 923: 926] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.461175 345762 task_exit.go:204] [ 923: 926] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.461153 345762 task_signals.go:204] [ 923: 925] Signal 923, PID: 925, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.461197 345762 task_signals.go:204] [ 923: 927] Signal 923, PID: 927, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.461219 345762 task_exit.go:204] [ 923: 925] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.461277 345762 task_signals.go:204] [ 923: 924] Signal 923, PID: 924, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.461301 345762 task_exit.go:204] [ 923: 925] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.461310 345762 task_exit.go:204] [ 923: 925] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.461327 345762 task_exit.go:204] [ 923: 927] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.461338 345762 task_exit.go:204] [ 923: 927] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.461354 345762 task_exit.go:204] [ 923: 927] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.461367 345762 task_exit.go:204] [ 923: 924] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.463246 345762 task_exit.go:204] [ 923: 924] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.463277 345762 task_exit.go:204] [ 923: 924] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.463293 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.463333 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.463362 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.463507 345762 task_exit.go:204] [ 923: 923] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.464228 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.465985 345762 syscalls.go:262] [ 928: 928] Allocating stack with size of 8388608 bytes D0713 08:45:20.466349 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.467793 345762 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.467850 345762 usertrap_amd64.go:106] [ 928: 928] Map a usertrap vma at 63000 D0713 08:45:20.468016 345762 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc0004cd3b0 1 D0713 08:45:20.468047 345762 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:20.468281 345762 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.468301 345762 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc0004cd3b0 2 D0713 08:45:20.468312 345762 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:20.469265 345762 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.469292 345762 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc0004cd3b0 3 D0713 08:45:20.469303 345762 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:20.477049 345762 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.477091 345762 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc0004cd3b0 4 D0713 08:45:20.477105 345762 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:20.478411 345762 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.478446 345762 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc0004cd3b0 5 D0713 08:45:20.478461 345762 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:20.478535 345762 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.478554 345762 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc0004cd3b0 6 D0713 08:45:20.478566 345762 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:20.479133 345762 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.479162 345762 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc0004cd3b0 7 D0713 08:45:20.479175 345762 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:20.479431 345762 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.479451 345762 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc0004cd3b0 8 D0713 08:45:20.479463 345762 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:20.479801 345762 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.479833 345762 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc0004cd3b0 9 D0713 08:45:20.479850 345762 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:20.479863 345762 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.479870 345762 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc0004cd3b0 10 D0713 08:45:20.479878 345762 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:20.480115 345762 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.480159 345762 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc0004cd3b0 11 D0713 08:45:20.480182 345762 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:20.480253 345762 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.480269 345762 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc0004cd3b0 12 D0713 08:45:20.480279 345762 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:20.480333 345762 task_signals.go:470] [ 928: 931] Notified of signal 23 D0713 08:45:20.480370 345762 task_signals.go:179] [ 928: 931] Restarting syscall 202: interrupted by signal 23 D0713 08:45:20.480384 345762 task_signals.go:220] [ 928: 931] Signal 23: delivering to handler D0713 08:45:20.488226 345762 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.488261 345762 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc0004cd3b0 13 D0713 08:45:20.488271 345762 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:20.491038 345762 task_signals.go:470] [ 928: 928] Notified of signal 23 D0713 08:45:20.491126 345762 task_signals.go:220] [ 928: 928] Signal 23: delivering to handler D0713 08:45:20.500131 345762 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.500162 345762 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc0004cd3b0 14 D0713 08:45:20.500172 345762 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:20.500242 345762 task_exit.go:204] [ 928: 928] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.500269 345762 task_exit.go:204] [ 928: 928] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.500293 345762 task_signals.go:204] [ 928: 931] Signal 928, PID: 931, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.500293 345762 task_signals.go:204] [ 928: 930] Signal 928, PID: 930, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.500310 345762 task_exit.go:204] [ 928: 931] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.500323 345762 task_exit.go:204] [ 928: 931] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.500346 345762 task_exit.go:204] [ 928: 931] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.500375 345762 task_signals.go:204] [ 928: 929] Signal 928, PID: 929, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.500391 345762 task_exit.go:204] [ 928: 929] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.500398 345762 task_exit.go:204] [ 928: 929] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.500392 345762 task_signals.go:204] [ 928: 932] Signal 928, PID: 932, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.500404 345762 task_exit.go:204] [ 928: 929] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.500423 345762 task_exit.go:204] [ 928: 930] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.500436 345762 task_exit.go:204] [ 928: 930] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.500441 345762 task_exit.go:204] [ 928: 930] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.500456 345762 task_exit.go:204] [ 928: 932] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.502076 345762 task_exit.go:204] [ 928: 932] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.502098 345762 task_exit.go:204] [ 928: 932] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.502112 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.502145 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.502154 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.502232 345762 task_exit.go:204] [ 928: 928] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.502982 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.504505 345762 syscalls.go:262] [ 933: 933] Allocating stack with size of 8388608 bytes D0713 08:45:20.504623 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.506703 345762 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.506810 345762 usertrap_amd64.go:106] [ 933: 933] Map a usertrap vma at 62000 D0713 08:45:20.506974 345762 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0009922d0 1 D0713 08:45:20.507023 345762 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:20.507394 345762 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.507450 345762 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0009922d0 2 D0713 08:45:20.507467 345762 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:20.508132 345762 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.508176 345762 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0009922d0 3 D0713 08:45:20.508190 345762 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:20.514800 345762 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.514835 345762 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0009922d0 4 D0713 08:45:20.514846 345762 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:20.516908 345762 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.517049 345762 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0009922d0 5 D0713 08:45:20.517085 345762 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:20.517247 345762 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.517272 345762 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0009922d0 6 D0713 08:45:20.517284 345762 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:20.517914 345762 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.517938 345762 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0009922d0 7 D0713 08:45:20.517948 345762 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:20.518238 345762 usertrap_amd64.go:212] [ 933: 934] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.518343 345762 usertrap_amd64.go:122] [ 933: 934] Allocate a new trap: 0xc0009922d0 8 D0713 08:45:20.518373 345762 usertrap_amd64.go:225] [ 933: 934] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:20.518563 345762 usertrap_amd64.go:212] [ 933: 934] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.518580 345762 usertrap_amd64.go:122] [ 933: 934] Allocate a new trap: 0xc0009922d0 9 D0713 08:45:20.518588 345762 usertrap_amd64.go:225] [ 933: 934] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:20.518806 345762 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.518824 345762 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0009922d0 10 D0713 08:45:20.518842 345762 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:20.518935 345762 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:20.518966 345762 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0009922d0 11 D0713 08:45:20.518980 345762 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b6e0 trap addr 62370 ([184 24 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:20.527096 345762 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.527157 345762 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0009922d0 12 D0713 08:45:20.527180 345762 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46af29 trap addr 623c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:20.529870 345762 usertrap_amd64.go:212] [ 933: 934] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.529920 345762 usertrap_amd64.go:122] [ 933: 934] Allocate a new trap: 0xc0009922d0 13 D0713 08:45:20.529937 345762 usertrap_amd64.go:225] [ 933: 934] Apply the binary patch addr 46b020 trap addr 62410 ([184 39 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:20.529997 345762 usertrap_amd64.go:212] [ 933: 934] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.530012 345762 usertrap_amd64.go:122] [ 933: 934] Allocate a new trap: 0xc0009922d0 14 D0713 08:45:20.530021 345762 usertrap_amd64.go:225] [ 933: 934] Apply the binary patch addr 46b04f trap addr 62460 ([184 234 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:20.530081 345762 task_signals.go:470] [ 933: 933] Notified of signal 23 D0713 08:45:20.530171 345762 task_signals.go:220] [ 933: 933] Signal 23: delivering to handler I0713 08:45:20.538473 345762 compat.go:120] Unsupported syscall open_tree(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/open_tree for more information. D0713 08:45:20.538569 345762 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.538588 345762 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0009922d0 15 D0713 08:45:20.538601 345762 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0713 08:45:20.538693 345762 task_exit.go:204] [ 933: 933] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.538738 345762 task_signals.go:204] [ 933: 935] Signal 933, PID: 935, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.538765 345762 task_signals.go:204] [ 933: 936] Signal 933, PID: 936, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.538781 345762 task_exit.go:204] [ 933: 933] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.538801 345762 task_exit.go:204] [ 933: 935] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.538818 345762 task_signals.go:204] [ 933: 937] Signal 933, PID: 937, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.538828 345762 task_exit.go:204] [ 933: 935] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.538808 345762 task_signals.go:204] [ 933: 934] Signal 933, PID: 934, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.538839 345762 task_exit.go:204] [ 933: 935] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.538912 345762 task_exit.go:204] [ 933: 936] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.538960 345762 task_exit.go:204] [ 933: 936] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.538974 345762 task_exit.go:204] [ 933: 936] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.538987 345762 task_exit.go:204] [ 933: 937] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.539003 345762 task_exit.go:204] [ 933: 937] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.539008 345762 task_exit.go:204] [ 933: 937] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.539018 345762 task_exit.go:204] [ 933: 934] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.540501 345762 task_exit.go:204] [ 933: 934] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.540524 345762 task_exit.go:204] [ 933: 934] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.540545 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.540588 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.540614 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.540737 345762 task_exit.go:204] [ 933: 933] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.541638 345762 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.543021 345762 syscalls.go:262] [ 938: 938] Allocating stack with size of 8388608 bytes D0713 08:45:20.543120 345762 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.544392 345762 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.544442 345762 usertrap_amd64.go:106] [ 938: 938] Map a usertrap vma at 69000 D0713 08:45:20.544527 345762 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc00159e3f0 1 D0713 08:45:20.544557 345762 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:20.545181 345762 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.545232 345762 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc00159e3f0 2 D0713 08:45:20.545252 345762 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:20.546218 345762 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.546246 345762 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc00159e3f0 3 D0713 08:45:20.546264 345762 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:20.552389 345762 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.552416 345762 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc00159e3f0 4 D0713 08:45:20.552426 345762 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:20.553439 345762 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.553468 345762 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc00159e3f0 5 D0713 08:45:20.553484 345762 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:20.553533 345762 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.553539 345762 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc00159e3f0 6 D0713 08:45:20.553545 345762 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:20.553689 345762 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.553703 345762 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc00159e3f0 7 D0713 08:45:20.553709 345762 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:20.553835 345762 usertrap_amd64.go:212] [ 938: 939] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.553853 345762 usertrap_amd64.go:122] [ 938: 939] Allocate a new trap: 0xc00159e3f0 8 D0713 08:45:20.553860 345762 usertrap_amd64.go:225] [ 938: 939] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:20.554072 345762 usertrap_amd64.go:212] [ 938: 939] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.554108 345762 usertrap_amd64.go:122] [ 938: 939] Allocate a new trap: 0xc00159e3f0 9 D0713 08:45:20.554126 345762 usertrap_amd64.go:225] [ 938: 939] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:20.554147 345762 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.554157 345762 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc00159e3f0 10 D0713 08:45:20.554176 345762 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:20.554318 345762 usertrap_amd64.go:212] [ 938: 939] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.554347 345762 usertrap_amd64.go:122] [ 938: 939] Allocate a new trap: 0xc00159e3f0 11 D0713 08:45:20.554358 345762 usertrap_amd64.go:225] [ 938: 939] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:20.554447 345762 usertrap_amd64.go:212] [ 938: 939] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.554460 345762 usertrap_amd64.go:122] [ 938: 939] Allocate a new trap: 0xc00159e3f0 12 D0713 08:45:20.554468 345762 usertrap_amd64.go:225] [ 938: 939] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:20.554506 345762 task_signals.go:470] [ 938: 941] Notified of signal 23 D0713 08:45:20.554537 345762 task_signals.go:179] [ 938: 941] Restarting syscall 202: interrupted by signal 23 D0713 08:45:20.554547 345762 task_signals.go:220] [ 938: 941] Signal 23: delivering to handler D0713 08:45:20.563132 345762 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.563187 345762 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc00159e3f0 13 D0713 08:45:20.563204 345762 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:20.564915 345762 task_signals.go:470] [ 938: 938] Notified of signal 23 D0713 08:45:20.565998 345762 task_signals.go:220] [ 938: 938] Signal 23: delivering to handler D0713 08:45:20.566163 345762 task_signals.go:470] [ 938: 938] Notified of signal 23 D0713 08:45:20.566222 345762 task_signals.go:220] [ 938: 938] Signal 23: delivering to handler D0713 08:45:20.574044 345762 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.574080 345762 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc00159e3f0 14 D0713 08:45:20.574093 345762 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:20.574155 345762 task_exit.go:204] [ 938: 938] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.574190 345762 task_exit.go:204] [ 938: 938] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.574206 345762 task_signals.go:204] [ 938: 940] Signal 938, PID: 940, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.574277 345762 task_exit.go:204] [ 938: 940] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.574294 345762 task_exit.go:204] [ 938: 940] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.574235 345762 task_signals.go:204] [ 938: 942] Signal 938, PID: 942, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.574308 345762 task_exit.go:204] [ 938: 940] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.574220 345762 task_signals.go:204] [ 938: 941] Signal 938, PID: 941, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.574233 345762 task_signals.go:204] [ 938: 939] Signal 938, PID: 939, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.574321 345762 task_exit.go:204] [ 938: 941] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.574344 345762 task_exit.go:204] [ 938: 941] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.574350 345762 task_exit.go:204] [ 938: 941] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.574376 345762 task_exit.go:204] [ 938: 939] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.574383 345762 task_exit.go:204] [ 938: 939] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.574388 345762 task_exit.go:204] [ 938: 939] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.574399 345762 task_exit.go:204] [ 938: 942] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.575913 345762 task_exit.go:204] [ 938: 942] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.575926 345762 task_exit.go:204] [ 938: 942] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.575939 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.575984 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.575994 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.576213 345762 task_exit.go:204] [ 938: 938] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.582977 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.584282 345762 syscalls.go:262] [ 943: 943] Allocating stack with size of 8388608 bytes D0713 08:45:20.584378 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.585539 345762 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.585579 345762 usertrap_amd64.go:106] [ 943: 943] Map a usertrap vma at 60000 D0713 08:45:20.585677 345762 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc0004cd980 1 D0713 08:45:20.585709 345762 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:20.586191 345762 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.586214 345762 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc0004cd980 2 D0713 08:45:20.586223 345762 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:20.586839 345762 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.586858 345762 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc0004cd980 3 D0713 08:45:20.586865 345762 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:20.592809 345762 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.592837 345762 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc0004cd980 4 D0713 08:45:20.592847 345762 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:20.593973 345762 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.593993 345762 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc0004cd980 5 D0713 08:45:20.594000 345762 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:20.594014 345762 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.594018 345762 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc0004cd980 6 D0713 08:45:20.594024 345762 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:20.594401 345762 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.594416 345762 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc0004cd980 7 D0713 08:45:20.594422 345762 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:20.594555 345762 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.594614 345762 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc0004cd980 8 D0713 08:45:20.594624 345762 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:20.594835 345762 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.594854 345762 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc0004cd980 9 D0713 08:45:20.594861 345762 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:20.594993 345762 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.595020 345762 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc0004cd980 10 D0713 08:45:20.595030 345762 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:20.602796 345762 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.602824 345762 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc0004cd980 11 D0713 08:45:20.602833 345762 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:20.605598 345762 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.605625 345762 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc0004cd980 12 D0713 08:45:20.605637 345762 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:20.605734 345762 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.605740 345762 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc0004cd980 13 D0713 08:45:20.605746 345762 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:20.605766 345762 task_signals.go:470] [ 943: 943] Notified of signal 23 D0713 08:45:20.605887 345762 task_signals.go:220] [ 943: 943] Signal 23: delivering to handler I0713 08:45:20.613941 345762 compat.go:120] Unsupported syscall sys_437(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_437 for more information. D0713 08:45:20.614093 345762 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.614118 345762 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc0004cd980 14 D0713 08:45:20.614133 345762 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:20.614218 345762 task_exit.go:204] [ 943: 943] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.614251 345762 task_exit.go:204] [ 943: 943] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.614279 345762 task_signals.go:204] [ 943: 947] Signal 943, PID: 947, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.614294 345762 task_exit.go:204] [ 943: 947] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.614287 345762 task_signals.go:204] [ 943: 944] Signal 943, PID: 944, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.614292 345762 task_signals.go:204] [ 943: 946] Signal 943, PID: 946, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.614307 345762 task_signals.go:204] [ 943: 945] Signal 943, PID: 945, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.614318 345762 task_exit.go:204] [ 943: 947] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.614349 345762 task_exit.go:204] [ 943: 947] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.614382 345762 task_exit.go:204] [ 943: 944] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.614393 345762 task_exit.go:204] [ 943: 944] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.614398 345762 task_exit.go:204] [ 943: 944] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.614405 345762 task_exit.go:204] [ 943: 946] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.614422 345762 task_exit.go:204] [ 943: 946] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.614426 345762 task_exit.go:204] [ 943: 946] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.614434 345762 task_exit.go:204] [ 943: 945] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.616007 345762 task_exit.go:204] [ 943: 945] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.616033 345762 task_exit.go:204] [ 943: 945] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.616046 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.616089 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.616096 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.616298 345762 task_exit.go:204] [ 943: 943] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.617032 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.618238 345762 syscalls.go:262] [ 948: 948] Allocating stack with size of 8388608 bytes D0713 08:45:20.618353 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.619802 345762 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.619842 345762 usertrap_amd64.go:106] [ 948: 948] Map a usertrap vma at 62000 D0713 08:45:20.619911 345762 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc00159ea50 1 D0713 08:45:20.619933 345762 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:20.620405 345762 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.620426 345762 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc00159ea50 2 D0713 08:45:20.620433 345762 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:20.621033 345762 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.621056 345762 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc00159ea50 3 D0713 08:45:20.621067 345762 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:20.627135 345762 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.627159 345762 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc00159ea50 4 D0713 08:45:20.627169 345762 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:20.628198 345762 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.628227 345762 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc00159ea50 5 D0713 08:45:20.628237 345762 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:20.628300 345762 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.628313 345762 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc00159ea50 6 D0713 08:45:20.628322 345762 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:20.628637 345762 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.628651 345762 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc00159ea50 7 D0713 08:45:20.628657 345762 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:20.628784 345762 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.628809 345762 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc00159ea50 8 D0713 08:45:20.628818 345762 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:20.628929 345762 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.628968 345762 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc00159ea50 9 D0713 08:45:20.628978 345762 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:20.629129 345762 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.629157 345762 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc00159ea50 10 D0713 08:45:20.629170 345762 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:20.636890 345762 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.636913 345762 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc00159ea50 11 D0713 08:45:20.636922 345762 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:20.639293 345762 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.639318 345762 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc00159ea50 12 D0713 08:45:20.639328 345762 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:20.639411 345762 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.639430 345762 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc00159ea50 13 D0713 08:45:20.639447 345762 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:20.639516 345762 task_signals.go:470] [ 948: 948] Notified of signal 23 D0713 08:45:20.639607 345762 task_signals.go:220] [ 948: 948] Signal 23: delivering to handler I0713 08:45:20.648786 345762 compat.go:120] Unsupported syscall perf_event_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/perf_event_open for more information. D0713 08:45:20.648967 345762 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.648999 345762 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc00159ea50 14 D0713 08:45:20.649017 345762 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:20.649101 345762 task_exit.go:204] [ 948: 948] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.649142 345762 task_exit.go:204] [ 948: 948] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.649156 345762 task_signals.go:204] [ 948: 950] Signal 948, PID: 950, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.649197 345762 task_signals.go:204] [ 948: 951] Signal 948, PID: 951, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.649198 345762 task_exit.go:204] [ 948: 950] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.649235 345762 task_exit.go:204] [ 948: 950] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.649199 345762 task_signals.go:204] [ 948: 949] Signal 948, PID: 949, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.649243 345762 task_exit.go:204] [ 948: 950] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.649305 345762 task_signals.go:204] [ 948: 952] Signal 948, PID: 952, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.649312 345762 task_exit.go:204] [ 948: 951] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.649349 345762 task_exit.go:204] [ 948: 952] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.649390 345762 task_exit.go:204] [ 948: 952] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.649406 345762 task_exit.go:204] [ 948: 952] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.649423 345762 task_exit.go:204] [ 948: 949] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.649444 345762 task_exit.go:204] [ 948: 949] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.649451 345762 task_exit.go:204] [ 948: 949] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.650935 345762 task_exit.go:204] [ 948: 951] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.650969 345762 task_exit.go:204] [ 948: 951] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.650983 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.651016 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.651023 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.651206 345762 task_exit.go:204] [ 948: 948] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.652010 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.653555 345762 syscalls.go:262] [ 953: 953] Allocating stack with size of 8388608 bytes D0713 08:45:20.653690 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.654768 345762 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.654815 345762 usertrap_amd64.go:106] [ 953: 953] Map a usertrap vma at 60000 D0713 08:45:20.655183 345762 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0012e9b30 1 D0713 08:45:20.655233 345762 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:20.655670 345762 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.655691 345762 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0012e9b30 2 D0713 08:45:20.655700 345762 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:20.656406 345762 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.656428 345762 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0012e9b30 3 D0713 08:45:20.656437 345762 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:20.663002 345762 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.663064 345762 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0012e9b30 4 D0713 08:45:20.663083 345762 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:20.664473 345762 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.664498 345762 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0012e9b30 5 D0713 08:45:20.664509 345762 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:20.664572 345762 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.664601 345762 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0012e9b30 6 D0713 08:45:20.664608 345762 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:20.665319 345762 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.665340 345762 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0012e9b30 7 D0713 08:45:20.665349 345762 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:20.665574 345762 usertrap_amd64.go:212] [ 953: 954] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.665582 345762 usertrap_amd64.go:122] [ 953: 954] Allocate a new trap: 0xc0012e9b30 8 D0713 08:45:20.665590 345762 usertrap_amd64.go:225] [ 953: 954] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:20.665784 345762 usertrap_amd64.go:212] [ 953: 954] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.665816 345762 usertrap_amd64.go:122] [ 953: 954] Allocate a new trap: 0xc0012e9b30 9 D0713 08:45:20.665832 345762 usertrap_amd64.go:225] [ 953: 954] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:20.665957 345762 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.665986 345762 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0012e9b30 10 D0713 08:45:20.665998 345762 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:20.673313 345762 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.673350 345762 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0012e9b30 11 D0713 08:45:20.673364 345762 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:20.676621 345762 usertrap_amd64.go:212] [ 953: 954] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.676665 345762 usertrap_amd64.go:122] [ 953: 954] Allocate a new trap: 0xc0012e9b30 12 D0713 08:45:20.676680 345762 usertrap_amd64.go:225] [ 953: 954] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:20.676759 345762 usertrap_amd64.go:212] [ 953: 954] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.676783 345762 usertrap_amd64.go:122] [ 953: 954] Allocate a new trap: 0xc0012e9b30 13 D0713 08:45:20.676798 345762 usertrap_amd64.go:225] [ 953: 954] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:20.676860 345762 task_signals.go:470] [ 953: 953] Notified of signal 23 D0713 08:45:20.677028 345762 task_signals.go:220] [ 953: 953] Signal 23: delivering to handler I0713 08:45:20.684922 345762 compat.go:120] Unsupported syscall personality(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/personality for more information. D0713 08:45:20.685107 345762 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.685126 345762 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0012e9b30 14 D0713 08:45:20.685141 345762 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:20.685214 345762 task_exit.go:204] [ 953: 953] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.685249 345762 task_exit.go:204] [ 953: 953] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.685280 345762 task_signals.go:204] [ 953: 954] Signal 953, PID: 954, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.685295 345762 task_exit.go:204] [ 953: 954] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.685287 345762 task_signals.go:204] [ 953: 956] Signal 953, PID: 956, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.685296 345762 task_signals.go:204] [ 953: 955] Signal 953, PID: 955, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.685306 345762 task_exit.go:204] [ 953: 954] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.685331 345762 task_exit.go:204] [ 953: 954] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.685295 345762 task_signals.go:204] [ 953: 957] Signal 953, PID: 957, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.685353 345762 task_exit.go:204] [ 953: 957] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.685363 345762 task_exit.go:204] [ 953: 957] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.685376 345762 task_exit.go:204] [ 953: 957] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.685385 345762 task_exit.go:204] [ 953: 956] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.685403 345762 task_exit.go:204] [ 953: 956] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.685412 345762 task_exit.go:204] [ 953: 956] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.685420 345762 task_exit.go:204] [ 953: 955] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.686824 345762 task_exit.go:204] [ 953: 955] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.686889 345762 task_exit.go:204] [ 953: 955] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.686931 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.687004 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.687035 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.687098 345762 task_exit.go:204] [ 953: 953] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.688001 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.690192 345762 syscalls.go:262] [ 958: 958] Allocating stack with size of 8388608 bytes D0713 08:45:20.690322 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.691617 345762 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.691677 345762 usertrap_amd64.go:106] [ 958: 958] Map a usertrap vma at 64000 D0713 08:45:20.691871 345762 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc000541200 1 D0713 08:45:20.691922 345762 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:20.693302 345762 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.693334 345762 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc000541200 2 D0713 08:45:20.693344 345762 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:20.693785 345762 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.693806 345762 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc000541200 3 D0713 08:45:20.693813 345762 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:20.699553 345762 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.699579 345762 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc000541200 4 D0713 08:45:20.699588 345762 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:20.700626 345762 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.700645 345762 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc000541200 5 D0713 08:45:20.700652 345762 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:20.700716 345762 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.700728 345762 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc000541200 6 D0713 08:45:20.700734 345762 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:20.701459 345762 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.701480 345762 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc000541200 7 D0713 08:45:20.701488 345762 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:20.701654 345762 usertrap_amd64.go:212] [ 958: 959] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.701678 345762 usertrap_amd64.go:122] [ 958: 959] Allocate a new trap: 0xc000541200 8 D0713 08:45:20.701701 345762 usertrap_amd64.go:225] [ 958: 959] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:20.701876 345762 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.701902 345762 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc000541200 9 D0713 08:45:20.701914 345762 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:20.701929 345762 usertrap_amd64.go:212] [ 958: 959] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.701937 345762 usertrap_amd64.go:122] [ 958: 959] Allocate a new trap: 0xc000541200 10 D0713 08:45:20.701947 345762 usertrap_amd64.go:225] [ 958: 959] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:20.702041 345762 usertrap_amd64.go:212] [ 958: 959] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.702061 345762 usertrap_amd64.go:122] [ 958: 959] Allocate a new trap: 0xc000541200 11 D0713 08:45:20.702071 345762 usertrap_amd64.go:225] [ 958: 959] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:20.702152 345762 usertrap_amd64.go:212] [ 958: 959] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.702178 345762 usertrap_amd64.go:122] [ 958: 959] Allocate a new trap: 0xc000541200 12 D0713 08:45:20.702191 345762 usertrap_amd64.go:225] [ 958: 959] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:20.702216 345762 task_signals.go:470] [ 958: 961] Notified of signal 23 D0713 08:45:20.702239 345762 task_signals.go:179] [ 958: 961] Restarting syscall 202: interrupted by signal 23 D0713 08:45:20.702246 345762 task_signals.go:220] [ 958: 961] Signal 23: delivering to handler D0713 08:45:20.709362 345762 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.709386 345762 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc000541200 13 D0713 08:45:20.709395 345762 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:20.713193 345762 task_signals.go:470] [ 958: 958] Notified of signal 23 D0713 08:45:20.713307 345762 task_signals.go:220] [ 958: 958] Signal 23: delivering to handler D0713 08:45:20.713434 345762 task_signals.go:470] [ 958: 958] Notified of signal 23 D0713 08:45:20.713512 345762 task_signals.go:220] [ 958: 958] Signal 23: delivering to handler I0713 08:45:20.719025 345762 compat.go:120] Unsupported syscall sys_438(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_438 for more information. D0713 08:45:20.719115 345762 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.719125 345762 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc000541200 14 D0713 08:45:20.719137 345762 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:20.719219 345762 task_exit.go:204] [ 958: 958] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.719234 345762 task_exit.go:204] [ 958: 958] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.719255 345762 task_signals.go:204] [ 958: 961] Signal 958, PID: 961, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.719278 345762 task_signals.go:204] [ 958: 959] Signal 958, PID: 959, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.719283 345762 task_exit.go:204] [ 958: 961] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.719312 345762 task_exit.go:204] [ 958: 961] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.719260 345762 task_signals.go:204] [ 958: 960] Signal 958, PID: 960, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.719320 345762 task_exit.go:204] [ 958: 961] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.719345 345762 task_signals.go:204] [ 958: 962] Signal 958, PID: 962, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.719360 345762 task_exit.go:204] [ 958: 959] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.719413 345762 task_exit.go:204] [ 958: 959] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.719423 345762 task_exit.go:204] [ 958: 959] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.719436 345762 task_exit.go:204] [ 958: 962] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.719450 345762 task_exit.go:204] [ 958: 962] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.719457 345762 task_exit.go:204] [ 958: 962] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.719468 345762 task_exit.go:204] [ 958: 960] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.721304 345762 task_exit.go:204] [ 958: 960] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.721318 345762 task_exit.go:204] [ 958: 960] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.721331 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.721405 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.721443 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.721589 345762 task_exit.go:204] [ 958: 958] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.722309 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.723887 345762 syscalls.go:262] [ 963: 963] Allocating stack with size of 8388608 bytes D0713 08:45:20.724020 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.725813 345762 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.725849 345762 usertrap_amd64.go:106] [ 963: 963] Map a usertrap vma at 6a000 D0713 08:45:20.725929 345762 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001a4bec0 1 D0713 08:45:20.725945 345762 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:20.726391 345762 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.726412 345762 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001a4bec0 2 D0713 08:45:20.726428 345762 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:20.727428 345762 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.727460 345762 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001a4bec0 3 D0713 08:45:20.727473 345762 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:20.734113 345762 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.734139 345762 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001a4bec0 4 D0713 08:45:20.734149 345762 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:20.735269 345762 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.735284 345762 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001a4bec0 5 D0713 08:45:20.735292 345762 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:20.735304 345762 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.735309 345762 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001a4bec0 6 D0713 08:45:20.735314 345762 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:20.735480 345762 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.735506 345762 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001a4bec0 7 D0713 08:45:20.735515 345762 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:20.735744 345762 usertrap_amd64.go:212] [ 963: 964] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.735770 345762 usertrap_amd64.go:122] [ 963: 964] Allocate a new trap: 0xc001a4bec0 8 D0713 08:45:20.735783 345762 usertrap_amd64.go:225] [ 963: 964] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:20.735972 345762 usertrap_amd64.go:212] [ 963: 964] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.735996 345762 usertrap_amd64.go:122] [ 963: 964] Allocate a new trap: 0xc001a4bec0 9 D0713 08:45:20.736009 345762 usertrap_amd64.go:225] [ 963: 964] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:20.736044 345762 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.736056 345762 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001a4bec0 10 D0713 08:45:20.736065 345762 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:20.743757 345762 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.743787 345762 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001a4bec0 11 D0713 08:45:20.743800 345762 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:20.747787 345762 usertrap_amd64.go:212] [ 963: 964] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.747818 345762 usertrap_amd64.go:122] [ 963: 964] Allocate a new trap: 0xc001a4bec0 12 D0713 08:45:20.747830 345762 usertrap_amd64.go:225] [ 963: 964] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:20.747921 345762 usertrap_amd64.go:212] [ 963: 964] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.747965 345762 usertrap_amd64.go:122] [ 963: 964] Allocate a new trap: 0xc001a4bec0 13 D0713 08:45:20.747984 345762 usertrap_amd64.go:225] [ 963: 964] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:20.748046 345762 task_signals.go:470] [ 963: 963] Notified of signal 23 D0713 08:45:20.748130 345762 task_signals.go:220] [ 963: 963] Signal 23: delivering to handler I0713 08:45:20.754923 345762 compat.go:120] Unsupported syscall pidfd_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_open for more information. D0713 08:45:20.755016 345762 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.755040 345762 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc001a4bec0 14 D0713 08:45:20.755054 345762 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:20.755125 345762 task_exit.go:204] [ 963: 963] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.755153 345762 task_exit.go:204] [ 963: 963] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.755172 345762 task_signals.go:204] [ 963: 965] Signal 963, PID: 965, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.755202 345762 task_signals.go:204] [ 963: 967] Signal 963, PID: 967, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.755212 345762 task_signals.go:204] [ 963: 964] Signal 963, PID: 964, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.755216 345762 task_exit.go:204] [ 963: 965] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.755184 345762 task_signals.go:204] [ 963: 966] Signal 963, PID: 966, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.755249 345762 task_exit.go:204] [ 963: 965] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.755290 345762 task_exit.go:204] [ 963: 965] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.755346 345762 task_exit.go:204] [ 963: 967] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.755379 345762 task_exit.go:204] [ 963: 967] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.755398 345762 task_exit.go:204] [ 963: 967] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.755410 345762 task_exit.go:204] [ 963: 964] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.755454 345762 task_exit.go:204] [ 963: 964] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.755475 345762 task_exit.go:204] [ 963: 964] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.755494 345762 task_exit.go:204] [ 963: 966] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.757319 345762 task_exit.go:204] [ 963: 966] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.757351 345762 task_exit.go:204] [ 963: 966] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.757375 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.757403 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.757413 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.757597 345762 task_exit.go:204] [ 963: 963] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.758316 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.760075 345762 syscalls.go:262] [ 968: 968] Allocating stack with size of 8388608 bytes D0713 08:45:20.760182 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.761726 345762 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.761825 345762 usertrap_amd64.go:106] [ 968: 968] Map a usertrap vma at 68000 D0713 08:45:20.761980 345762 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc0007306f0 1 D0713 08:45:20.762048 345762 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:45:20.762750 345762 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.762784 345762 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc0007306f0 2 D0713 08:45:20.762800 345762 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:45:20.763835 345762 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.763866 345762 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc0007306f0 3 D0713 08:45:20.763881 345762 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:45:20.770306 345762 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.770334 345762 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc0007306f0 4 D0713 08:45:20.770345 345762 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:45:20.771482 345762 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.771505 345762 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc0007306f0 5 D0713 08:45:20.771514 345762 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:45:20.771571 345762 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.771584 345762 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc0007306f0 6 D0713 08:45:20.771590 345762 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:45:20.771974 345762 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.771993 345762 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc0007306f0 7 D0713 08:45:20.772002 345762 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:45:20.772191 345762 usertrap_amd64.go:212] [ 968: 969] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.772231 345762 usertrap_amd64.go:122] [ 968: 969] Allocate a new trap: 0xc0007306f0 8 D0713 08:45:20.772250 345762 usertrap_amd64.go:225] [ 968: 969] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:45:20.772516 345762 usertrap_amd64.go:212] [ 968: 969] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.772553 345762 usertrap_amd64.go:122] [ 968: 969] Allocate a new trap: 0xc0007306f0 9 D0713 08:45:20.772567 345762 usertrap_amd64.go:225] [ 968: 969] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:45:20.772662 345762 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.772720 345762 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc0007306f0 10 D0713 08:45:20.772744 345762 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:45:20.780871 345762 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.780934 345762 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc0007306f0 11 D0713 08:45:20.780975 345762 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:45:20.783484 345762 usertrap_amd64.go:212] [ 968: 969] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.783526 345762 usertrap_amd64.go:122] [ 968: 969] Allocate a new trap: 0xc0007306f0 12 D0713 08:45:20.783543 345762 usertrap_amd64.go:225] [ 968: 969] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:45:20.783601 345762 usertrap_amd64.go:212] [ 968: 969] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.783624 345762 usertrap_amd64.go:122] [ 968: 969] Allocate a new trap: 0xc0007306f0 13 D0713 08:45:20.783638 345762 usertrap_amd64.go:225] [ 968: 969] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:45:20.783700 345762 task_signals.go:470] [ 968: 968] Notified of signal 23 D0713 08:45:20.783780 345762 task_signals.go:220] [ 968: 968] Signal 23: delivering to handler I0713 08:45:20.792255 345762 compat.go:120] Unsupported syscall pidfd_send_signal(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_send_signal for more information. D0713 08:45:20.792351 345762 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.792376 345762 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc0007306f0 14 D0713 08:45:20.792389 345762 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:45:20.792486 345762 task_exit.go:204] [ 968: 968] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.792536 345762 task_signals.go:204] [ 968: 970] Signal 968, PID: 970, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.792603 345762 task_signals.go:204] [ 968: 972] Signal 968, PID: 972, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.792625 345762 task_exit.go:204] [ 968: 968] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.792661 345762 task_signals.go:204] [ 968: 969] Signal 968, PID: 969, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.792672 345762 task_exit.go:204] [ 968: 970] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.792717 345762 task_signals.go:204] [ 968: 971] Signal 968, PID: 971, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.792745 345762 task_exit.go:204] [ 968: 970] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.792751 345762 task_exit.go:204] [ 968: 970] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.792766 345762 task_exit.go:204] [ 968: 972] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.792780 345762 task_exit.go:204] [ 968: 972] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.792784 345762 task_exit.go:204] [ 968: 972] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.792793 345762 task_exit.go:204] [ 968: 969] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.792800 345762 task_exit.go:204] [ 968: 969] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.792804 345762 task_exit.go:204] [ 968: 969] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.792813 345762 task_exit.go:204] [ 968: 971] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.794161 345762 task_exit.go:204] [ 968: 971] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.794196 345762 task_exit.go:204] [ 968: 971] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.794213 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.794255 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.794277 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.794466 345762 task_exit.go:204] [ 968: 968] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.795144 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.796402 345762 syscalls.go:262] [ 973: 973] Allocating stack with size of 8388608 bytes D0713 08:45:20.796505 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.798246 345762 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.798306 345762 usertrap_amd64.go:106] [ 973: 973] Map a usertrap vma at 67000 D0713 08:45:20.798487 345762 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc001a4bf20 1 D0713 08:45:20.798566 345762 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:20.799159 345762 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.799186 345762 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc001a4bf20 2 D0713 08:45:20.799199 345762 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:20.799892 345762 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.799912 345762 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc001a4bf20 3 D0713 08:45:20.799921 345762 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:20.801687 345762 sampler.go:191] Time: Adjusting syscall overhead down to 515 D0713 08:45:20.806251 345762 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.806285 345762 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc001a4bf20 4 D0713 08:45:20.806297 345762 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:20.807450 345762 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.807484 345762 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc001a4bf20 5 D0713 08:45:20.807495 345762 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:20.807558 345762 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.807581 345762 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc001a4bf20 6 D0713 08:45:20.807594 345762 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:20.808095 345762 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.808121 345762 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc001a4bf20 7 D0713 08:45:20.808134 345762 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:20.808292 345762 usertrap_amd64.go:212] [ 973: 974] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.808328 345762 usertrap_amd64.go:122] [ 973: 974] Allocate a new trap: 0xc001a4bf20 8 D0713 08:45:20.808343 345762 usertrap_amd64.go:225] [ 973: 974] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:20.808658 345762 usertrap_amd64.go:212] [ 973: 974] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.808697 345762 usertrap_amd64.go:122] [ 973: 974] Allocate a new trap: 0xc001a4bf20 9 D0713 08:45:20.808713 345762 usertrap_amd64.go:225] [ 973: 974] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:20.808810 345762 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.808839 345762 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc001a4bf20 10 D0713 08:45:20.808855 345762 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:20.816108 345762 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.816131 345762 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc001a4bf20 11 D0713 08:45:20.816140 345762 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:20.820426 345762 usertrap_amd64.go:212] [ 973: 974] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.820440 345762 usertrap_amd64.go:122] [ 973: 974] Allocate a new trap: 0xc001a4bf20 12 D0713 08:45:20.820454 345762 usertrap_amd64.go:225] [ 973: 974] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:20.820475 345762 usertrap_amd64.go:212] [ 973: 974] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.820489 345762 usertrap_amd64.go:122] [ 973: 974] Allocate a new trap: 0xc001a4bf20 13 D0713 08:45:20.820501 345762 usertrap_amd64.go:225] [ 973: 974] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:20.820564 345762 task_signals.go:470] [ 973: 973] Notified of signal 23 D0713 08:45:20.820670 345762 task_signals.go:220] [ 973: 973] Signal 23: delivering to handler D0713 08:45:20.827022 345762 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.827091 345762 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc001a4bf20 14 D0713 08:45:20.827115 345762 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:20.827184 345762 task_exit.go:204] [ 973: 973] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.827225 345762 task_signals.go:204] [ 973: 978] Signal 973, PID: 978, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.827244 345762 task_signals.go:204] [ 973: 974] Signal 973, PID: 974, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.827254 345762 task_signals.go:204] [ 973: 975] Signal 973, PID: 975, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.827283 345762 task_signals.go:204] [ 973: 977] Signal 973, PID: 977, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.827297 345762 task_signals.go:204] [ 973: 976] Signal 973, PID: 976, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.827318 345762 task_exit.go:204] [ 973: 973] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.827340 345762 task_exit.go:204] [ 973: 978] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.827350 345762 task_exit.go:204] [ 973: 978] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.827356 345762 task_exit.go:204] [ 973: 978] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.827369 345762 task_exit.go:204] [ 973: 974] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.827378 345762 task_exit.go:204] [ 973: 974] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.827383 345762 task_exit.go:204] [ 973: 974] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.827391 345762 task_exit.go:204] [ 973: 975] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.827399 345762 task_exit.go:204] [ 973: 975] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.827413 345762 task_exit.go:204] [ 973: 975] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.827422 345762 task_exit.go:204] [ 973: 977] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.827445 345762 task_exit.go:204] [ 973: 977] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.827450 345762 task_exit.go:204] [ 973: 977] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.827460 345762 task_exit.go:204] [ 973: 976] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.829033 345762 task_exit.go:204] [ 973: 976] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.829081 345762 task_exit.go:204] [ 973: 976] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.829097 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.829127 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.829136 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.829245 345762 task_exit.go:204] [ 973: 973] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.829892 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.830938 345762 syscalls.go:262] [ 979: 979] Allocating stack with size of 8388608 bytes D0713 08:45:20.831037 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.831879 345762 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.831925 345762 usertrap_amd64.go:106] [ 979: 979] Map a usertrap vma at 6a000 D0713 08:45:20.832035 345762 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc000541b00 1 D0713 08:45:20.832068 345762 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:20.832542 345762 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.832566 345762 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc000541b00 2 D0713 08:45:20.832577 345762 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:20.833209 345762 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.833238 345762 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc000541b00 3 D0713 08:45:20.833248 345762 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:20.839086 345762 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.839113 345762 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc000541b00 4 D0713 08:45:20.839124 345762 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:20.840116 345762 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.840139 345762 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc000541b00 5 D0713 08:45:20.840151 345762 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:20.840203 345762 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.840224 345762 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc000541b00 6 D0713 08:45:20.840229 345762 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:20.840514 345762 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.840528 345762 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc000541b00 7 D0713 08:45:20.840533 345762 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:20.840625 345762 usertrap_amd64.go:212] [ 979: 980] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.840642 345762 usertrap_amd64.go:122] [ 979: 980] Allocate a new trap: 0xc000541b00 8 D0713 08:45:20.840648 345762 usertrap_amd64.go:225] [ 979: 980] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:20.840837 345762 usertrap_amd64.go:212] [ 979: 980] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:20.840876 345762 usertrap_amd64.go:122] [ 979: 980] Allocate a new trap: 0xc000541b00 9 D0713 08:45:20.840894 345762 usertrap_amd64.go:225] [ 979: 980] Apply the binary patch addr 46b6e0 trap addr 6a2d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:20.840907 345762 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.840915 345762 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc000541b00 10 D0713 08:45:20.840926 345762 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:20.841010 345762 usertrap_amd64.go:212] [ 979: 980] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.841033 345762 usertrap_amd64.go:122] [ 979: 980] Allocate a new trap: 0xc000541b00 11 D0713 08:45:20.841046 345762 usertrap_amd64.go:225] [ 979: 980] Apply the binary patch addr 46af76 trap addr 6a370 ([184 35 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:20.847502 345762 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.847532 345762 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc000541b00 12 D0713 08:45:20.847544 345762 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46af29 trap addr 6a3c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:20.851403 345762 usertrap_amd64.go:212] [ 979: 980] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.851437 345762 usertrap_amd64.go:122] [ 979: 980] Allocate a new trap: 0xc000541b00 13 D0713 08:45:20.851453 345762 usertrap_amd64.go:225] [ 979: 980] Apply the binary patch addr 46b020 trap addr 6a410 ([184 39 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:20.851501 345762 usertrap_amd64.go:212] [ 979: 980] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.851521 345762 usertrap_amd64.go:122] [ 979: 980] Allocate a new trap: 0xc000541b00 14 D0713 08:45:20.851527 345762 usertrap_amd64.go:225] [ 979: 980] Apply the binary patch addr 46b04f trap addr 6a460 ([184 234 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:20.851547 345762 task_signals.go:470] [ 979: 979] Notified of signal 23 D0713 08:45:20.851655 345762 task_signals.go:220] [ 979: 979] Signal 23: delivering to handler D0713 08:45:20.856796 345762 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.856821 345762 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc000541b00 15 D0713 08:45:20.856830 345762 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 08:45:20.856887 345762 task_exit.go:204] [ 979: 979] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.856919 345762 task_exit.go:204] [ 979: 979] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.856960 345762 task_signals.go:204] [ 979: 982] Signal 979, PID: 982, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.856969 345762 task_signals.go:204] [ 979: 983] Signal 979, PID: 983, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.856988 345762 task_signals.go:204] [ 979: 980] Signal 979, PID: 980, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.857006 345762 task_signals.go:204] [ 979: 981] Signal 979, PID: 981, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.857018 345762 task_exit.go:204] [ 979: 982] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.857034 345762 task_exit.go:204] [ 979: 981] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.857064 345762 task_exit.go:204] [ 979: 981] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.857070 345762 task_exit.go:204] [ 979: 981] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.857081 345762 task_exit.go:204] [ 979: 980] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.857101 345762 task_exit.go:204] [ 979: 980] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.857112 345762 task_exit.go:204] [ 979: 980] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.857128 345762 task_exit.go:204] [ 979: 982] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.857142 345762 task_exit.go:204] [ 979: 982] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.857150 345762 task_exit.go:204] [ 979: 983] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.858241 345762 task_exit.go:204] [ 979: 983] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.858271 345762 task_exit.go:204] [ 979: 983] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.858284 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.858310 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.858317 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.858386 345762 task_exit.go:204] [ 979: 979] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.859030 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.860277 345762 syscalls.go:262] [ 984: 984] Allocating stack with size of 8388608 bytes D0713 08:45:20.860413 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.861375 345762 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.861420 345762 usertrap_amd64.go:106] [ 984: 984] Map a usertrap vma at 61000 D0713 08:45:20.861496 345762 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc000541bf0 1 D0713 08:45:20.861516 345762 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:20.861947 345762 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.861965 345762 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc000541bf0 2 D0713 08:45:20.861974 345762 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:20.862575 345762 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.862611 345762 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc000541bf0 3 D0713 08:45:20.862620 345762 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:45:20.868894 345762 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.868930 345762 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc000541bf0 4 D0713 08:45:20.868983 345762 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:45:20.870240 345762 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.870269 345762 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc000541bf0 5 D0713 08:45:20.870280 345762 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:45:20.870342 345762 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.870367 345762 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc000541bf0 6 D0713 08:45:20.870381 345762 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:45:20.870637 345762 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.870658 345762 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc000541bf0 7 D0713 08:45:20.870671 345762 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:45:20.870870 345762 usertrap_amd64.go:212] [ 984: 985] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.870923 345762 usertrap_amd64.go:122] [ 984: 985] Allocate a new trap: 0xc000541bf0 8 D0713 08:45:20.870947 345762 usertrap_amd64.go:225] [ 984: 985] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:45:20.871172 345762 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.871204 345762 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc000541bf0 9 D0713 08:45:20.871218 345762 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:45:20.871254 345762 usertrap_amd64.go:212] [ 984: 985] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.871263 345762 usertrap_amd64.go:122] [ 984: 985] Allocate a new trap: 0xc000541bf0 10 D0713 08:45:20.871272 345762 usertrap_amd64.go:225] [ 984: 985] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:45:20.871759 345762 usertrap_amd64.go:212] [ 984: 985] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.871783 345762 usertrap_amd64.go:122] [ 984: 985] Allocate a new trap: 0xc000541bf0 11 D0713 08:45:20.871792 345762 usertrap_amd64.go:225] [ 984: 985] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:45:20.871856 345762 usertrap_amd64.go:212] [ 984: 985] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.871915 345762 usertrap_amd64.go:122] [ 984: 985] Allocate a new trap: 0xc000541bf0 12 D0713 08:45:20.871932 345762 usertrap_amd64.go:225] [ 984: 985] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:45:20.871995 345762 task_signals.go:470] [ 984: 984] Notified of signal 23 D0713 08:45:20.872090 345762 task_signals.go:220] [ 984: 984] Signal 23: delivering to handler D0713 08:45:20.878745 345762 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.878771 345762 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc000541bf0 13 D0713 08:45:20.878780 345762 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:45:20.882514 345762 task_signals.go:470] [ 984: 984] Notified of signal 23 D0713 08:45:20.882591 345762 task_signals.go:220] [ 984: 984] Signal 23: delivering to handler D0713 08:45:20.888489 345762 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.888514 345762 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc000541bf0 14 D0713 08:45:20.888528 345762 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:45:20.888590 345762 task_exit.go:204] [ 984: 984] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.888607 345762 task_exit.go:204] [ 984: 984] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.888628 345762 task_signals.go:204] [ 984: 985] Signal 984, PID: 985, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.888662 345762 task_exit.go:204] [ 984: 985] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.888639 345762 task_signals.go:204] [ 984: 987] Signal 984, PID: 987, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.888669 345762 task_exit.go:204] [ 984: 985] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.888666 345762 task_signals.go:204] [ 984: 988] Signal 984, PID: 988, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.888689 345762 task_exit.go:204] [ 984: 985] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.888706 345762 task_signals.go:204] [ 984: 986] Signal 984, PID: 986, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.888707 345762 task_exit.go:204] [ 984: 987] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.888757 345762 task_exit.go:204] [ 984: 987] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.888762 345762 task_exit.go:204] [ 984: 987] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.888769 345762 task_exit.go:204] [ 984: 986] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.888784 345762 task_exit.go:204] [ 984: 986] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.888788 345762 task_exit.go:204] [ 984: 986] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.888799 345762 task_exit.go:204] [ 984: 988] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.890219 345762 task_exit.go:204] [ 984: 988] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.890239 345762 task_exit.go:204] [ 984: 988] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.890281 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.890310 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.890318 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.890442 345762 task_exit.go:204] [ 984: 984] Transitioning from exit state TaskExitZombie to TaskExitDead I0713 08:45:20.890611 345762 compat.go:120] Unsupported syscall pkey_alloc(0x0,0x0,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_alloc for more information. D0713 08:45:20.891292 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.892564 345762 syscalls.go:262] [ 989: 989] Allocating stack with size of 8388608 bytes D0713 08:45:20.892715 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.893730 345762 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.893773 345762 usertrap_amd64.go:106] [ 989: 989] Map a usertrap vma at 69000 D0713 08:45:20.893936 345762 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc00159f7d0 1 D0713 08:45:20.893968 345762 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:20.894384 345762 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.894402 345762 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc00159f7d0 2 D0713 08:45:20.894410 345762 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:20.894823 345762 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.894843 345762 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc00159f7d0 3 D0713 08:45:20.894849 345762 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:20.900196 345762 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.900231 345762 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc00159f7d0 4 D0713 08:45:20.900244 345762 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:20.901280 345762 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.901312 345762 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc00159f7d0 5 D0713 08:45:20.901326 345762 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:20.901382 345762 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.901398 345762 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc00159f7d0 6 D0713 08:45:20.901406 345762 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:20.901588 345762 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.901610 345762 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc00159f7d0 7 D0713 08:45:20.901618 345762 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:20.901742 345762 usertrap_amd64.go:212] [ 989: 990] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.901758 345762 usertrap_amd64.go:122] [ 989: 990] Allocate a new trap: 0xc00159f7d0 8 D0713 08:45:20.901765 345762 usertrap_amd64.go:225] [ 989: 990] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:20.901969 345762 usertrap_amd64.go:212] [ 989: 990] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.901988 345762 usertrap_amd64.go:122] [ 989: 990] Allocate a new trap: 0xc00159f7d0 9 D0713 08:45:20.901995 345762 usertrap_amd64.go:225] [ 989: 990] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:20.902111 345762 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.902138 345762 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc00159f7d0 10 D0713 08:45:20.902149 345762 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:20.902239 345762 usertrap_amd64.go:212] [ 989: 992] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:20.902280 345762 usertrap_amd64.go:122] [ 989: 992] Allocate a new trap: 0xc00159f7d0 11 D0713 08:45:20.902302 345762 usertrap_amd64.go:225] [ 989: 992] Apply the binary patch addr 46b6e0 trap addr 69370 ([184 24 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:20.902556 345762 usertrap_amd64.go:212] [ 989: 990] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.902584 345762 usertrap_amd64.go:122] [ 989: 990] Allocate a new trap: 0xc00159f7d0 12 D0713 08:45:20.902598 345762 usertrap_amd64.go:225] [ 989: 990] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:20.902656 345762 usertrap_amd64.go:212] [ 989: 990] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.902674 345762 usertrap_amd64.go:122] [ 989: 990] Allocate a new trap: 0xc00159f7d0 13 D0713 08:45:20.902684 345762 usertrap_amd64.go:225] [ 989: 990] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:20.902713 345762 task_signals.go:470] [ 989: 989] Notified of signal 23 D0713 08:45:20.902768 345762 task_signals.go:220] [ 989: 989] Signal 23: delivering to handler D0713 08:45:20.909211 345762 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.909313 345762 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc00159f7d0 14 D0713 08:45:20.909337 345762 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46af29 trap addr 69460 ([184 37 1 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:20.913925 345762 task_signals.go:470] [ 989: 989] Notified of signal 23 D0713 08:45:20.914047 345762 task_signals.go:220] [ 989: 989] Signal 23: delivering to handler I0713 08:45:20.919484 345762 compat.go:120] Unsupported syscall pkey_free(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_free for more information. D0713 08:45:20.919569 345762 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.919585 345762 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc00159f7d0 15 D0713 08:45:20.919595 345762 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0713 08:45:20.919651 345762 task_exit.go:204] [ 989: 989] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.919671 345762 task_exit.go:204] [ 989: 989] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.919692 345762 task_signals.go:204] [ 989: 991] Signal 989, PID: 991, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.919731 345762 task_exit.go:204] [ 989: 991] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.919756 345762 task_exit.go:204] [ 989: 991] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.919761 345762 task_exit.go:204] [ 989: 991] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.919752 345762 task_signals.go:204] [ 989: 990] Signal 989, PID: 990, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.919790 345762 task_exit.go:204] [ 989: 990] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.919817 345762 task_exit.go:204] [ 989: 990] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.919823 345762 task_exit.go:204] [ 989: 990] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.919697 345762 task_signals.go:204] [ 989: 992] Signal 989, PID: 992, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.919850 345762 task_exit.go:204] [ 989: 992] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.919710 345762 task_signals.go:204] [ 989: 993] Signal 989, PID: 993, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.919855 345762 task_exit.go:204] [ 989: 992] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.919917 345762 task_exit.go:204] [ 989: 992] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.919951 345762 task_exit.go:204] [ 989: 993] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.921301 345762 task_exit.go:204] [ 989: 993] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.921331 345762 task_exit.go:204] [ 989: 993] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.921350 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.921379 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.921395 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.921501 345762 task_exit.go:204] [ 989: 989] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.922175 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.923663 345762 syscalls.go:262] [ 994: 994] Allocating stack with size of 8388608 bytes D0713 08:45:20.923805 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.924960 345762 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.925024 345762 usertrap_amd64.go:106] [ 994: 994] Map a usertrap vma at 69000 D0713 08:45:20.925155 345762 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc000993740 1 D0713 08:45:20.925184 345762 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:20.925620 345762 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.925649 345762 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc000993740 2 D0713 08:45:20.925664 345762 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:20.926402 345762 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.926425 345762 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc000993740 3 D0713 08:45:20.926435 345762 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:20.932147 345762 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.932173 345762 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc000993740 4 D0713 08:45:20.932183 345762 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:20.933228 345762 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.933248 345762 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc000993740 5 D0713 08:45:20.933255 345762 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:20.933275 345762 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.933280 345762 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc000993740 6 D0713 08:45:20.933286 345762 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:20.933635 345762 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.933649 345762 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc000993740 7 D0713 08:45:20.933654 345762 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:20.933769 345762 usertrap_amd64.go:212] [ 994: 995] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.933786 345762 usertrap_amd64.go:122] [ 994: 995] Allocate a new trap: 0xc000993740 8 D0713 08:45:20.933792 345762 usertrap_amd64.go:225] [ 994: 995] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:20.933925 345762 usertrap_amd64.go:212] [ 994: 995] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.933954 345762 usertrap_amd64.go:122] [ 994: 995] Allocate a new trap: 0xc000993740 9 D0713 08:45:20.933967 345762 usertrap_amd64.go:225] [ 994: 995] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:20.934165 345762 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.934192 345762 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc000993740 10 D0713 08:45:20.934232 345762 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:20.940825 345762 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.940849 345762 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc000993740 11 D0713 08:45:20.940859 345762 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:20.944365 345762 usertrap_amd64.go:212] [ 994: 995] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.944405 345762 usertrap_amd64.go:122] [ 994: 995] Allocate a new trap: 0xc000993740 12 D0713 08:45:20.944421 345762 usertrap_amd64.go:225] [ 994: 995] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:20.944528 345762 usertrap_amd64.go:212] [ 994: 995] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.944558 345762 usertrap_amd64.go:122] [ 994: 995] Allocate a new trap: 0xc000993740 13 D0713 08:45:20.944570 345762 usertrap_amd64.go:225] [ 994: 995] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:20.944633 345762 task_signals.go:470] [ 994: 994] Notified of signal 23 D0713 08:45:20.944698 345762 task_signals.go:220] [ 994: 994] Signal 23: delivering to handler I0713 08:45:20.950654 345762 compat.go:120] Unsupported syscall pkey_mprotect(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_mprotect for more information. D0713 08:45:20.950744 345762 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.950756 345762 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc000993740 14 D0713 08:45:20.950769 345762 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:20.950849 345762 task_exit.go:204] [ 994: 994] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.950877 345762 task_exit.go:204] [ 994: 994] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.950899 345762 task_signals.go:204] [ 994: 997] Signal 994, PID: 997, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.950912 345762 task_exit.go:204] [ 994: 997] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.950911 345762 task_signals.go:204] [ 994: 996] Signal 994, PID: 996, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.950921 345762 task_exit.go:204] [ 994: 997] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.950958 345762 task_exit.go:204] [ 994: 997] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.950996 345762 task_signals.go:204] [ 994: 998] Signal 994, PID: 998, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.951010 345762 task_exit.go:204] [ 994: 998] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.951019 345762 task_signals.go:204] [ 994: 995] Signal 994, PID: 995, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.951067 345762 task_exit.go:204] [ 994: 998] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.951071 345762 task_exit.go:204] [ 994: 998] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.951082 345762 task_exit.go:204] [ 994: 996] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.951095 345762 task_exit.go:204] [ 994: 996] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.951099 345762 task_exit.go:204] [ 994: 996] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.951108 345762 task_exit.go:204] [ 994: 995] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.952851 345762 task_exit.go:204] [ 994: 995] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.952884 345762 task_exit.go:204] [ 994: 995] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.952905 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.952989 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.953003 345762 task_exit.go:204] [ 994: 994] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.953016 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.953759 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.955465 345762 syscalls.go:262] [ 999: 999] Allocating stack with size of 8388608 bytes D0713 08:45:20.955688 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.956775 345762 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.956824 345762 usertrap_amd64.go:106] [ 999: 999] Map a usertrap vma at 67000 D0713 08:45:20.956908 345762 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc000a23b00 1 D0713 08:45:20.956975 345762 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:20.957359 345762 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.957382 345762 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc000a23b00 2 D0713 08:45:20.957391 345762 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:20.958017 345762 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.958036 345762 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc000a23b00 3 D0713 08:45:20.958042 345762 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:20.964370 345762 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.964422 345762 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc000a23b00 4 D0713 08:45:20.964446 345762 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:20.965733 345762 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.965760 345762 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc000a23b00 5 D0713 08:45:20.965772 345762 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:20.965838 345762 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.965844 345762 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc000a23b00 6 D0713 08:45:20.965850 345762 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:20.966460 345762 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.966480 345762 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc000a23b00 7 D0713 08:45:20.966494 345762 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:20.966710 345762 usertrap_amd64.go:212] [ 999: 1000] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.966749 345762 usertrap_amd64.go:122] [ 999: 1000] Allocate a new trap: 0xc000a23b00 8 D0713 08:45:20.966759 345762 usertrap_amd64.go:225] [ 999: 1000] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:20.967127 345762 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.967147 345762 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc000a23b00 9 D0713 08:45:20.967155 345762 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:20.967205 345762 usertrap_amd64.go:212] [ 999: 1000] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.967231 345762 usertrap_amd64.go:122] [ 999: 1000] Allocate a new trap: 0xc000a23b00 10 D0713 08:45:20.967242 345762 usertrap_amd64.go:225] [ 999: 1000] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:20.975374 345762 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.975396 345762 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc000a23b00 11 D0713 08:45:20.975404 345762 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:20.978003 345762 usertrap_amd64.go:212] [ 999: 1000] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.978030 345762 usertrap_amd64.go:122] [ 999: 1000] Allocate a new trap: 0xc000a23b00 12 D0713 08:45:20.978040 345762 usertrap_amd64.go:225] [ 999: 1000] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:20.978093 345762 usertrap_amd64.go:212] [ 999: 1000] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.978120 345762 usertrap_amd64.go:122] [ 999: 1000] Allocate a new trap: 0xc000a23b00 13 D0713 08:45:20.978130 345762 usertrap_amd64.go:225] [ 999: 1000] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:20.978154 345762 task_signals.go:470] [ 999: 999] Notified of signal 23 D0713 08:45:20.978214 345762 task_signals.go:220] [ 999: 999] Signal 23: delivering to handler D0713 08:45:20.985671 345762 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.985698 345762 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc000a23b00 14 D0713 08:45:20.985707 345762 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:20.985776 345762 task_exit.go:204] [ 999: 999] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.985831 345762 task_exit.go:204] [ 999: 999] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.985835 345762 task_signals.go:204] [ 999: 1002] Signal 999, PID: 1002, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.985849 345762 task_signals.go:204] [ 999: 1003] Signal 999, PID: 1003, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.985860 345762 task_exit.go:204] [ 999: 1002] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.985871 345762 task_exit.go:204] [ 999: 1002] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.985862 345762 task_signals.go:204] [ 999: 1001] Signal 999, PID: 1001, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.985876 345762 task_exit.go:204] [ 999: 1002] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.985929 345762 task_signals.go:204] [ 999: 1000] Signal 999, PID: 1000, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.985941 345762 task_exit.go:204] [ 999: 1003] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.985988 345762 task_exit.go:204] [ 999: 1003] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.986001 345762 task_exit.go:204] [ 999: 1003] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.986043 345762 task_exit.go:204] [ 999: 1001] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.986060 345762 task_exit.go:204] [ 999: 1001] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.986067 345762 task_exit.go:204] [ 999: 1001] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.986079 345762 task_exit.go:204] [ 999: 1000] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.987672 345762 task_exit.go:204] [ 999: 1000] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.987700 345762 task_exit.go:204] [ 999: 1000] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.987713 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:20.987789 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.987795 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:20.987948 345762 task_exit.go:204] [ 999: 999] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.988646 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.990206 345762 syscalls.go:262] [ 1004: 1004] Allocating stack with size of 8388608 bytes D0713 08:45:20.990458 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.992409 345762 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.992452 345762 usertrap_amd64.go:106] [ 1004: 1004] Map a usertrap vma at 67000 D0713 08:45:20.992538 345762 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc000993c80 1 D0713 08:45:20.992553 345762 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:20.993049 345762 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.993072 345762 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc000993c80 2 D0713 08:45:20.993082 345762 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:20.993948 345762 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.993981 345762 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc000993c80 3 D0713 08:45:20.994020 345762 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:21.000888 345762 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.000912 345762 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc000993c80 4 D0713 08:45:21.000922 345762 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:21.002216 345762 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.002252 345762 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc000993c80 5 D0713 08:45:21.002263 345762 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:21.002385 345762 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.002406 345762 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc000993c80 6 D0713 08:45:21.002412 345762 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:21.002789 345762 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.002804 345762 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc000993c80 7 D0713 08:45:21.002810 345762 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:21.002970 345762 usertrap_amd64.go:212] [ 1004: 1005] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.002996 345762 usertrap_amd64.go:122] [ 1004: 1005] Allocate a new trap: 0xc000993c80 8 D0713 08:45:21.003038 345762 usertrap_amd64.go:225] [ 1004: 1005] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:21.003230 345762 usertrap_amd64.go:212] [ 1004: 1005] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.003247 345762 usertrap_amd64.go:122] [ 1004: 1005] Allocate a new trap: 0xc000993c80 9 D0713 08:45:21.003255 345762 usertrap_amd64.go:225] [ 1004: 1005] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:21.003288 345762 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.003295 345762 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc000993c80 10 D0713 08:45:21.003304 345762 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:21.010974 345762 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.011003 345762 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc000993c80 11 D0713 08:45:21.011015 345762 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:21.013425 345762 usertrap_amd64.go:212] [ 1004: 1005] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.013467 345762 usertrap_amd64.go:122] [ 1004: 1005] Allocate a new trap: 0xc000993c80 12 D0713 08:45:21.013479 345762 usertrap_amd64.go:225] [ 1004: 1005] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:21.013533 345762 usertrap_amd64.go:212] [ 1004: 1005] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.013539 345762 usertrap_amd64.go:122] [ 1004: 1005] Allocate a new trap: 0xc000993c80 13 D0713 08:45:21.013556 345762 usertrap_amd64.go:225] [ 1004: 1005] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:21.013570 345762 task_signals.go:470] [ 1004: 1004] Notified of signal 23 D0713 08:45:21.013656 345762 task_signals.go:220] [ 1004: 1004] Signal 23: delivering to handler D0713 08:45:21.021525 345762 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.021552 345762 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc000993c80 14 D0713 08:45:21.021561 345762 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:21.021620 345762 task_exit.go:204] [ 1004: 1004] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.021637 345762 task_exit.go:204] [ 1004: 1004] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.021685 345762 task_signals.go:204] [ 1004: 1005] Signal 1004, PID: 1005, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.021712 345762 task_signals.go:204] [ 1004: 1006] Signal 1004, PID: 1006, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.021719 345762 task_exit.go:204] [ 1004: 1006] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.021725 345762 task_exit.go:204] [ 1004: 1006] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.021729 345762 task_exit.go:204] [ 1004: 1006] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.021741 345762 task_signals.go:204] [ 1004: 1008] Signal 1004, PID: 1008, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.021725 345762 task_signals.go:204] [ 1004: 1007] Signal 1004, PID: 1007, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.021759 345762 task_exit.go:204] [ 1004: 1005] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.021797 345762 task_exit.go:204] [ 1004: 1005] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.021809 345762 task_exit.go:204] [ 1004: 1005] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.021831 345762 task_exit.go:204] [ 1004: 1008] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.021861 345762 task_exit.go:204] [ 1004: 1008] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.021867 345762 task_exit.go:204] [ 1004: 1008] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.021883 345762 task_exit.go:204] [ 1004: 1007] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.023316 345762 task_exit.go:204] [ 1004: 1007] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.023345 345762 task_exit.go:204] [ 1004: 1007] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.023356 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.023387 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.023427 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.023583 345762 task_exit.go:204] [ 1004: 1004] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.023741 345762 task_signals.go:470] [ 5: 16] Notified of signal 23 D0713 08:45:21.023795 345762 task_signals.go:220] [ 5: 16] Signal 23: delivering to handler D0713 08:45:21.024649 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.026514 345762 syscalls.go:262] [ 1009: 1009] Allocating stack with size of 8388608 bytes D0713 08:45:21.026734 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.027860 345762 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.027900 345762 usertrap_amd64.go:106] [ 1009: 1009] Map a usertrap vma at 6a000 D0713 08:45:21.027970 345762 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc000a23d70 1 D0713 08:45:21.027983 345762 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:21.028215 345762 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.028232 345762 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc000a23d70 2 D0713 08:45:21.028237 345762 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:21.028724 345762 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.028740 345762 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc000a23d70 3 D0713 08:45:21.028754 345762 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:21.035035 345762 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.035064 345762 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc000a23d70 4 D0713 08:45:21.035075 345762 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:21.036528 345762 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.036562 345762 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc000a23d70 5 D0713 08:45:21.036571 345762 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:21.036624 345762 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.036632 345762 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc000a23d70 6 D0713 08:45:21.036639 345762 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:21.036845 345762 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.036866 345762 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc000a23d70 7 D0713 08:45:21.036873 345762 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:21.037192 345762 usertrap_amd64.go:212] [ 1009: 1010] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.037216 345762 usertrap_amd64.go:122] [ 1009: 1010] Allocate a new trap: 0xc000a23d70 8 D0713 08:45:21.037225 345762 usertrap_amd64.go:225] [ 1009: 1010] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:21.037375 345762 usertrap_amd64.go:212] [ 1009: 1010] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:21.037407 345762 usertrap_amd64.go:122] [ 1009: 1010] Allocate a new trap: 0xc000a23d70 9 D0713 08:45:21.037418 345762 usertrap_amd64.go:225] [ 1009: 1010] Apply the binary patch addr 46b6e0 trap addr 6a2d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:21.037556 345762 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.037565 345762 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc000a23d70 10 D0713 08:45:21.037571 345762 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:21.037602 345762 usertrap_amd64.go:212] [ 1009: 1010] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.037612 345762 usertrap_amd64.go:122] [ 1009: 1010] Allocate a new trap: 0xc000a23d70 11 D0713 08:45:21.037620 345762 usertrap_amd64.go:225] [ 1009: 1010] Apply the binary patch addr 46af76 trap addr 6a370 ([184 35 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:21.046075 345762 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.046104 345762 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc000a23d70 12 D0713 08:45:21.046114 345762 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46af29 trap addr 6a3c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:21.048565 345762 usertrap_amd64.go:212] [ 1009: 1010] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.048636 345762 usertrap_amd64.go:122] [ 1009: 1010] Allocate a new trap: 0xc000a23d70 13 D0713 08:45:21.048663 345762 usertrap_amd64.go:225] [ 1009: 1010] Apply the binary patch addr 46b020 trap addr 6a410 ([184 39 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:21.048771 345762 usertrap_amd64.go:212] [ 1009: 1010] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.048795 345762 usertrap_amd64.go:122] [ 1009: 1010] Allocate a new trap: 0xc000a23d70 14 D0713 08:45:21.048807 345762 usertrap_amd64.go:225] [ 1009: 1010] Apply the binary patch addr 46b04f trap addr 6a460 ([184 234 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:21.048875 345762 task_signals.go:470] [ 1009: 1009] Notified of signal 23 D0713 08:45:21.048992 345762 task_signals.go:220] [ 1009: 1009] Signal 23: delivering to handler D0713 08:45:21.057845 345762 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.057877 345762 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc000a23d70 15 D0713 08:45:21.057890 345762 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 08:45:21.057972 345762 task_exit.go:204] [ 1009: 1009] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.057995 345762 task_exit.go:204] [ 1009: 1009] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.058027 345762 task_signals.go:204] [ 1009: 1011] Signal 1009, PID: 1011, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.058047 345762 task_signals.go:204] [ 1009: 1013] Signal 1009, PID: 1013, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.058051 345762 task_exit.go:204] [ 1009: 1011] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.058066 345762 task_exit.go:204] [ 1009: 1011] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.058071 345762 task_exit.go:204] [ 1009: 1011] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.058098 345762 task_exit.go:204] [ 1009: 1013] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.058120 345762 task_exit.go:204] [ 1009: 1013] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.058126 345762 task_exit.go:204] [ 1009: 1013] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.058029 345762 task_signals.go:204] [ 1009: 1012] Signal 1009, PID: 1012, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.058138 345762 task_exit.go:204] [ 1009: 1012] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.058147 345762 task_exit.go:204] [ 1009: 1012] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.058152 345762 task_exit.go:204] [ 1009: 1012] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.058165 345762 task_signals.go:204] [ 1009: 1010] Signal 1009, PID: 1010, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.058176 345762 task_exit.go:204] [ 1009: 1010] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.059690 345762 task_exit.go:204] [ 1009: 1010] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.059725 345762 task_exit.go:204] [ 1009: 1010] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.059739 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.059773 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.059822 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.059896 345762 task_exit.go:204] [ 1009: 1009] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.060803 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.062242 345762 syscalls.go:262] [ 1014: 1014] Allocating stack with size of 8388608 bytes D0713 08:45:21.062412 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.063761 345762 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.063797 345762 usertrap_amd64.go:106] [ 1014: 1014] Map a usertrap vma at 65000 D0713 08:45:21.063895 345762 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000c92060 1 D0713 08:45:21.063936 345762 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:21.064472 345762 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.064514 345762 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000c92060 2 D0713 08:45:21.064543 345762 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:21.065493 345762 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.065516 345762 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000c92060 3 D0713 08:45:21.065525 345762 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:21.071639 345762 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.071682 345762 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000c92060 4 D0713 08:45:21.071697 345762 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:21.073117 345762 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.073140 345762 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000c92060 5 D0713 08:45:21.073148 345762 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:21.073214 345762 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.073225 345762 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000c92060 6 D0713 08:45:21.073231 345762 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:21.073636 345762 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.073653 345762 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000c92060 7 D0713 08:45:21.073660 345762 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:21.073791 345762 usertrap_amd64.go:212] [ 1014: 1015] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.073808 345762 usertrap_amd64.go:122] [ 1014: 1015] Allocate a new trap: 0xc000c92060 8 D0713 08:45:21.073813 345762 usertrap_amd64.go:225] [ 1014: 1015] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:21.074101 345762 usertrap_amd64.go:212] [ 1014: 1015] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.074126 345762 usertrap_amd64.go:122] [ 1014: 1015] Allocate a new trap: 0xc000c92060 9 D0713 08:45:21.074171 345762 usertrap_amd64.go:225] [ 1014: 1015] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:21.074333 345762 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.074366 345762 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000c92060 10 D0713 08:45:21.074373 345762 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:21.082749 345762 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.082792 345762 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000c92060 11 D0713 08:45:21.082813 345762 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:21.086520 345762 usertrap_amd64.go:212] [ 1014: 1015] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.086552 345762 usertrap_amd64.go:122] [ 1014: 1015] Allocate a new trap: 0xc000c92060 12 D0713 08:45:21.086562 345762 usertrap_amd64.go:225] [ 1014: 1015] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:21.086586 345762 usertrap_amd64.go:212] [ 1014: 1015] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.086592 345762 usertrap_amd64.go:122] [ 1014: 1015] Allocate a new trap: 0xc000c92060 13 D0713 08:45:21.086602 345762 usertrap_amd64.go:225] [ 1014: 1015] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:21.086664 345762 task_signals.go:470] [ 1014: 1014] Notified of signal 23 D0713 08:45:21.086784 345762 task_signals.go:220] [ 1014: 1014] Signal 23: delivering to handler D0713 08:45:21.093607 345762 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.093635 345762 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000c92060 14 D0713 08:45:21.093653 345762 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:21.093778 345762 task_exit.go:204] [ 1014: 1014] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.093823 345762 task_exit.go:204] [ 1014: 1014] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.093839 345762 task_signals.go:204] [ 1014: 1016] Signal 1014, PID: 1016, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.093863 345762 task_signals.go:204] [ 1014: 1019] Signal 1014, PID: 1019, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.093871 345762 task_exit.go:204] [ 1014: 1016] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.093850 345762 task_signals.go:204] [ 1014: 1017] Signal 1014, PID: 1017, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.093893 345762 task_exit.go:204] [ 1014: 1016] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.093901 345762 task_exit.go:204] [ 1014: 1016] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.093923 345762 task_signals.go:204] [ 1014: 1018] Signal 1014, PID: 1018, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.093943 345762 task_exit.go:204] [ 1014: 1018] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.093950 345762 task_exit.go:204] [ 1014: 1018] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.093954 345762 task_exit.go:204] [ 1014: 1018] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.093965 345762 task_exit.go:204] [ 1014: 1017] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.093991 345762 task_exit.go:204] [ 1014: 1017] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.093997 345762 task_exit.go:204] [ 1014: 1017] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.094024 345762 task_exit.go:204] [ 1014: 1019] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.094032 345762 task_exit.go:204] [ 1014: 1019] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.094045 345762 task_exit.go:204] [ 1014: 1019] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.094058 345762 task_signals.go:204] [ 1014: 1015] Signal 1014, PID: 1015, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.094068 345762 task_exit.go:204] [ 1014: 1015] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.095572 345762 task_exit.go:204] [ 1014: 1015] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.095598 345762 task_exit.go:204] [ 1014: 1015] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.095610 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.095632 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.095639 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.095762 345762 task_exit.go:204] [ 1014: 1014] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.096561 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.097829 345762 syscalls.go:262] [ 1020: 1020] Allocating stack with size of 8388608 bytes D0713 08:45:21.097953 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.099494 345762 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.099532 345762 usertrap_amd64.go:106] [ 1020: 1020] Map a usertrap vma at 6a000 D0713 08:45:21.099627 345762 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc001681110 1 D0713 08:45:21.099670 345762 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:21.100140 345762 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.100158 345762 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc001681110 2 D0713 08:45:21.100164 345762 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:21.101106 345762 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.101140 345762 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc001681110 3 D0713 08:45:21.101155 345762 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:21.106524 345762 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.106561 345762 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc001681110 4 D0713 08:45:21.106572 345762 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:21.107660 345762 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.107678 345762 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc001681110 5 D0713 08:45:21.107685 345762 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:21.107697 345762 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.107702 345762 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc001681110 6 D0713 08:45:21.107707 345762 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:21.107867 345762 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.107890 345762 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc001681110 7 D0713 08:45:21.107896 345762 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:21.108034 345762 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.108050 345762 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc001681110 8 D0713 08:45:21.108057 345762 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:21.108331 345762 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.108357 345762 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc001681110 9 D0713 08:45:21.108367 345762 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:21.108581 345762 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.108616 345762 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc001681110 10 D0713 08:45:21.108632 345762 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:21.108712 345762 usertrap_amd64.go:212] [ 1020: 1023] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:21.108742 345762 usertrap_amd64.go:122] [ 1020: 1023] Allocate a new trap: 0xc001681110 11 D0713 08:45:21.108754 345762 usertrap_amd64.go:225] [ 1020: 1023] Apply the binary patch addr 46b6e0 trap addr 6a370 ([184 24 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:21.116614 345762 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.116656 345762 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc001681110 12 D0713 08:45:21.116685 345762 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46af29 trap addr 6a3c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:21.119308 345762 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.119342 345762 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc001681110 13 D0713 08:45:21.119358 345762 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46b020 trap addr 6a410 ([184 39 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:21.119410 345762 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.119416 345762 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc001681110 14 D0713 08:45:21.119424 345762 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46b04f trap addr 6a460 ([184 234 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:21.119466 345762 task_signals.go:470] [ 1020: 1020] Notified of signal 23 D0713 08:45:21.119506 345762 task_signals.go:220] [ 1020: 1020] Signal 23: delivering to handler D0713 08:45:21.127134 345762 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.127169 345762 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc001681110 15 D0713 08:45:21.127184 345762 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 08:45:21.127231 345762 task_exit.go:204] [ 1020: 1020] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.127258 345762 task_exit.go:204] [ 1020: 1020] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.127271 345762 task_signals.go:204] [ 1020: 1021] Signal 1020, PID: 1021, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.127284 345762 task_signals.go:204] [ 1020: 1023] Signal 1020, PID: 1023, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.127302 345762 task_exit.go:204] [ 1020: 1021] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.127329 345762 task_signals.go:204] [ 1020: 1022] Signal 1020, PID: 1022, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.127345 345762 task_signals.go:204] [ 1020: 1024] Signal 1020, PID: 1024, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.127361 345762 task_exit.go:204] [ 1020: 1021] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.127382 345762 task_exit.go:204] [ 1020: 1021] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.127396 345762 task_exit.go:204] [ 1020: 1023] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.127414 345762 task_exit.go:204] [ 1020: 1023] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.127419 345762 task_exit.go:204] [ 1020: 1023] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.127427 345762 task_exit.go:204] [ 1020: 1022] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.127437 345762 task_exit.go:204] [ 1020: 1022] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.127441 345762 task_exit.go:204] [ 1020: 1022] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.127450 345762 task_exit.go:204] [ 1020: 1024] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.128796 345762 task_exit.go:204] [ 1020: 1024] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.128830 345762 task_exit.go:204] [ 1020: 1024] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.128887 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.128911 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.128926 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.128992 345762 task_exit.go:204] [ 1020: 1020] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.129771 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.131580 345762 syscalls.go:262] [ 1025: 1025] Allocating stack with size of 8388608 bytes D0713 08:45:21.131708 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.132966 345762 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.133008 345762 usertrap_amd64.go:106] [ 1025: 1025] Map a usertrap vma at 65000 D0713 08:45:21.133104 345762 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000197110 1 D0713 08:45:21.133124 345762 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:21.133627 345762 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.133652 345762 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000197110 2 D0713 08:45:21.133661 345762 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:21.134270 345762 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.134290 345762 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000197110 3 D0713 08:45:21.134296 345762 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:21.140286 345762 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.140314 345762 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000197110 4 D0713 08:45:21.140324 345762 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:21.141304 345762 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.141327 345762 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000197110 5 D0713 08:45:21.141335 345762 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:21.141378 345762 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.141383 345762 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000197110 6 D0713 08:45:21.141389 345762 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:21.141538 345762 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.141553 345762 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000197110 7 D0713 08:45:21.141558 345762 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:21.141658 345762 usertrap_amd64.go:212] [ 1025: 1026] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.141671 345762 usertrap_amd64.go:122] [ 1025: 1026] Allocate a new trap: 0xc000197110 8 D0713 08:45:21.141677 345762 usertrap_amd64.go:225] [ 1025: 1026] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:21.141829 345762 usertrap_amd64.go:212] [ 1025: 1026] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.141859 345762 usertrap_amd64.go:122] [ 1025: 1026] Allocate a new trap: 0xc000197110 9 D0713 08:45:21.141875 345762 usertrap_amd64.go:225] [ 1025: 1026] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:21.141946 345762 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.141980 345762 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000197110 10 D0713 08:45:21.141993 345762 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:21.142418 345762 usertrap_amd64.go:212] [ 1025: 1026] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.142440 345762 usertrap_amd64.go:122] [ 1025: 1026] Allocate a new trap: 0xc000197110 11 D0713 08:45:21.142453 345762 usertrap_amd64.go:225] [ 1025: 1026] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:21.142511 345762 usertrap_amd64.go:212] [ 1025: 1026] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.142557 345762 usertrap_amd64.go:122] [ 1025: 1026] Allocate a new trap: 0xc000197110 12 D0713 08:45:21.142568 345762 usertrap_amd64.go:225] [ 1025: 1026] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:21.142608 345762 task_signals.go:470] [ 1025: 1025] Notified of signal 23 D0713 08:45:21.142679 345762 task_signals.go:220] [ 1025: 1025] Signal 23: delivering to handler D0713 08:45:21.149751 345762 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.149765 345762 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000197110 13 D0713 08:45:21.149774 345762 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:21.153558 345762 task_signals.go:470] [ 1025: 1025] Notified of signal 23 D0713 08:45:21.153606 345762 task_signals.go:220] [ 1025: 1025] Signal 23: delivering to handler D0713 08:45:21.160171 345762 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.160201 345762 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000197110 14 D0713 08:45:21.160212 345762 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:21.160286 345762 task_exit.go:204] [ 1025: 1025] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.160342 345762 task_exit.go:204] [ 1025: 1025] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.160374 345762 task_signals.go:204] [ 1025: 1029] Signal 1025, PID: 1029, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.160389 345762 task_signals.go:204] [ 1025: 1026] Signal 1025, PID: 1026, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.160438 345762 task_signals.go:204] [ 1025: 1028] Signal 1025, PID: 1028, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.160438 345762 task_exit.go:204] [ 1025: 1029] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.160497 345762 task_signals.go:204] [ 1025: 1027] Signal 1025, PID: 1027, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.160520 345762 task_exit.go:204] [ 1025: 1029] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.160534 345762 task_exit.go:204] [ 1025: 1029] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.160550 345762 task_exit.go:204] [ 1025: 1028] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.160590 345762 task_exit.go:204] [ 1025: 1028] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.160599 345762 task_exit.go:204] [ 1025: 1028] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.160614 345762 task_exit.go:204] [ 1025: 1026] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.160624 345762 task_exit.go:204] [ 1025: 1026] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.160630 345762 task_exit.go:204] [ 1025: 1026] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.160650 345762 task_exit.go:204] [ 1025: 1027] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.162069 345762 task_exit.go:204] [ 1025: 1027] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.162094 345762 task_exit.go:204] [ 1025: 1027] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.162105 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.162148 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.162167 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.162260 345762 task_exit.go:204] [ 1025: 1025] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.162905 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.164422 345762 syscalls.go:262] [ 1030: 1030] Allocating stack with size of 8388608 bytes D0713 08:45:21.164609 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.166268 345762 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.166303 345762 usertrap_amd64.go:106] [ 1030: 1030] Map a usertrap vma at 62000 D0713 08:45:21.166400 345762 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc0013a65a0 1 D0713 08:45:21.166424 345762 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:21.166924 345762 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.166947 345762 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc0013a65a0 2 D0713 08:45:21.166956 345762 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:21.167472 345762 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.167490 345762 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc0013a65a0 3 D0713 08:45:21.167497 345762 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:21.172984 345762 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.173018 345762 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc0013a65a0 4 D0713 08:45:21.173031 345762 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:21.174334 345762 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.174365 345762 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc0013a65a0 5 D0713 08:45:21.174378 345762 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:21.174427 345762 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.174439 345762 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc0013a65a0 6 D0713 08:45:21.174448 345762 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:21.174692 345762 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.174736 345762 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc0013a65a0 7 D0713 08:45:21.174751 345762 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:21.174959 345762 usertrap_amd64.go:212] [ 1030: 1031] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.174984 345762 usertrap_amd64.go:122] [ 1030: 1031] Allocate a new trap: 0xc0013a65a0 8 D0713 08:45:21.174993 345762 usertrap_amd64.go:225] [ 1030: 1031] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:21.175164 345762 usertrap_amd64.go:212] [ 1030: 1032] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.175188 345762 usertrap_amd64.go:122] [ 1030: 1032] Allocate a new trap: 0xc0013a65a0 9 D0713 08:45:21.175199 345762 usertrap_amd64.go:225] [ 1030: 1032] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:21.175340 345762 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.175365 345762 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc0013a65a0 10 D0713 08:45:21.175373 345762 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:21.183256 345762 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.183280 345762 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc0013a65a0 11 D0713 08:45:21.183290 345762 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:21.186955 345762 usertrap_amd64.go:212] [ 1030: 1031] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.186981 345762 usertrap_amd64.go:122] [ 1030: 1031] Allocate a new trap: 0xc0013a65a0 12 D0713 08:45:21.186994 345762 usertrap_amd64.go:225] [ 1030: 1031] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:21.187114 345762 usertrap_amd64.go:212] [ 1030: 1031] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.187151 345762 usertrap_amd64.go:122] [ 1030: 1031] Allocate a new trap: 0xc0013a65a0 13 D0713 08:45:21.187170 345762 usertrap_amd64.go:225] [ 1030: 1031] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:21.187228 345762 task_signals.go:470] [ 1030: 1030] Notified of signal 23 D0713 08:45:21.187326 345762 task_signals.go:220] [ 1030: 1030] Signal 23: delivering to handler D0713 08:45:21.194319 345762 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.194345 345762 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc0013a65a0 14 D0713 08:45:21.194355 345762 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:21.194421 345762 task_exit.go:204] [ 1030: 1030] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.194439 345762 task_exit.go:204] [ 1030: 1030] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.194466 345762 task_signals.go:204] [ 1030: 1033] Signal 1030, PID: 1033, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.194484 345762 task_exit.go:204] [ 1030: 1033] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.194493 345762 task_exit.go:204] [ 1030: 1033] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.194490 345762 task_signals.go:204] [ 1030: 1032] Signal 1030, PID: 1032, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.194509 345762 task_exit.go:204] [ 1030: 1033] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.194553 345762 task_signals.go:204] [ 1030: 1031] Signal 1030, PID: 1031, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.194566 345762 task_exit.go:204] [ 1030: 1031] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.194588 345762 task_signals.go:204] [ 1030: 1034] Signal 1030, PID: 1034, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.194606 345762 task_exit.go:204] [ 1030: 1031] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.194624 345762 task_exit.go:204] [ 1030: 1031] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.194641 345762 task_exit.go:204] [ 1030: 1032] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.194650 345762 task_exit.go:204] [ 1030: 1032] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.194654 345762 task_exit.go:204] [ 1030: 1032] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.194661 345762 task_exit.go:204] [ 1030: 1034] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.196142 345762 task_exit.go:204] [ 1030: 1034] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.196179 345762 task_exit.go:204] [ 1030: 1034] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.196203 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.196241 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.196252 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.196462 345762 task_exit.go:204] [ 1030: 1030] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.197390 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.198828 345762 syscalls.go:262] [ 1035: 1035] Allocating stack with size of 8388608 bytes D0713 08:45:21.199013 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.200401 345762 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.200474 345762 usertrap_amd64.go:106] [ 1035: 1035] Map a usertrap vma at 6a000 D0713 08:45:21.200566 345762 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc000c92570 1 D0713 08:45:21.200617 345762 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:21.201083 345762 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.201113 345762 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc000c92570 2 D0713 08:45:21.201137 345762 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:21.201781 345762 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.201803 345762 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc000c92570 3 D0713 08:45:21.201813 345762 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:21.207699 345762 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.207726 345762 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc000c92570 4 D0713 08:45:21.207744 345762 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:21.208846 345762 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.208868 345762 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc000c92570 5 D0713 08:45:21.208876 345762 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:21.208919 345762 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.208924 345762 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc000c92570 6 D0713 08:45:21.208929 345762 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:21.209112 345762 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.209126 345762 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc000c92570 7 D0713 08:45:21.209132 345762 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:21.209236 345762 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.209252 345762 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc000c92570 8 D0713 08:45:21.209258 345762 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:21.209429 345762 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.209457 345762 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc000c92570 9 D0713 08:45:21.209468 345762 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:21.209662 345762 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.209686 345762 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc000c92570 10 D0713 08:45:21.209697 345762 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:21.216322 345762 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.216350 345762 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc000c92570 11 D0713 08:45:21.216362 345762 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:21.220228 345762 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.220251 345762 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc000c92570 12 D0713 08:45:21.220261 345762 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:21.220336 345762 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.220350 345762 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc000c92570 13 D0713 08:45:21.220358 345762 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:21.220422 345762 task_signals.go:470] [ 1035: 1035] Notified of signal 23 D0713 08:45:21.220515 345762 task_signals.go:220] [ 1035: 1035] Signal 23: delivering to handler I0713 08:45:21.226937 345762 compat.go:120] Unsupported syscall sys_440(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_440 for more information. D0713 08:45:21.227021 345762 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.227029 345762 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc000c92570 14 D0713 08:45:21.227038 345762 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:21.227066 345762 task_exit.go:204] [ 1035: 1035] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.227083 345762 task_exit.go:204] [ 1035: 1035] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.227105 345762 task_signals.go:204] [ 1035: 1038] Signal 1035, PID: 1038, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.227128 345762 task_exit.go:204] [ 1035: 1038] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.227127 345762 task_signals.go:204] [ 1035: 1039] Signal 1035, PID: 1039, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.227138 345762 task_exit.go:204] [ 1035: 1038] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.227158 345762 task_exit.go:204] [ 1035: 1038] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.227106 345762 task_signals.go:204] [ 1035: 1037] Signal 1035, PID: 1037, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.227177 345762 task_exit.go:204] [ 1035: 1037] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.227189 345762 task_exit.go:204] [ 1035: 1037] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.227195 345762 task_exit.go:204] [ 1035: 1037] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.227124 345762 task_signals.go:204] [ 1035: 1036] Signal 1035, PID: 1036, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.227216 345762 task_exit.go:204] [ 1035: 1039] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.227232 345762 task_exit.go:204] [ 1035: 1039] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.227248 345762 task_exit.go:204] [ 1035: 1039] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.227259 345762 task_exit.go:204] [ 1035: 1036] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.228807 345762 task_exit.go:204] [ 1035: 1036] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.228833 345762 task_exit.go:204] [ 1035: 1036] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.228852 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.228882 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.228901 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.228981 345762 task_exit.go:204] [ 1035: 1035] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.229517 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.230965 345762 syscalls.go:262] [ 1040: 1040] Allocating stack with size of 8388608 bytes D0713 08:45:21.231200 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.232743 345762 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.232785 345762 usertrap_amd64.go:106] [ 1040: 1040] Map a usertrap vma at 64000 D0713 08:45:21.232878 345762 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0016814a0 1 D0713 08:45:21.232900 345762 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:21.233404 345762 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.233431 345762 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0016814a0 2 D0713 08:45:21.233442 345762 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:21.234118 345762 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.234138 345762 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0016814a0 3 D0713 08:45:21.234146 345762 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:21.239942 345762 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.239968 345762 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0016814a0 4 D0713 08:45:21.239977 345762 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:21.241087 345762 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.241106 345762 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0016814a0 5 D0713 08:45:21.241113 345762 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:21.241127 345762 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.241132 345762 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0016814a0 6 D0713 08:45:21.241137 345762 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:21.241487 345762 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.241503 345762 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0016814a0 7 D0713 08:45:21.241511 345762 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:21.241654 345762 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.241676 345762 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc0016814a0 8 D0713 08:45:21.241685 345762 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:21.241909 345762 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.241940 345762 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0016814a0 9 D0713 08:45:21.241953 345762 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:21.241974 345762 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.241986 345762 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc0016814a0 10 D0713 08:45:21.241993 345762 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:21.248774 345762 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.248796 345762 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0016814a0 11 D0713 08:45:21.248804 345762 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:21.252477 345762 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.252519 345762 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc0016814a0 12 D0713 08:45:21.252531 345762 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:21.252597 345762 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.252603 345762 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc0016814a0 13 D0713 08:45:21.252608 345762 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:21.252672 345762 task_signals.go:470] [ 1040: 1040] Notified of signal 23 D0713 08:45:21.252743 345762 task_signals.go:220] [ 1040: 1040] Signal 23: delivering to handler I0713 08:45:21.259558 345762 compat.go:120] Unsupported syscall sys_448(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_448 for more information. D0713 08:45:21.259651 345762 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.259667 345762 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0016814a0 14 D0713 08:45:21.259676 345762 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:21.259743 345762 task_exit.go:204] [ 1040: 1040] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.259768 345762 task_exit.go:204] [ 1040: 1040] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.259779 345762 task_signals.go:204] [ 1040: 1041] Signal 1040, PID: 1041, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.259784 345762 task_signals.go:204] [ 1040: 1042] Signal 1040, PID: 1042, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.259804 345762 task_exit.go:204] [ 1040: 1042] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.259824 345762 task_exit.go:204] [ 1040: 1042] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.259830 345762 task_exit.go:204] [ 1040: 1042] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.259803 345762 task_signals.go:204] [ 1040: 1043] Signal 1040, PID: 1043, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.259844 345762 task_exit.go:204] [ 1040: 1041] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.259804 345762 task_signals.go:204] [ 1040: 1044] Signal 1040, PID: 1044, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.259963 345762 task_exit.go:204] [ 1040: 1041] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.260015 345762 task_exit.go:204] [ 1040: 1041] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.260116 345762 task_exit.go:204] [ 1040: 1044] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.260157 345762 task_exit.go:204] [ 1040: 1044] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.260170 345762 task_exit.go:204] [ 1040: 1044] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.260186 345762 task_exit.go:204] [ 1040: 1043] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.261817 345762 task_exit.go:204] [ 1040: 1043] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.261865 345762 task_exit.go:204] [ 1040: 1043] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.261883 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.261921 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.261937 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.262031 345762 task_exit.go:204] [ 1040: 1040] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.262298 345762 task_signals.go:470] [ 5: 21] Notified of signal 23 D0713 08:45:21.262375 345762 task_signals.go:220] [ 5: 21] Signal 23: delivering to handler D0713 08:45:21.262989 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.264192 345762 syscalls.go:262] [ 1045: 1045] Allocating stack with size of 8388608 bytes D0713 08:45:21.264283 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.265903 345762 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.265985 345762 usertrap_amd64.go:106] [ 1045: 1045] Map a usertrap vma at 62000 D0713 08:45:21.266115 345762 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0026741e0 1 D0713 08:45:21.266148 345762 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:21.266537 345762 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.266561 345762 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0026741e0 2 D0713 08:45:21.266572 345762 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:21.267277 345762 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.267382 345762 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0026741e0 3 D0713 08:45:21.267402 345762 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:21.273719 345762 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.273753 345762 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0026741e0 4 D0713 08:45:21.273766 345762 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:21.275123 345762 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.275150 345762 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0026741e0 5 D0713 08:45:21.275162 345762 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:21.275221 345762 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.275235 345762 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0026741e0 6 D0713 08:45:21.275245 345762 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:21.275678 345762 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.275694 345762 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0026741e0 7 D0713 08:45:21.275701 345762 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:21.276910 345762 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.276980 345762 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc0026741e0 8 D0713 08:45:21.277003 345762 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:21.277356 345762 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.277380 345762 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc0026741e0 9 D0713 08:45:21.277393 345762 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:21.278287 345762 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.278712 345762 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0026741e0 10 D0713 08:45:21.279109 345762 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:21.279245 345762 usertrap_amd64.go:212] [ 1045: 1048] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:21.279280 345762 usertrap_amd64.go:122] [ 1045: 1048] Allocate a new trap: 0xc0026741e0 11 D0713 08:45:21.279292 345762 usertrap_amd64.go:225] [ 1045: 1048] Apply the binary patch addr 46b6e0 trap addr 62370 ([184 24 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:21.288477 345762 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.288538 345762 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0026741e0 12 D0713 08:45:21.288552 345762 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46af29 trap addr 623c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:21.291041 345762 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.291091 345762 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc0026741e0 13 D0713 08:45:21.291109 345762 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b020 trap addr 62410 ([184 39 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:21.291133 345762 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.291138 345762 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc0026741e0 14 D0713 08:45:21.291144 345762 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b04f trap addr 62460 ([184 234 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:21.291165 345762 task_signals.go:470] [ 1045: 1045] Notified of signal 23 D0713 08:45:21.291207 345762 task_signals.go:220] [ 1045: 1045] Signal 23: delivering to handler I0713 08:45:21.299731 345762 compat.go:120] Unsupported syscall process_vm_readv(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_readv for more information. D0713 08:45:21.299815 345762 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.299828 345762 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0026741e0 15 D0713 08:45:21.299837 345762 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0713 08:45:21.299866 345762 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.299881 345762 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.299901 345762 task_signals.go:204] [ 1045: 1048] Signal 1045, PID: 1048, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.299910 345762 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.299916 345762 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.299922 345762 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.299945 345762 task_signals.go:204] [ 1045: 1050] Signal 1045, PID: 1050, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.299940 345762 task_signals.go:204] [ 1045: 1047] Signal 1045, PID: 1047, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.299970 345762 task_exit.go:204] [ 1045: 1050] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.299972 345762 task_signals.go:204] [ 1045: 1046] Signal 1045, PID: 1046, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.299949 345762 task_signals.go:204] [ 1045: 1049] Signal 1045, PID: 1049, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.299999 345762 task_exit.go:204] [ 1045: 1050] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.300013 345762 task_exit.go:204] [ 1045: 1050] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.300031 345762 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.300037 345762 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.300041 345762 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.300049 345762 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.300056 345762 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.300060 345762 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.300068 345762 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.301675 345762 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.301718 345762 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.301732 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.301758 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.301773 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.301849 345762 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.302470 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.303888 345762 syscalls.go:262] [ 1051: 1051] Allocating stack with size of 8388608 bytes D0713 08:45:21.303981 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.305820 345762 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.305868 345762 usertrap_amd64.go:106] [ 1051: 1051] Map a usertrap vma at 62000 D0713 08:45:21.305943 345762 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000196150 1 D0713 08:45:21.305959 345762 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:21.306320 345762 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.306338 345762 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000196150 2 D0713 08:45:21.306345 345762 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:21.306915 345762 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.306934 345762 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000196150 3 D0713 08:45:21.306941 345762 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:21.312973 345762 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.312996 345762 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000196150 4 D0713 08:45:21.313008 345762 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:21.314124 345762 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.314139 345762 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000196150 5 D0713 08:45:21.314146 345762 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:21.314162 345762 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.314167 345762 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000196150 6 D0713 08:45:21.314171 345762 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:21.314513 345762 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.314528 345762 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000196150 7 D0713 08:45:21.314533 345762 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:21.314604 345762 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.314613 345762 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc000196150 8 D0713 08:45:21.314618 345762 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:21.314824 345762 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.314840 345762 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc000196150 9 D0713 08:45:21.314848 345762 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:21.314922 345762 usertrap_amd64.go:212] [ 1051: 1054] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.314960 345762 usertrap_amd64.go:122] [ 1051: 1054] Allocate a new trap: 0xc000196150 10 D0713 08:45:21.314974 345762 usertrap_amd64.go:225] [ 1051: 1054] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:21.315037 345762 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:21.315058 345762 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000196150 11 D0713 08:45:21.315069 345762 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b6e0 trap addr 62370 ([184 24 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:21.322634 345762 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.322672 345762 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000196150 12 D0713 08:45:21.322684 345762 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46af29 trap addr 623c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:21.325735 345762 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.325767 345762 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc000196150 13 D0713 08:45:21.325779 345762 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46b020 trap addr 62410 ([184 39 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:21.325847 345762 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.325866 345762 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc000196150 14 D0713 08:45:21.325878 345762 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46b04f trap addr 62460 ([184 234 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:21.325942 345762 task_signals.go:470] [ 1051: 1051] Notified of signal 23 D0713 08:45:21.326012 345762 task_signals.go:220] [ 1051: 1051] Signal 23: delivering to handler I0713 08:45:21.334484 345762 compat.go:120] Unsupported syscall process_vm_writev(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_writev for more information. D0713 08:45:21.334613 345762 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.334639 345762 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000196150 15 D0713 08:45:21.334646 345762 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0713 08:45:21.334703 345762 task_exit.go:204] [ 1051: 1051] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.334721 345762 task_exit.go:204] [ 1051: 1051] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.334741 345762 task_signals.go:204] [ 1051: 1055] Signal 1051, PID: 1055, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.334739 345762 task_signals.go:204] [ 1051: 1053] Signal 1051, PID: 1053, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.334749 345762 task_exit.go:204] [ 1051: 1055] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.334766 345762 task_exit.go:204] [ 1051: 1055] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.334784 345762 task_exit.go:204] [ 1051: 1055] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.334803 345762 task_signals.go:204] [ 1051: 1054] Signal 1051, PID: 1054, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.334816 345762 task_exit.go:204] [ 1051: 1054] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.334823 345762 task_signals.go:204] [ 1051: 1052] Signal 1051, PID: 1052, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.334832 345762 task_exit.go:204] [ 1051: 1054] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.334836 345762 task_exit.go:204] [ 1051: 1054] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.334844 345762 task_exit.go:204] [ 1051: 1053] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.334861 345762 task_exit.go:204] [ 1051: 1053] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.334867 345762 task_exit.go:204] [ 1051: 1053] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.334878 345762 task_exit.go:204] [ 1051: 1052] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.336367 345762 task_exit.go:204] [ 1051: 1052] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.336395 345762 task_exit.go:204] [ 1051: 1052] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.336412 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.336435 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.336452 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.336589 345762 task_signals.go:470] [ 5: 21] Notified of signal 23 D0713 08:45:21.336637 345762 task_exit.go:204] [ 1051: 1051] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.336669 345762 task_signals.go:220] [ 5: 21] Signal 23: delivering to handler D0713 08:45:21.337739 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.339940 345762 syscalls.go:262] [ 1056: 1056] Allocating stack with size of 8388608 bytes D0713 08:45:21.340224 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.341300 345762 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.341338 345762 usertrap_amd64.go:106] [ 1056: 1056] Map a usertrap vma at 66000 D0713 08:45:21.341410 345762 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0016802a0 1 D0713 08:45:21.341447 345762 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:21.341800 345762 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.341834 345762 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0016802a0 2 D0713 08:45:21.341849 345762 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:21.342494 345762 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.342517 345762 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0016802a0 3 D0713 08:45:21.342525 345762 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:21.349876 345762 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.349922 345762 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0016802a0 4 D0713 08:45:21.349940 345762 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:21.351129 345762 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.351154 345762 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0016802a0 5 D0713 08:45:21.351164 345762 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:21.351282 345762 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.351304 345762 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0016802a0 6 D0713 08:45:21.351313 345762 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:21.351843 345762 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.351861 345762 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0016802a0 7 D0713 08:45:21.351870 345762 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:21.352096 345762 usertrap_amd64.go:212] [ 1056: 1057] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.352109 345762 usertrap_amd64.go:122] [ 1056: 1057] Allocate a new trap: 0xc0016802a0 8 D0713 08:45:21.352119 345762 usertrap_amd64.go:225] [ 1056: 1057] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:21.352387 345762 usertrap_amd64.go:212] [ 1056: 1057] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.352415 345762 usertrap_amd64.go:122] [ 1056: 1057] Allocate a new trap: 0xc0016802a0 9 D0713 08:45:21.352428 345762 usertrap_amd64.go:225] [ 1056: 1057] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:21.352519 345762 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.352542 345762 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0016802a0 10 D0713 08:45:21.352550 345762 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:21.360349 345762 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.360375 345762 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0016802a0 11 D0713 08:45:21.360385 345762 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:21.362868 345762 usertrap_amd64.go:212] [ 1056: 1057] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.362897 345762 usertrap_amd64.go:122] [ 1056: 1057] Allocate a new trap: 0xc0016802a0 12 D0713 08:45:21.362909 345762 usertrap_amd64.go:225] [ 1056: 1057] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:21.363001 345762 usertrap_amd64.go:212] [ 1056: 1057] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.363017 345762 usertrap_amd64.go:122] [ 1056: 1057] Allocate a new trap: 0xc0016802a0 13 D0713 08:45:21.363029 345762 usertrap_amd64.go:225] [ 1056: 1057] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:21.363086 345762 task_signals.go:470] [ 1056: 1056] Notified of signal 23 D0713 08:45:21.363147 345762 task_signals.go:220] [ 1056: 1056] Signal 23: delivering to handler D0713 08:45:21.371765 345762 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.371793 345762 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0016802a0 14 D0713 08:45:21.371803 345762 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:21.371873 345762 task_exit.go:204] [ 1056: 1056] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.371894 345762 task_exit.go:204] [ 1056: 1056] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.371913 345762 task_signals.go:204] [ 1056: 1057] Signal 1056, PID: 1057, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.371931 345762 task_exit.go:204] [ 1056: 1057] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.371936 345762 task_exit.go:204] [ 1056: 1057] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.371940 345762 task_exit.go:204] [ 1056: 1057] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.371917 345762 task_signals.go:204] [ 1056: 1058] Signal 1056, PID: 1058, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.371948 345762 task_signals.go:204] [ 1056: 1060] Signal 1056, PID: 1060, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.371954 345762 task_exit.go:204] [ 1056: 1058] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.371953 345762 task_signals.go:204] [ 1056: 1059] Signal 1056, PID: 1059, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.371968 345762 task_exit.go:204] [ 1056: 1058] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.371974 345762 task_exit.go:204] [ 1056: 1058] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.371987 345762 task_exit.go:204] [ 1056: 1060] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.372008 345762 task_exit.go:204] [ 1056: 1060] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.372012 345762 task_exit.go:204] [ 1056: 1060] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.372019 345762 task_exit.go:204] [ 1056: 1059] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.373761 345762 task_exit.go:204] [ 1056: 1059] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.373792 345762 task_exit.go:204] [ 1056: 1059] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.373806 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.373853 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.373888 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.373923 345762 task_exit.go:204] [ 1056: 1056] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.374422 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.375733 345762 syscalls.go:262] [ 1061: 1061] Allocating stack with size of 8388608 bytes D0713 08:45:21.376004 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.377479 345762 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.377515 345762 usertrap_amd64.go:106] [ 1061: 1061] Map a usertrap vma at 62000 D0713 08:45:21.377612 345762 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc000c924b0 1 D0713 08:45:21.377637 345762 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:21.378185 345762 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.378197 345762 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc000c924b0 2 D0713 08:45:21.378204 345762 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:21.379025 345762 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.379052 345762 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc000c924b0 3 D0713 08:45:21.379061 345762 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:21.386064 345762 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.386090 345762 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc000c924b0 4 D0713 08:45:21.386099 345762 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:21.387261 345762 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.387293 345762 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc000c924b0 5 D0713 08:45:21.387304 345762 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:21.387370 345762 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.387384 345762 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc000c924b0 6 D0713 08:45:21.387392 345762 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:21.387908 345762 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.387932 345762 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc000c924b0 7 D0713 08:45:21.387940 345762 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:21.388139 345762 usertrap_amd64.go:212] [ 1061: 1062] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.388162 345762 usertrap_amd64.go:122] [ 1061: 1062] Allocate a new trap: 0xc000c924b0 8 D0713 08:45:21.388174 345762 usertrap_amd64.go:225] [ 1061: 1062] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:21.388334 345762 usertrap_amd64.go:212] [ 1061: 1062] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.388357 345762 usertrap_amd64.go:122] [ 1061: 1062] Allocate a new trap: 0xc000c924b0 9 D0713 08:45:21.388369 345762 usertrap_amd64.go:225] [ 1061: 1062] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:21.388398 345762 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.388422 345762 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc000c924b0 10 D0713 08:45:21.388433 345762 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:21.395866 345762 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.395891 345762 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc000c924b0 11 D0713 08:45:21.395898 345762 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:21.398719 345762 usertrap_amd64.go:212] [ 1061: 1062] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.398746 345762 usertrap_amd64.go:122] [ 1061: 1062] Allocate a new trap: 0xc000c924b0 12 D0713 08:45:21.398756 345762 usertrap_amd64.go:225] [ 1061: 1062] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:21.398814 345762 usertrap_amd64.go:212] [ 1061: 1062] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.398822 345762 usertrap_amd64.go:122] [ 1061: 1062] Allocate a new trap: 0xc000c924b0 13 D0713 08:45:21.398831 345762 usertrap_amd64.go:225] [ 1061: 1062] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:21.398869 345762 task_signals.go:470] [ 1061: 1061] Notified of signal 23 D0713 08:45:21.398917 345762 task_signals.go:220] [ 1061: 1061] Signal 23: delivering to handler D0713 08:45:21.406191 345762 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.406243 345762 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc000c924b0 14 D0713 08:45:21.406261 345762 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:21.406340 345762 task_exit.go:204] [ 1061: 1061] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.406370 345762 task_exit.go:204] [ 1061: 1061] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.406391 345762 task_signals.go:204] [ 1061: 1064] Signal 1061, PID: 1064, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.406414 345762 task_signals.go:204] [ 1061: 1063] Signal 1061, PID: 1063, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.406432 345762 task_exit.go:204] [ 1061: 1064] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.406449 345762 task_exit.go:204] [ 1061: 1064] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.406455 345762 task_exit.go:204] [ 1061: 1064] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.406409 345762 task_signals.go:204] [ 1061: 1065] Signal 1061, PID: 1065, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.406480 345762 task_exit.go:204] [ 1061: 1065] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.406488 345762 task_exit.go:204] [ 1061: 1065] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.406493 345762 task_exit.go:204] [ 1061: 1065] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.406421 345762 task_signals.go:204] [ 1061: 1062] Signal 1061, PID: 1062, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.406512 345762 task_exit.go:204] [ 1061: 1062] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.406519 345762 task_exit.go:204] [ 1061: 1062] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.406526 345762 task_exit.go:204] [ 1061: 1062] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.406548 345762 task_exit.go:204] [ 1061: 1063] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.408244 345762 task_exit.go:204] [ 1061: 1063] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.408263 345762 task_exit.go:204] [ 1061: 1063] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.408276 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.408308 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.408332 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.408467 345762 task_exit.go:204] [ 1061: 1061] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.409361 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.410706 345762 syscalls.go:262] [ 1066: 1066] Allocating stack with size of 8388608 bytes D0713 08:45:21.410849 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.412239 345762 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.412281 345762 usertrap_amd64.go:106] [ 1066: 1066] Map a usertrap vma at 62000 D0713 08:45:21.412388 345762 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc001680330 1 D0713 08:45:21.412413 345762 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:21.412880 345762 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.412903 345762 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc001680330 2 D0713 08:45:21.412911 345762 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:21.413619 345762 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.413640 345762 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc001680330 3 D0713 08:45:21.413646 345762 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:21.419490 345762 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.419516 345762 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc001680330 4 D0713 08:45:21.419525 345762 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:21.420690 345762 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.420709 345762 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc001680330 5 D0713 08:45:21.420716 345762 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:21.420728 345762 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.420736 345762 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc001680330 6 D0713 08:45:21.420743 345762 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:21.420890 345762 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.420904 345762 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc001680330 7 D0713 08:45:21.420909 345762 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:21.421038 345762 usertrap_amd64.go:212] [ 1066: 1067] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.421050 345762 usertrap_amd64.go:122] [ 1066: 1067] Allocate a new trap: 0xc001680330 8 D0713 08:45:21.421058 345762 usertrap_amd64.go:225] [ 1066: 1067] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:21.421275 345762 usertrap_amd64.go:212] [ 1066: 1067] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.421287 345762 usertrap_amd64.go:122] [ 1066: 1067] Allocate a new trap: 0xc001680330 9 D0713 08:45:21.421296 345762 usertrap_amd64.go:225] [ 1066: 1067] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:21.421306 345762 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.421314 345762 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc001680330 10 D0713 08:45:21.421379 345762 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:21.428414 345762 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.428440 345762 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc001680330 11 D0713 08:45:21.428452 345762 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:21.432343 345762 usertrap_amd64.go:212] [ 1066: 1067] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.432369 345762 usertrap_amd64.go:122] [ 1066: 1067] Allocate a new trap: 0xc001680330 12 D0713 08:45:21.432379 345762 usertrap_amd64.go:225] [ 1066: 1067] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:21.432395 345762 usertrap_amd64.go:212] [ 1066: 1067] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.432405 345762 usertrap_amd64.go:122] [ 1066: 1067] Allocate a new trap: 0xc001680330 13 D0713 08:45:21.432411 345762 usertrap_amd64.go:225] [ 1066: 1067] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:21.432442 345762 task_signals.go:470] [ 1066: 1066] Notified of signal 23 D0713 08:45:21.432505 345762 task_signals.go:220] [ 1066: 1066] Signal 23: delivering to handler D0713 08:45:21.438634 345762 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.438665 345762 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc001680330 14 D0713 08:45:21.438682 345762 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:21.438752 345762 task_exit.go:204] [ 1066: 1066] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.438784 345762 task_exit.go:204] [ 1066: 1066] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.438786 345762 task_signals.go:204] [ 1066: 1070] Signal 1066, PID: 1070, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.438801 345762 task_exit.go:204] [ 1066: 1070] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.438801 345762 task_signals.go:204] [ 1066: 1069] Signal 1066, PID: 1069, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.438811 345762 task_exit.go:204] [ 1066: 1070] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.438816 345762 task_exit.go:204] [ 1066: 1070] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.438830 345762 task_signals.go:204] [ 1066: 1067] Signal 1066, PID: 1067, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.438848 345762 task_exit.go:204] [ 1066: 1067] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.438855 345762 task_exit.go:204] [ 1066: 1067] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.438859 345762 task_exit.go:204] [ 1066: 1067] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.438867 345762 task_exit.go:204] [ 1066: 1069] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.438888 345762 task_exit.go:204] [ 1066: 1069] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.438901 345762 task_exit.go:204] [ 1066: 1069] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.438919 345762 task_signals.go:204] [ 1066: 1068] Signal 1066, PID: 1068, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.438951 345762 task_exit.go:204] [ 1066: 1068] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.440418 345762 task_exit.go:204] [ 1066: 1068] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.440448 345762 task_exit.go:204] [ 1066: 1068] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.440466 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.440509 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.440531 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.440594 345762 task_exit.go:204] [ 1066: 1066] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.441104 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.442374 345762 syscalls.go:262] [ 1071: 1071] Allocating stack with size of 8388608 bytes D0713 08:45:21.442577 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.443953 345762 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.443984 345762 usertrap_amd64.go:106] [ 1071: 1071] Map a usertrap vma at 67000 D0713 08:45:21.444068 345762 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc001680450 1 D0713 08:45:21.444135 345762 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:21.444533 345762 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.444559 345762 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc001680450 2 D0713 08:45:21.444571 345762 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:21.445173 345762 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.445197 345762 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc001680450 3 D0713 08:45:21.445206 345762 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:21.450899 345762 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.450924 345762 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc001680450 4 D0713 08:45:21.450933 345762 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:21.452013 345762 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.452030 345762 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc001680450 5 D0713 08:45:21.452037 345762 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:21.452053 345762 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.452059 345762 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc001680450 6 D0713 08:45:21.452065 345762 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:21.452514 345762 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.452537 345762 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc001680450 7 D0713 08:45:21.452547 345762 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:21.452692 345762 usertrap_amd64.go:212] [ 1071: 1072] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.452711 345762 usertrap_amd64.go:122] [ 1071: 1072] Allocate a new trap: 0xc001680450 8 D0713 08:45:21.452719 345762 usertrap_amd64.go:225] [ 1071: 1072] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:21.452885 345762 usertrap_amd64.go:212] [ 1071: 1072] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.452910 345762 usertrap_amd64.go:122] [ 1071: 1072] Allocate a new trap: 0xc001680450 9 D0713 08:45:21.452921 345762 usertrap_amd64.go:225] [ 1071: 1072] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:21.452966 345762 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.452974 345762 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc001680450 10 D0713 08:45:21.452982 345762 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:21.459819 345762 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.459847 345762 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc001680450 11 D0713 08:45:21.459856 345762 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:21.463668 345762 usertrap_amd64.go:212] [ 1071: 1072] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.463689 345762 usertrap_amd64.go:122] [ 1071: 1072] Allocate a new trap: 0xc001680450 12 D0713 08:45:21.463698 345762 usertrap_amd64.go:225] [ 1071: 1072] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:21.463717 345762 usertrap_amd64.go:212] [ 1071: 1072] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.463723 345762 usertrap_amd64.go:122] [ 1071: 1072] Allocate a new trap: 0xc001680450 13 D0713 08:45:21.463730 345762 usertrap_amd64.go:225] [ 1071: 1072] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:21.463748 345762 task_signals.go:470] [ 1071: 1071] Notified of signal 23 D0713 08:45:21.463792 345762 task_signals.go:220] [ 1071: 1071] Signal 23: delivering to handler D0713 08:45:21.469728 345762 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.469754 345762 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc001680450 14 D0713 08:45:21.469765 345762 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:21.469825 345762 task_exit.go:204] [ 1071: 1071] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.469845 345762 task_exit.go:204] [ 1071: 1071] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.469862 345762 task_signals.go:204] [ 1071: 1074] Signal 1071, PID: 1074, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.469875 345762 task_exit.go:204] [ 1071: 1074] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.469861 345762 task_signals.go:204] [ 1071: 1073] Signal 1071, PID: 1073, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.469882 345762 task_exit.go:204] [ 1071: 1074] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.469897 345762 task_exit.go:204] [ 1071: 1074] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.469917 345762 task_signals.go:204] [ 1071: 1075] Signal 1071, PID: 1075, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.469940 345762 task_exit.go:204] [ 1071: 1075] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.469953 345762 task_exit.go:204] [ 1071: 1075] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.469991 345762 task_exit.go:204] [ 1071: 1075] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.469932 345762 task_signals.go:204] [ 1071: 1072] Signal 1071, PID: 1072, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.470001 345762 task_exit.go:204] [ 1071: 1072] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.470007 345762 task_exit.go:204] [ 1071: 1072] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.470015 345762 task_exit.go:204] [ 1071: 1072] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.470045 345762 task_exit.go:204] [ 1071: 1073] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.471285 345762 task_exit.go:204] [ 1071: 1073] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.471307 345762 task_exit.go:204] [ 1071: 1073] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.471323 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.471364 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.471399 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.471462 345762 task_exit.go:204] [ 1071: 1071] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.472049 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.473225 345762 syscalls.go:262] [ 1076: 1076] Allocating stack with size of 8388608 bytes D0713 08:45:21.473304 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.474273 345762 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.474301 345762 usertrap_amd64.go:106] [ 1076: 1076] Map a usertrap vma at 63000 D0713 08:45:21.474375 345762 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000196870 1 D0713 08:45:21.474398 345762 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:21.474732 345762 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.474752 345762 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000196870 2 D0713 08:45:21.474759 345762 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:21.475220 345762 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.475244 345762 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000196870 3 D0713 08:45:21.475253 345762 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:21.480676 345762 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.480710 345762 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000196870 4 D0713 08:45:21.480726 345762 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:21.481868 345762 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.481892 345762 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000196870 5 D0713 08:45:21.481901 345762 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:21.481960 345762 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.481986 345762 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000196870 6 D0713 08:45:21.481991 345762 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:21.482446 345762 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.482468 345762 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000196870 7 D0713 08:45:21.482474 345762 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:21.482641 345762 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.482667 345762 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc000196870 8 D0713 08:45:21.482691 345762 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:21.482815 345762 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.482833 345762 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc000196870 9 D0713 08:45:21.482841 345762 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:21.482901 345762 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.482918 345762 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000196870 10 D0713 08:45:21.482925 345762 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:21.489372 345762 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.489400 345762 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000196870 11 D0713 08:45:21.489409 345762 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:21.493341 345762 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.493356 345762 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc000196870 12 D0713 08:45:21.493366 345762 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:21.493447 345762 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.493469 345762 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc000196870 13 D0713 08:45:21.493475 345762 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:21.493520 345762 task_signals.go:470] [ 1076: 1076] Notified of signal 23 D0713 08:45:21.493602 345762 task_signals.go:220] [ 1076: 1076] Signal 23: delivering to handler D0713 08:45:21.499881 345762 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.499909 345762 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000196870 14 D0713 08:45:21.499919 345762 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:21.499981 345762 task_exit.go:204] [ 1076: 1076] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.500002 345762 task_exit.go:204] [ 1076: 1076] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.500020 345762 task_signals.go:204] [ 1076: 1079] Signal 1076, PID: 1079, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.500015 345762 task_signals.go:204] [ 1076: 1078] Signal 1076, PID: 1078, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.500032 345762 task_exit.go:204] [ 1076: 1079] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.500039 345762 task_exit.go:204] [ 1076: 1079] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.500044 345762 task_exit.go:204] [ 1076: 1079] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.500056 345762 task_signals.go:204] [ 1076: 1077] Signal 1076, PID: 1077, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.500074 345762 task_exit.go:204] [ 1076: 1077] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.500083 345762 task_signals.go:204] [ 1076: 1080] Signal 1076, PID: 1080, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.500093 345762 task_exit.go:204] [ 1076: 1078] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.500099 345762 task_exit.go:204] [ 1076: 1078] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.500104 345762 task_exit.go:204] [ 1076: 1078] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.500114 345762 task_exit.go:204] [ 1076: 1077] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.500126 345762 task_exit.go:204] [ 1076: 1077] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.500140 345762 task_exit.go:204] [ 1076: 1080] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.501821 345762 task_exit.go:204] [ 1076: 1080] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.501858 345762 task_exit.go:204] [ 1076: 1080] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.501872 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.501921 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.501964 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.502027 345762 task_exit.go:204] [ 1076: 1076] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.502995 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.504369 345762 syscalls.go:262] [ 1081: 1081] Allocating stack with size of 8388608 bytes D0713 08:45:21.504477 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.506052 345762 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.506172 345762 usertrap_amd64.go:106] [ 1081: 1081] Map a usertrap vma at 60000 D0713 08:45:21.506271 345762 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc002812630 1 D0713 08:45:21.506300 345762 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:21.506773 345762 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.506802 345762 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc002812630 2 D0713 08:45:21.506815 345762 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:21.507561 345762 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.507581 345762 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc002812630 3 D0713 08:45:21.507592 345762 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:21.512728 345762 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.512759 345762 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc002812630 4 D0713 08:45:21.512771 345762 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:21.514081 345762 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.514114 345762 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc002812630 5 D0713 08:45:21.514123 345762 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:21.514173 345762 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.514179 345762 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc002812630 6 D0713 08:45:21.514185 345762 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:21.514366 345762 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.514390 345762 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc002812630 7 D0713 08:45:21.514400 345762 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:21.514559 345762 usertrap_amd64.go:212] [ 1081: 1082] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.514576 345762 usertrap_amd64.go:122] [ 1081: 1082] Allocate a new trap: 0xc002812630 8 D0713 08:45:21.514583 345762 usertrap_amd64.go:225] [ 1081: 1082] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:21.514741 345762 usertrap_amd64.go:212] [ 1081: 1082] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.514775 345762 usertrap_amd64.go:122] [ 1081: 1082] Allocate a new trap: 0xc002812630 9 D0713 08:45:21.514792 345762 usertrap_amd64.go:225] [ 1081: 1082] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:21.514877 345762 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.514907 345762 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc002812630 10 D0713 08:45:21.514924 345762 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:21.523651 345762 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.523678 345762 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc002812630 11 D0713 08:45:21.523687 345762 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:21.526024 345762 usertrap_amd64.go:212] [ 1081: 1082] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.526056 345762 usertrap_amd64.go:122] [ 1081: 1082] Allocate a new trap: 0xc002812630 12 D0713 08:45:21.526070 345762 usertrap_amd64.go:225] [ 1081: 1082] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:21.526128 345762 usertrap_amd64.go:212] [ 1081: 1082] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.526141 345762 usertrap_amd64.go:122] [ 1081: 1082] Allocate a new trap: 0xc002812630 13 D0713 08:45:21.526147 345762 usertrap_amd64.go:225] [ 1081: 1082] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:21.526167 345762 task_signals.go:470] [ 1081: 1081] Notified of signal 23 D0713 08:45:21.526237 345762 task_signals.go:220] [ 1081: 1081] Signal 23: delivering to handler I0713 08:45:21.533623 345762 compat.go:120] Unsupported syscall quotactl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/quotactl for more information. D0713 08:45:21.533704 345762 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.533721 345762 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc002812630 14 D0713 08:45:21.533730 345762 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:21.533833 345762 task_exit.go:204] [ 1081: 1081] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.533856 345762 task_exit.go:204] [ 1081: 1081] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.533875 345762 task_signals.go:204] [ 1081: 1084] Signal 1081, PID: 1084, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.533896 345762 task_exit.go:204] [ 1081: 1084] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.533892 345762 task_signals.go:204] [ 1081: 1082] Signal 1081, PID: 1082, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.533875 345762 task_signals.go:204] [ 1081: 1083] Signal 1081, PID: 1083, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.533901 345762 task_exit.go:204] [ 1081: 1084] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.533911 345762 task_exit.go:204] [ 1081: 1084] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.533932 345762 task_signals.go:204] [ 1081: 1085] Signal 1081, PID: 1085, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.533950 345762 task_exit.go:204] [ 1081: 1085] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.533958 345762 task_exit.go:204] [ 1081: 1085] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.533962 345762 task_exit.go:204] [ 1081: 1085] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.533969 345762 task_exit.go:204] [ 1081: 1082] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.533974 345762 task_exit.go:204] [ 1081: 1082] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.533977 345762 task_exit.go:204] [ 1081: 1082] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.533983 345762 task_exit.go:204] [ 1081: 1083] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.535181 345762 task_exit.go:204] [ 1081: 1083] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.535203 345762 task_exit.go:204] [ 1081: 1083] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.535214 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.535257 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.535292 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.535350 345762 task_exit.go:204] [ 1081: 1081] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.535993 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.537302 345762 syscalls.go:262] [ 1086: 1086] Allocating stack with size of 8388608 bytes D0713 08:45:21.537389 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.538924 345762 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.538954 345762 usertrap_amd64.go:106] [ 1086: 1086] Map a usertrap vma at 6a000 D0713 08:45:21.539037 345762 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc000196c90 1 D0713 08:45:21.539060 345762 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:21.539525 345762 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.539547 345762 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc000196c90 2 D0713 08:45:21.539557 345762 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:21.540347 345762 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.540365 345762 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc000196c90 3 D0713 08:45:21.540373 345762 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:21.546283 345762 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.546341 345762 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc000196c90 4 D0713 08:45:21.546358 345762 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:21.547450 345762 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.547471 345762 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc000196c90 5 D0713 08:45:21.547483 345762 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:21.547533 345762 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.547539 345762 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc000196c90 6 D0713 08:45:21.547544 345762 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:21.547909 345762 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.547927 345762 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc000196c90 7 D0713 08:45:21.547934 345762 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:21.548112 345762 usertrap_amd64.go:212] [ 1086: 1087] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.548134 345762 usertrap_amd64.go:122] [ 1086: 1087] Allocate a new trap: 0xc000196c90 8 D0713 08:45:21.548140 345762 usertrap_amd64.go:225] [ 1086: 1087] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:21.548376 345762 usertrap_amd64.go:212] [ 1086: 1087] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.548406 345762 usertrap_amd64.go:122] [ 1086: 1087] Allocate a new trap: 0xc000196c90 9 D0713 08:45:21.548415 345762 usertrap_amd64.go:225] [ 1086: 1087] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:21.548580 345762 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.548600 345762 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc000196c90 10 D0713 08:45:21.548607 345762 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:21.555439 345762 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.555472 345762 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc000196c90 11 D0713 08:45:21.555486 345762 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:21.559587 345762 usertrap_amd64.go:212] [ 1086: 1087] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.559626 345762 usertrap_amd64.go:122] [ 1086: 1087] Allocate a new trap: 0xc000196c90 12 D0713 08:45:21.559639 345762 usertrap_amd64.go:225] [ 1086: 1087] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:21.559814 345762 usertrap_amd64.go:212] [ 1086: 1087] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.559851 345762 usertrap_amd64.go:122] [ 1086: 1087] Allocate a new trap: 0xc000196c90 13 D0713 08:45:21.559867 345762 usertrap_amd64.go:225] [ 1086: 1087] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:21.559946 345762 task_signals.go:470] [ 1086: 1086] Notified of signal 23 D0713 08:45:21.560159 345762 task_signals.go:220] [ 1086: 1086] Signal 23: delivering to handler I0713 08:45:21.566249 345762 compat.go:120] Unsupported syscall sys_443(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_443 for more information. D0713 08:45:21.566387 345762 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.566408 345762 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc000196c90 14 D0713 08:45:21.566420 345762 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:21.566489 345762 task_exit.go:204] [ 1086: 1086] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.566524 345762 task_exit.go:204] [ 1086: 1086] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.566548 345762 task_signals.go:204] [ 1086: 1090] Signal 1086, PID: 1090, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.566541 345762 task_signals.go:204] [ 1086: 1089] Signal 1086, PID: 1089, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.566562 345762 task_signals.go:204] [ 1086: 1087] Signal 1086, PID: 1087, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.566595 345762 task_exit.go:204] [ 1086: 1090] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.566696 345762 task_signals.go:204] [ 1086: 1088] Signal 1086, PID: 1088, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.566733 345762 task_exit.go:204] [ 1086: 1090] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.566755 345762 task_exit.go:204] [ 1086: 1090] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.566780 345762 task_exit.go:204] [ 1086: 1089] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.566796 345762 task_exit.go:204] [ 1086: 1089] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.566799 345762 task_exit.go:204] [ 1086: 1089] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.566808 345762 task_exit.go:204] [ 1086: 1087] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.566817 345762 task_exit.go:204] [ 1086: 1087] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.566829 345762 task_exit.go:204] [ 1086: 1087] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.566841 345762 task_exit.go:204] [ 1086: 1088] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.568311 345762 task_exit.go:204] [ 1086: 1088] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.568361 345762 task_exit.go:204] [ 1086: 1088] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.568386 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.568429 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.568445 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.568701 345762 task_exit.go:204] [ 1086: 1086] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.569512 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.570977 345762 syscalls.go:262] [ 1091: 1091] Allocating stack with size of 8388608 bytes D0713 08:45:21.571238 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.572557 345762 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.572602 345762 usertrap_amd64.go:106] [ 1091: 1091] Map a usertrap vma at 69000 D0713 08:45:21.572741 345762 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0016807e0 1 D0713 08:45:21.572762 345762 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:21.573263 345762 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.573290 345762 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0016807e0 2 D0713 08:45:21.573298 345762 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:21.574068 345762 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.574089 345762 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0016807e0 3 D0713 08:45:21.574096 345762 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:21.579912 345762 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.579944 345762 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0016807e0 4 D0713 08:45:21.579955 345762 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:21.581275 345762 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.581299 345762 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0016807e0 5 D0713 08:45:21.581305 345762 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:21.581367 345762 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.581390 345762 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0016807e0 6 D0713 08:45:21.581400 345762 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:21.581812 345762 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.581827 345762 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0016807e0 7 D0713 08:45:21.581833 345762 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:21.581964 345762 usertrap_amd64.go:212] [ 1091: 1092] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.581989 345762 usertrap_amd64.go:122] [ 1091: 1092] Allocate a new trap: 0xc0016807e0 8 D0713 08:45:21.581999 345762 usertrap_amd64.go:225] [ 1091: 1092] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:21.582316 345762 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.582345 345762 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0016807e0 9 D0713 08:45:21.582358 345762 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:21.582387 345762 usertrap_amd64.go:212] [ 1091: 1092] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.582406 345762 usertrap_amd64.go:122] [ 1091: 1092] Allocate a new trap: 0xc0016807e0 10 D0713 08:45:21.582413 345762 usertrap_amd64.go:225] [ 1091: 1092] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:21.589695 345762 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.589718 345762 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0016807e0 11 D0713 08:45:21.589726 345762 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:21.592609 345762 usertrap_amd64.go:212] [ 1091: 1092] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.592628 345762 usertrap_amd64.go:122] [ 1091: 1092] Allocate a new trap: 0xc0016807e0 12 D0713 08:45:21.592635 345762 usertrap_amd64.go:225] [ 1091: 1092] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:21.592654 345762 usertrap_amd64.go:212] [ 1091: 1092] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.592659 345762 usertrap_amd64.go:122] [ 1091: 1092] Allocate a new trap: 0xc0016807e0 13 D0713 08:45:21.592665 345762 usertrap_amd64.go:225] [ 1091: 1092] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:21.592683 345762 task_signals.go:470] [ 1091: 1091] Notified of signal 23 D0713 08:45:21.592743 345762 task_signals.go:220] [ 1091: 1091] Signal 23: delivering to handler D0713 08:45:21.600648 345762 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.600731 345762 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0016807e0 14 D0713 08:45:21.600753 345762 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:21.600845 345762 task_exit.go:204] [ 1091: 1091] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.600887 345762 task_signals.go:204] [ 1091: 1093] Signal 1091, PID: 1093, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.600891 345762 task_exit.go:204] [ 1091: 1091] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.600924 345762 task_signals.go:204] [ 1091: 1095] Signal 1091, PID: 1095, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.600967 345762 task_signals.go:204] [ 1091: 1094] Signal 1091, PID: 1094, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.600930 345762 task_signals.go:204] [ 1091: 1092] Signal 1091, PID: 1092, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.600966 345762 task_exit.go:204] [ 1091: 1095] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.601037 345762 task_exit.go:204] [ 1091: 1095] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.601061 345762 task_exit.go:204] [ 1091: 1095] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.601082 345762 task_exit.go:204] [ 1091: 1094] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.601104 345762 task_exit.go:204] [ 1091: 1092] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.601139 345762 task_exit.go:204] [ 1091: 1092] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.601156 345762 task_exit.go:204] [ 1091: 1092] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.601180 345762 task_exit.go:204] [ 1091: 1093] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.601249 345762 task_exit.go:204] [ 1091: 1094] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.601276 345762 task_exit.go:204] [ 1091: 1094] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.602789 345762 task_exit.go:204] [ 1091: 1093] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.602825 345762 task_exit.go:204] [ 1091: 1093] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.602842 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.602891 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.602927 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.603056 345762 task_exit.go:204] [ 1091: 1091] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.603944 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.605293 345762 syscalls.go:262] [ 1096: 1096] Allocating stack with size of 8388608 bytes D0713 08:45:21.605431 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.606804 345762 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.606869 345762 usertrap_amd64.go:106] [ 1096: 1096] Map a usertrap vma at 67000 D0713 08:45:21.607011 345762 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000730990 1 D0713 08:45:21.607070 345762 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:21.607524 345762 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.607546 345762 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000730990 2 D0713 08:45:21.607555 345762 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:21.608234 345762 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.608245 345762 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000730990 3 D0713 08:45:21.608254 345762 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:21.614277 345762 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.614343 345762 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000730990 4 D0713 08:45:21.614362 345762 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:21.615496 345762 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.615523 345762 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000730990 5 D0713 08:45:21.615534 345762 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:21.615588 345762 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.615599 345762 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000730990 6 D0713 08:45:21.615620 345762 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:21.616002 345762 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.616020 345762 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000730990 7 D0713 08:45:21.616028 345762 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:21.616256 345762 usertrap_amd64.go:212] [ 1096: 1097] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.616277 345762 usertrap_amd64.go:122] [ 1096: 1097] Allocate a new trap: 0xc000730990 8 D0713 08:45:21.616286 345762 usertrap_amd64.go:225] [ 1096: 1097] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:21.616496 345762 usertrap_amd64.go:212] [ 1096: 1097] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.616532 345762 usertrap_amd64.go:122] [ 1096: 1097] Allocate a new trap: 0xc000730990 9 D0713 08:45:21.616546 345762 usertrap_amd64.go:225] [ 1096: 1097] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:21.616559 345762 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.616564 345762 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000730990 10 D0713 08:45:21.616570 345762 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:21.623774 345762 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.623800 345762 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000730990 11 D0713 08:45:21.623809 345762 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:21.626799 345762 usertrap_amd64.go:212] [ 1096: 1097] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.626826 345762 usertrap_amd64.go:122] [ 1096: 1097] Allocate a new trap: 0xc000730990 12 D0713 08:45:21.626837 345762 usertrap_amd64.go:225] [ 1096: 1097] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:21.626859 345762 usertrap_amd64.go:212] [ 1096: 1097] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.626867 345762 usertrap_amd64.go:122] [ 1096: 1097] Allocate a new trap: 0xc000730990 13 D0713 08:45:21.626876 345762 usertrap_amd64.go:225] [ 1096: 1097] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:21.626910 345762 task_signals.go:470] [ 1096: 1096] Notified of signal 23 D0713 08:45:21.626989 345762 task_signals.go:220] [ 1096: 1096] Signal 23: delivering to handler D0713 08:45:21.634374 345762 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.634450 345762 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000730990 14 D0713 08:45:21.634478 345762 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:21.634554 345762 task_exit.go:204] [ 1096: 1096] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.634622 345762 task_exit.go:204] [ 1096: 1096] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.634661 345762 task_signals.go:204] [ 1096: 1099] Signal 1096, PID: 1099, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.634695 345762 task_exit.go:204] [ 1096: 1099] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.634703 345762 task_exit.go:204] [ 1096: 1099] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.634709 345762 task_exit.go:204] [ 1096: 1099] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.634674 345762 task_signals.go:204] [ 1096: 1100] Signal 1096, PID: 1100, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.634670 345762 task_signals.go:204] [ 1096: 1098] Signal 1096, PID: 1098, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.634746 345762 task_exit.go:204] [ 1096: 1100] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.634757 345762 task_signals.go:204] [ 1096: 1097] Signal 1096, PID: 1097, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.634769 345762 task_exit.go:204] [ 1096: 1100] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.634781 345762 task_exit.go:204] [ 1096: 1100] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.634797 345762 task_exit.go:204] [ 1096: 1098] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.634810 345762 task_exit.go:204] [ 1096: 1098] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.634815 345762 task_exit.go:204] [ 1096: 1098] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.634825 345762 task_exit.go:204] [ 1096: 1097] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.636478 345762 task_exit.go:204] [ 1096: 1097] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.636502 345762 task_exit.go:204] [ 1096: 1097] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.636550 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.636592 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.636613 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.636683 345762 task_exit.go:204] [ 1096: 1096] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.636887 345762 task_signals.go:470] [ 5: 21] Notified of signal 23 D0713 08:45:21.636987 345762 task_signals.go:220] [ 5: 21] Signal 23: delivering to handler D0713 08:45:21.637726 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.639276 345762 syscalls.go:262] [ 1101: 1101] Allocating stack with size of 8388608 bytes D0713 08:45:21.639406 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.640643 345762 usertrap_amd64.go:212] [ 1101: 1101] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.640675 345762 usertrap_amd64.go:106] [ 1101: 1101] Map a usertrap vma at 63000 D0713 08:45:21.640758 345762 usertrap_amd64.go:122] [ 1101: 1101] Allocate a new trap: 0xc002812ab0 1 D0713 08:45:21.640779 345762 usertrap_amd64.go:225] [ 1101: 1101] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:21.641276 345762 usertrap_amd64.go:212] [ 1101: 1101] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.641308 345762 usertrap_amd64.go:122] [ 1101: 1101] Allocate a new trap: 0xc002812ab0 2 D0713 08:45:21.641320 345762 usertrap_amd64.go:225] [ 1101: 1101] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:21.642109 345762 usertrap_amd64.go:212] [ 1101: 1101] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.642201 345762 usertrap_amd64.go:122] [ 1101: 1101] Allocate a new trap: 0xc002812ab0 3 D0713 08:45:21.642224 345762 usertrap_amd64.go:225] [ 1101: 1101] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:21.648267 345762 usertrap_amd64.go:212] [ 1101: 1101] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.648295 345762 usertrap_amd64.go:122] [ 1101: 1101] Allocate a new trap: 0xc002812ab0 4 D0713 08:45:21.648311 345762 usertrap_amd64.go:225] [ 1101: 1101] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:21.649540 345762 usertrap_amd64.go:212] [ 1101: 1101] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.649570 345762 usertrap_amd64.go:122] [ 1101: 1101] Allocate a new trap: 0xc002812ab0 5 D0713 08:45:21.649580 345762 usertrap_amd64.go:225] [ 1101: 1101] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:21.649636 345762 usertrap_amd64.go:212] [ 1101: 1101] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.649647 345762 usertrap_amd64.go:122] [ 1101: 1101] Allocate a new trap: 0xc002812ab0 6 D0713 08:45:21.649655 345762 usertrap_amd64.go:225] [ 1101: 1101] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:21.650019 345762 usertrap_amd64.go:212] [ 1101: 1101] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.650034 345762 usertrap_amd64.go:122] [ 1101: 1101] Allocate a new trap: 0xc002812ab0 7 D0713 08:45:21.650040 345762 usertrap_amd64.go:225] [ 1101: 1101] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:21.650201 345762 usertrap_amd64.go:212] [ 1101: 1102] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.650264 345762 usertrap_amd64.go:122] [ 1101: 1102] Allocate a new trap: 0xc002812ab0 8 D0713 08:45:21.650283 345762 usertrap_amd64.go:225] [ 1101: 1102] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:21.650584 345762 usertrap_amd64.go:212] [ 1101: 1101] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.650623 345762 usertrap_amd64.go:122] [ 1101: 1101] Allocate a new trap: 0xc002812ab0 9 D0713 08:45:21.650638 345762 usertrap_amd64.go:225] [ 1101: 1101] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:21.650672 345762 usertrap_amd64.go:212] [ 1101: 1102] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.650683 345762 usertrap_amd64.go:122] [ 1101: 1102] Allocate a new trap: 0xc002812ab0 10 D0713 08:45:21.650694 345762 usertrap_amd64.go:225] [ 1101: 1102] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:21.651394 345762 usertrap_amd64.go:212] [ 1101: 1102] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.651421 345762 usertrap_amd64.go:122] [ 1101: 1102] Allocate a new trap: 0xc002812ab0 11 D0713 08:45:21.651432 345762 usertrap_amd64.go:225] [ 1101: 1102] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:21.651508 345762 usertrap_amd64.go:212] [ 1101: 1102] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.651541 345762 usertrap_amd64.go:122] [ 1101: 1102] Allocate a new trap: 0xc002812ab0 12 D0713 08:45:21.651554 345762 usertrap_amd64.go:225] [ 1101: 1102] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:21.651577 345762 task_signals.go:470] [ 1101: 1101] Notified of signal 23 D0713 08:45:21.651617 345762 task_signals.go:220] [ 1101: 1101] Signal 23: delivering to handler D0713 08:45:21.658646 345762 usertrap_amd64.go:212] [ 1101: 1101] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.658669 345762 usertrap_amd64.go:122] [ 1101: 1101] Allocate a new trap: 0xc002812ab0 13 D0713 08:45:21.658679 345762 usertrap_amd64.go:225] [ 1101: 1101] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:21.661860 345762 task_signals.go:470] [ 1101: 1101] Notified of signal 23 D0713 08:45:21.661919 345762 task_signals.go:220] [ 1101: 1101] Signal 23: delivering to handler D0713 08:45:21.669007 345762 usertrap_amd64.go:212] [ 1101: 1101] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.669051 345762 usertrap_amd64.go:122] [ 1101: 1101] Allocate a new trap: 0xc002812ab0 14 D0713 08:45:21.669066 345762 usertrap_amd64.go:225] [ 1101: 1101] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:21.669128 345762 task_exit.go:204] [ 1101: 1101] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.669156 345762 task_exit.go:204] [ 1101: 1101] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.669167 345762 task_signals.go:204] [ 1101: 1103] Signal 1101, PID: 1103, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.669191 345762 task_signals.go:204] [ 1101: 1105] Signal 1101, PID: 1105, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.669205 345762 task_exit.go:204] [ 1101: 1103] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.669223 345762 task_exit.go:204] [ 1101: 1103] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.669228 345762 task_exit.go:204] [ 1101: 1103] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.669199 345762 task_signals.go:204] [ 1101: 1104] Signal 1101, PID: 1104, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.669242 345762 task_exit.go:204] [ 1101: 1105] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.669271 345762 task_exit.go:204] [ 1101: 1105] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.669280 345762 task_exit.go:204] [ 1101: 1105] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.669294 345762 task_signals.go:204] [ 1101: 1102] Signal 1101, PID: 1102, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.669303 345762 task_exit.go:204] [ 1101: 1102] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.669309 345762 task_exit.go:204] [ 1101: 1102] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.669313 345762 task_exit.go:204] [ 1101: 1102] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.669320 345762 task_exit.go:204] [ 1101: 1104] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.670974 345762 task_exit.go:204] [ 1101: 1104] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.670997 345762 task_exit.go:204] [ 1101: 1104] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.671008 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.671049 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.671078 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.671135 345762 task_exit.go:204] [ 1101: 1101] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.671758 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.673430 345762 syscalls.go:262] [ 1106: 1106] Allocating stack with size of 8388608 bytes D0713 08:45:21.673698 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.675299 345762 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.675350 345762 usertrap_amd64.go:106] [ 1106: 1106] Map a usertrap vma at 61000 D0713 08:45:21.675451 345762 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc000c92c00 1 D0713 08:45:21.675480 345762 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:21.675984 345762 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.676047 345762 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc000c92c00 2 D0713 08:45:21.676066 345762 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:21.676999 345762 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.677019 345762 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc000c92c00 3 D0713 08:45:21.677029 345762 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:45:21.683317 345762 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.683344 345762 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc000c92c00 4 D0713 08:45:21.683355 345762 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:45:21.684492 345762 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.684518 345762 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc000c92c00 5 D0713 08:45:21.684528 345762 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:45:21.684589 345762 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.684597 345762 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc000c92c00 6 D0713 08:45:21.684602 345762 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:45:21.685099 345762 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.685124 345762 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc000c92c00 7 D0713 08:45:21.685135 345762 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:45:21.685350 345762 usertrap_amd64.go:212] [ 1106: 1107] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.685454 345762 usertrap_amd64.go:122] [ 1106: 1107] Allocate a new trap: 0xc000c92c00 8 D0713 08:45:21.685485 345762 usertrap_amd64.go:225] [ 1106: 1107] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:45:21.685647 345762 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.685673 345762 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc000c92c00 9 D0713 08:45:21.685681 345762 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:45:21.685747 345762 usertrap_amd64.go:212] [ 1106: 1107] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.685761 345762 usertrap_amd64.go:122] [ 1106: 1107] Allocate a new trap: 0xc000c92c00 10 D0713 08:45:21.685770 345762 usertrap_amd64.go:225] [ 1106: 1107] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:45:21.692892 345762 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.692998 345762 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc000c92c00 11 D0713 08:45:21.693018 345762 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:45:21.696703 345762 usertrap_amd64.go:212] [ 1106: 1107] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.696728 345762 usertrap_amd64.go:122] [ 1106: 1107] Allocate a new trap: 0xc000c92c00 12 D0713 08:45:21.696738 345762 usertrap_amd64.go:225] [ 1106: 1107] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:45:21.696812 345762 usertrap_amd64.go:212] [ 1106: 1107] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.696867 345762 usertrap_amd64.go:122] [ 1106: 1107] Allocate a new trap: 0xc000c92c00 13 D0713 08:45:21.696892 345762 usertrap_amd64.go:225] [ 1106: 1107] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:45:21.696913 345762 task_signals.go:470] [ 1106: 1106] Notified of signal 23 D0713 08:45:21.696993 345762 task_signals.go:220] [ 1106: 1106] Signal 23: delivering to handler D0713 08:45:21.703039 345762 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.703106 345762 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc000c92c00 14 D0713 08:45:21.703122 345762 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:45:21.703259 345762 task_exit.go:204] [ 1106: 1106] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.703302 345762 task_exit.go:204] [ 1106: 1106] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.703305 345762 task_signals.go:204] [ 1106: 1108] Signal 1106, PID: 1108, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.703323 345762 task_signals.go:204] [ 1106: 1107] Signal 1106, PID: 1107, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.703348 345762 task_exit.go:204] [ 1106: 1108] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.703372 345762 task_exit.go:204] [ 1106: 1108] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.703379 345762 task_exit.go:204] [ 1106: 1108] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.703380 345762 task_signals.go:204] [ 1106: 1110] Signal 1106, PID: 1110, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.703350 345762 task_signals.go:204] [ 1106: 1109] Signal 1106, PID: 1109, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.703407 345762 task_exit.go:204] [ 1106: 1110] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.703424 345762 task_exit.go:204] [ 1106: 1110] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.703431 345762 task_exit.go:204] [ 1106: 1110] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.703445 345762 task_exit.go:204] [ 1106: 1107] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.703465 345762 task_exit.go:204] [ 1106: 1107] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.703471 345762 task_exit.go:204] [ 1106: 1107] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.703481 345762 task_exit.go:204] [ 1106: 1109] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.705105 345762 task_exit.go:204] [ 1106: 1109] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.705135 345762 task_exit.go:204] [ 1106: 1109] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.705148 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.705181 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.705190 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.705279 345762 task_exit.go:204] [ 1106: 1106] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.705921 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.707338 345762 syscalls.go:262] [ 1111: 1111] Allocating stack with size of 8388608 bytes D0713 08:45:21.707611 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.709201 345762 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.709242 345762 usertrap_amd64.go:106] [ 1111: 1111] Map a usertrap vma at 67000 D0713 08:45:21.709479 345762 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc000c92d50 1 D0713 08:45:21.709513 345762 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:21.709995 345762 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.710041 345762 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc000c92d50 2 D0713 08:45:21.710064 345762 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:21.710918 345762 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.710946 345762 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc000c92d50 3 D0713 08:45:21.710959 345762 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:21.716970 345762 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.717003 345762 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc000c92d50 4 D0713 08:45:21.717013 345762 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:21.718267 345762 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.718294 345762 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc000c92d50 5 D0713 08:45:21.718304 345762 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:21.718365 345762 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.718372 345762 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc000c92d50 6 D0713 08:45:21.718378 345762 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:21.718744 345762 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.718765 345762 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc000c92d50 7 D0713 08:45:21.718771 345762 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:21.718889 345762 usertrap_amd64.go:212] [ 1111: 1112] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.718896 345762 usertrap_amd64.go:122] [ 1111: 1112] Allocate a new trap: 0xc000c92d50 8 D0713 08:45:21.718901 345762 usertrap_amd64.go:225] [ 1111: 1112] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:21.719086 345762 usertrap_amd64.go:212] [ 1111: 1112] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:21.719102 345762 usertrap_amd64.go:122] [ 1111: 1112] Allocate a new trap: 0xc000c92d50 9 D0713 08:45:21.719108 345762 usertrap_amd64.go:225] [ 1111: 1112] Apply the binary patch addr 46b6e0 trap addr 672d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:21.719173 345762 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.719192 345762 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc000c92d50 10 D0713 08:45:21.719200 345762 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:21.719221 345762 usertrap_amd64.go:212] [ 1111: 1112] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.719226 345762 usertrap_amd64.go:122] [ 1111: 1112] Allocate a new trap: 0xc000c92d50 11 D0713 08:45:21.719231 345762 usertrap_amd64.go:225] [ 1111: 1112] Apply the binary patch addr 46af76 trap addr 67370 ([184 35 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:21.726724 345762 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.726774 345762 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc000c92d50 12 D0713 08:45:21.726787 345762 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46af29 trap addr 673c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:21.729628 345762 usertrap_amd64.go:212] [ 1111: 1112] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.729653 345762 usertrap_amd64.go:122] [ 1111: 1112] Allocate a new trap: 0xc000c92d50 13 D0713 08:45:21.729661 345762 usertrap_amd64.go:225] [ 1111: 1112] Apply the binary patch addr 46b020 trap addr 67410 ([184 39 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:21.729677 345762 usertrap_amd64.go:212] [ 1111: 1112] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.729681 345762 usertrap_amd64.go:122] [ 1111: 1112] Allocate a new trap: 0xc000c92d50 14 D0713 08:45:21.729687 345762 usertrap_amd64.go:225] [ 1111: 1112] Apply the binary patch addr 46b04f trap addr 67460 ([184 234 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:21.729745 345762 task_signals.go:470] [ 1111: 1111] Notified of signal 23 D0713 08:45:21.729815 345762 task_signals.go:220] [ 1111: 1111] Signal 23: delivering to handler D0713 08:45:21.737718 345762 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.737773 345762 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc000c92d50 15 D0713 08:45:21.737790 345762 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46ae44 trap addr 674b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 116 6 0]) D0713 08:45:21.737859 345762 task_exit.go:204] [ 1111: 1111] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.737890 345762 task_exit.go:204] [ 1111: 1111] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.737909 345762 task_signals.go:204] [ 1111: 1113] Signal 1111, PID: 1113, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.737934 345762 task_signals.go:204] [ 1111: 1114] Signal 1111, PID: 1114, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.737947 345762 task_exit.go:204] [ 1111: 1113] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.737965 345762 task_exit.go:204] [ 1111: 1113] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.737962 345762 task_signals.go:204] [ 1111: 1115] Signal 1111, PID: 1115, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.737972 345762 task_exit.go:204] [ 1111: 1113] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.737989 345762 task_exit.go:204] [ 1111: 1115] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.738002 345762 task_signals.go:204] [ 1111: 1112] Signal 1111, PID: 1112, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.738014 345762 task_exit.go:204] [ 1111: 1115] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.738019 345762 task_exit.go:204] [ 1111: 1115] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.738051 345762 task_exit.go:204] [ 1111: 1114] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.738068 345762 task_exit.go:204] [ 1111: 1114] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.738073 345762 task_exit.go:204] [ 1111: 1114] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.738082 345762 task_exit.go:204] [ 1111: 1112] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.739627 345762 task_exit.go:204] [ 1111: 1112] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.739653 345762 task_exit.go:204] [ 1111: 1112] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.739671 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.739698 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.739715 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.739871 345762 task_exit.go:204] [ 1111: 1111] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.740686 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.742339 345762 syscalls.go:262] [ 1116: 1116] Allocating stack with size of 8388608 bytes D0713 08:45:21.742480 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.743829 345762 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.743882 345762 usertrap_amd64.go:106] [ 1116: 1116] Map a usertrap vma at 61000 D0713 08:45:21.743975 345762 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000940420 1 D0713 08:45:21.744009 345762 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:21.744446 345762 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.744465 345762 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000940420 2 D0713 08:45:21.744473 345762 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:21.745170 345762 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.745190 345762 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000940420 3 D0713 08:45:21.745197 345762 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:45:21.751684 345762 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.751724 345762 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000940420 4 D0713 08:45:21.751738 345762 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:45:21.753101 345762 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.753129 345762 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000940420 5 D0713 08:45:21.753140 345762 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:45:21.753220 345762 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.753257 345762 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000940420 6 D0713 08:45:21.753272 345762 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:45:21.753823 345762 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.753851 345762 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000940420 7 D0713 08:45:21.753869 345762 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:45:21.754084 345762 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.754103 345762 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc000940420 8 D0713 08:45:21.754117 345762 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:45:21.754277 345762 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.754292 345762 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc000940420 9 D0713 08:45:21.754299 345762 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:45:21.754388 345762 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.754419 345762 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000940420 10 D0713 08:45:21.754430 345762 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:45:21.762456 345762 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.762495 345762 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000940420 11 D0713 08:45:21.762508 345762 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:45:21.765229 345762 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.765299 345762 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc000940420 12 D0713 08:45:21.765319 345762 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:45:21.765377 345762 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.765394 345762 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc000940420 13 D0713 08:45:21.765403 345762 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:45:21.765470 345762 task_signals.go:470] [ 1116: 1116] Notified of signal 23 D0713 08:45:21.765560 345762 task_signals.go:220] [ 1116: 1116] Signal 23: delivering to handler D0713 08:45:21.773862 345762 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.773890 345762 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc000940420 14 D0713 08:45:21.773900 345762 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:45:21.773974 345762 task_exit.go:204] [ 1116: 1116] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.774001 345762 task_exit.go:204] [ 1116: 1116] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.774027 345762 task_signals.go:204] [ 1116: 1119] Signal 1116, PID: 1119, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.774038 345762 task_exit.go:204] [ 1116: 1119] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.774045 345762 task_exit.go:204] [ 1116: 1119] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.774049 345762 task_exit.go:204] [ 1116: 1119] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.774133 345762 task_signals.go:204] [ 1116: 1117] Signal 1116, PID: 1117, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.774222 345762 task_exit.go:204] [ 1116: 1117] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.774265 345762 task_exit.go:204] [ 1116: 1117] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.774286 345762 task_exit.go:204] [ 1116: 1117] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.774178 345762 task_signals.go:204] [ 1116: 1118] Signal 1116, PID: 1118, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.774308 345762 task_exit.go:204] [ 1116: 1118] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.774314 345762 task_exit.go:204] [ 1116: 1118] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.774318 345762 task_exit.go:204] [ 1116: 1118] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.774169 345762 task_signals.go:204] [ 1116: 1120] Signal 1116, PID: 1120, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.774332 345762 task_exit.go:204] [ 1116: 1120] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.775654 345762 task_exit.go:204] [ 1116: 1120] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.775692 345762 task_exit.go:204] [ 1116: 1120] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.775709 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.775745 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.775771 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.775862 345762 task_exit.go:204] [ 1116: 1116] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.776649 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.778539 345762 syscalls.go:262] [ 1121: 1121] Allocating stack with size of 8388608 bytes D0713 08:45:21.778668 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.779891 345762 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.779927 345762 usertrap_amd64.go:106] [ 1121: 1121] Map a usertrap vma at 60000 D0713 08:45:21.779994 345762 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc000196f90 1 D0713 08:45:21.780011 345762 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:21.780443 345762 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.780458 345762 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc000196f90 2 D0713 08:45:21.780467 345762 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:21.780904 345762 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.780916 345762 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc000196f90 3 D0713 08:45:21.780922 345762 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:21.786872 345762 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.786896 345762 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc000196f90 4 D0713 08:45:21.786904 345762 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:21.788256 345762 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.788273 345762 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc000196f90 5 D0713 08:45:21.788279 345762 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:21.788294 345762 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.788297 345762 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc000196f90 6 D0713 08:45:21.788310 345762 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:21.788698 345762 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.788705 345762 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc000196f90 7 D0713 08:45:21.788711 345762 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:21.788818 345762 usertrap_amd64.go:212] [ 1121: 1122] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.788834 345762 usertrap_amd64.go:122] [ 1121: 1122] Allocate a new trap: 0xc000196f90 8 D0713 08:45:21.788840 345762 usertrap_amd64.go:225] [ 1121: 1122] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:21.789172 345762 usertrap_amd64.go:212] [ 1121: 1122] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.789211 345762 usertrap_amd64.go:122] [ 1121: 1122] Allocate a new trap: 0xc000196f90 9 D0713 08:45:21.789227 345762 usertrap_amd64.go:225] [ 1121: 1122] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:21.789248 345762 usertrap_amd64.go:212] [ 1121: 1124] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.789270 345762 usertrap_amd64.go:122] [ 1121: 1124] Allocate a new trap: 0xc000196f90 10 D0713 08:45:21.789282 345762 usertrap_amd64.go:225] [ 1121: 1124] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:21.789410 345762 usertrap_amd64.go:212] [ 1121: 1124] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:21.789437 345762 usertrap_amd64.go:122] [ 1121: 1124] Allocate a new trap: 0xc000196f90 11 D0713 08:45:21.789451 345762 usertrap_amd64.go:225] [ 1121: 1124] Apply the binary patch addr 46b6e0 trap addr 60370 ([184 24 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:21.796723 345762 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.796788 345762 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc000196f90 12 D0713 08:45:21.796806 345762 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46af29 trap addr 603c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:21.799759 345762 usertrap_amd64.go:212] [ 1121: 1122] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.799796 345762 usertrap_amd64.go:122] [ 1121: 1122] Allocate a new trap: 0xc000196f90 13 D0713 08:45:21.799811 345762 usertrap_amd64.go:225] [ 1121: 1122] Apply the binary patch addr 46b020 trap addr 60410 ([184 39 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:21.799868 345762 usertrap_amd64.go:212] [ 1121: 1122] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.799906 345762 usertrap_amd64.go:122] [ 1121: 1122] Allocate a new trap: 0xc000196f90 14 D0713 08:45:21.799914 345762 usertrap_amd64.go:225] [ 1121: 1122] Apply the binary patch addr 46b04f trap addr 60460 ([184 234 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:21.799965 345762 task_signals.go:470] [ 1121: 1121] Notified of signal 23 D0713 08:45:21.800055 345762 task_signals.go:220] [ 1121: 1121] Signal 23: delivering to handler D0713 08:45:21.802186 345762 sampler.go:191] Time: Adjusting syscall overhead down to 451 D0713 08:45:21.808783 345762 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.808869 345762 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc000196f90 15 D0713 08:45:21.808894 345762 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0713 08:45:21.809058 345762 task_exit.go:204] [ 1121: 1121] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.809103 345762 task_exit.go:204] [ 1121: 1121] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.809101 345762 task_signals.go:204] [ 1121: 1123] Signal 1121, PID: 1123, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.809125 345762 task_exit.go:204] [ 1121: 1123] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.809125 345762 task_signals.go:204] [ 1121: 1124] Signal 1121, PID: 1124, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.809138 345762 task_exit.go:204] [ 1121: 1123] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.809144 345762 task_exit.go:204] [ 1121: 1123] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.809159 345762 task_exit.go:204] [ 1121: 1124] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.809166 345762 task_exit.go:204] [ 1121: 1124] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.809170 345762 task_exit.go:204] [ 1121: 1124] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.809164 345762 task_signals.go:204] [ 1121: 1125] Signal 1121, PID: 1125, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.809185 345762 task_exit.go:204] [ 1121: 1125] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.809196 345762 task_exit.go:204] [ 1121: 1125] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.809205 345762 task_exit.go:204] [ 1121: 1125] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.809196 345762 task_signals.go:204] [ 1121: 1122] Signal 1121, PID: 1122, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.809240 345762 task_exit.go:204] [ 1121: 1122] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.810763 345762 task_exit.go:204] [ 1121: 1122] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.810785 345762 task_exit.go:204] [ 1121: 1122] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.810802 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.810851 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.810879 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.810979 345762 task_exit.go:204] [ 1121: 1121] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.811588 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.813190 345762 syscalls.go:262] [ 1126: 1126] Allocating stack with size of 8388608 bytes D0713 08:45:21.813282 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.814760 345762 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.814826 345762 usertrap_amd64.go:106] [ 1126: 1126] Map a usertrap vma at 6a000 D0713 08:45:21.815011 345762 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000c931a0 1 D0713 08:45:21.815065 345762 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:21.815539 345762 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.815558 345762 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000c931a0 2 D0713 08:45:21.815566 345762 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:21.816143 345762 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.816164 345762 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000c931a0 3 D0713 08:45:21.816172 345762 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:21.822800 345762 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.822863 345762 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000c931a0 4 D0713 08:45:21.822879 345762 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:21.824073 345762 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.824113 345762 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000c931a0 5 D0713 08:45:21.824128 345762 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:21.824185 345762 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.824199 345762 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000c931a0 6 D0713 08:45:21.824206 345762 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:21.824366 345762 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.824383 345762 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000c931a0 7 D0713 08:45:21.824389 345762 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:21.824535 345762 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.824565 345762 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc000c931a0 8 D0713 08:45:21.824580 345762 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:21.824798 345762 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.824817 345762 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc000c931a0 9 D0713 08:45:21.824824 345762 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:21.825090 345762 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.825115 345762 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000c931a0 10 D0713 08:45:21.825126 345762 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:21.825282 345762 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.825316 345762 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc000c931a0 11 D0713 08:45:21.825329 345762 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:21.825415 345762 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.825441 345762 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc000c931a0 12 D0713 08:45:21.825452 345762 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:21.825504 345762 task_signals.go:470] [ 1126: 1129] Notified of signal 23 D0713 08:45:21.825566 345762 task_signals.go:179] [ 1126: 1129] Restarting syscall 202: interrupted by signal 23 D0713 08:45:21.825579 345762 task_signals.go:220] [ 1126: 1129] Signal 23: delivering to handler D0713 08:45:21.825805 345762 task_signals.go:470] [ 1126: 1126] Notified of signal 23 D0713 08:45:21.825927 345762 task_signals.go:220] [ 1126: 1126] Signal 23: delivering to handler D0713 08:45:21.832863 345762 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.832902 345762 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000c931a0 13 D0713 08:45:21.832913 345762 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:21.836902 345762 task_signals.go:470] [ 1126: 1126] Notified of signal 23 D0713 08:45:21.837031 345762 task_signals.go:220] [ 1126: 1126] Signal 23: delivering to handler D0713 08:45:21.844687 345762 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.844771 345762 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000c931a0 14 D0713 08:45:21.844795 345762 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:21.844874 345762 task_exit.go:204] [ 1126: 1126] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.844907 345762 task_exit.go:204] [ 1126: 1126] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.844932 345762 task_signals.go:204] [ 1126: 1128] Signal 1126, PID: 1128, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.844973 345762 task_signals.go:204] [ 1126: 1129] Signal 1126, PID: 1129, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.845011 345762 task_signals.go:204] [ 1126: 1127] Signal 1126, PID: 1127, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.845020 345762 task_exit.go:204] [ 1126: 1128] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.844970 345762 task_signals.go:204] [ 1126: 1130] Signal 1126, PID: 1130, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.845045 345762 task_exit.go:204] [ 1126: 1128] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.845091 345762 task_exit.go:204] [ 1126: 1128] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.845167 345762 task_exit.go:204] [ 1126: 1129] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.845186 345762 task_exit.go:204] [ 1126: 1129] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.845200 345762 task_exit.go:204] [ 1126: 1129] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.845214 345762 task_exit.go:204] [ 1126: 1127] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.845229 345762 task_exit.go:204] [ 1126: 1127] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.845234 345762 task_exit.go:204] [ 1126: 1127] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.845242 345762 task_exit.go:204] [ 1126: 1130] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.846793 345762 task_exit.go:204] [ 1126: 1130] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.846825 345762 task_exit.go:204] [ 1126: 1130] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.846843 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.846873 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.846900 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.847092 345762 task_exit.go:204] [ 1126: 1126] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.847709 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.847771 345762 task_signals.go:481] [ 5: 16] No task notified of signal 23 D0713 08:45:21.849493 345762 syscalls.go:262] [ 1131: 1131] Allocating stack with size of 8388608 bytes D0713 08:45:21.849654 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.849747 345762 task_signals.go:220] [ 5: 16] Signal 23: delivering to handler D0713 08:45:21.849810 345762 task_signals.go:470] [ 5: 16] Notified of signal 23 D0713 08:45:21.849857 345762 task_signals.go:220] [ 5: 16] Signal 23: delivering to handler D0713 08:45:21.851270 345762 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.851322 345762 usertrap_amd64.go:106] [ 1131: 1131] Map a usertrap vma at 61000 D0713 08:45:21.851440 345762 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc002812f00 1 D0713 08:45:21.851471 345762 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:21.851933 345762 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.851951 345762 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc002812f00 2 D0713 08:45:21.851959 345762 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:21.852786 345762 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.852803 345762 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc002812f00 3 D0713 08:45:21.852810 345762 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:45:21.859205 345762 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.859285 345762 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc002812f00 4 D0713 08:45:21.859304 345762 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:45:21.860611 345762 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.860645 345762 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc002812f00 5 D0713 08:45:21.860665 345762 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:45:21.860733 345762 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.860756 345762 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc002812f00 6 D0713 08:45:21.860766 345762 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:45:21.861111 345762 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.861138 345762 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc002812f00 7 D0713 08:45:21.861146 345762 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:45:21.861429 345762 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.861476 345762 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc002812f00 8 D0713 08:45:21.861495 345762 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:45:21.861706 345762 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.861742 345762 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc002812f00 9 D0713 08:45:21.861754 345762 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:45:21.861934 345762 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.861982 345762 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc002812f00 10 D0713 08:45:21.862000 345762 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:45:21.862618 345762 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.862660 345762 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc002812f00 11 D0713 08:45:21.862671 345762 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:45:21.862701 345762 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.862707 345762 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc002812f00 12 D0713 08:45:21.862714 345762 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:45:21.862754 345762 task_signals.go:470] [ 1131: 1131] Notified of signal 23 D0713 08:45:21.862815 345762 task_signals.go:220] [ 1131: 1131] Signal 23: delivering to handler D0713 08:45:21.869908 345762 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.869972 345762 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc002812f00 13 D0713 08:45:21.869987 345762 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:45:21.873989 345762 task_signals.go:470] [ 1131: 1131] Notified of signal 23 D0713 08:45:21.874078 345762 task_signals.go:179] [ 1131: 1131] Restarting syscall 202: interrupted by signal 23 D0713 08:45:21.874121 345762 task_signals.go:220] [ 1131: 1131] Signal 23: delivering to handler I0713 08:45:21.881535 345762 compat.go:120] Unsupported syscall remap_file_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/remap_file_pages for more information. D0713 08:45:21.881776 345762 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.881809 345762 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc002812f00 14 D0713 08:45:21.881826 345762 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:45:21.881929 345762 task_exit.go:204] [ 1131: 1131] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.881965 345762 task_exit.go:204] [ 1131: 1131] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.881968 345762 task_signals.go:204] [ 1131: 1132] Signal 1131, PID: 1132, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.881992 345762 task_signals.go:204] [ 1131: 1134] Signal 1131, PID: 1134, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.882006 345762 task_exit.go:204] [ 1131: 1132] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.882007 345762 task_signals.go:204] [ 1131: 1135] Signal 1131, PID: 1135, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.882041 345762 task_exit.go:204] [ 1131: 1132] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.882056 345762 task_exit.go:204] [ 1131: 1132] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.882078 345762 task_signals.go:204] [ 1131: 1133] Signal 1131, PID: 1133, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.882085 345762 task_exit.go:204] [ 1131: 1135] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.882124 345762 task_exit.go:204] [ 1131: 1135] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.882147 345762 task_exit.go:204] [ 1131: 1135] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.882162 345762 task_exit.go:204] [ 1131: 1133] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.882170 345762 task_exit.go:204] [ 1131: 1133] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.882175 345762 task_exit.go:204] [ 1131: 1133] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.882186 345762 task_exit.go:204] [ 1131: 1134] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.883602 345762 task_exit.go:204] [ 1131: 1134] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.883623 345762 task_exit.go:204] [ 1131: 1134] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.883642 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.883670 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.883702 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.883806 345762 task_exit.go:204] [ 1131: 1131] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.884569 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.886163 345762 syscalls.go:262] [ 1136: 1136] Allocating stack with size of 8388608 bytes D0713 08:45:21.886324 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.887846 345762 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.887891 345762 usertrap_amd64.go:106] [ 1136: 1136] Map a usertrap vma at 68000 D0713 08:45:21.888049 345762 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0028130e0 1 D0713 08:45:21.888086 345762 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:45:21.888521 345762 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.888540 345762 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0028130e0 2 D0713 08:45:21.888549 345762 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:45:21.889365 345762 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.889395 345762 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0028130e0 3 D0713 08:45:21.889406 345762 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:45:21.895659 345762 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.895692 345762 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0028130e0 4 D0713 08:45:21.895704 345762 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:45:21.896776 345762 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.896806 345762 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0028130e0 5 D0713 08:45:21.896818 345762 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:45:21.896918 345762 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.896934 345762 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0028130e0 6 D0713 08:45:21.896966 345762 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:45:21.897500 345762 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.897539 345762 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0028130e0 7 D0713 08:45:21.897552 345762 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:45:21.897736 345762 usertrap_amd64.go:212] [ 1136: 1137] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.897753 345762 usertrap_amd64.go:122] [ 1136: 1137] Allocate a new trap: 0xc0028130e0 8 D0713 08:45:21.897761 345762 usertrap_amd64.go:225] [ 1136: 1137] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:45:21.897953 345762 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.897972 345762 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0028130e0 9 D0713 08:45:21.897980 345762 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:45:21.898020 345762 usertrap_amd64.go:212] [ 1136: 1137] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.898097 345762 usertrap_amd64.go:122] [ 1136: 1137] Allocate a new trap: 0xc0028130e0 10 D0713 08:45:21.898121 345762 usertrap_amd64.go:225] [ 1136: 1137] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:45:21.906229 345762 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.906293 345762 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0028130e0 11 D0713 08:45:21.906310 345762 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:45:21.908995 345762 usertrap_amd64.go:212] [ 1136: 1137] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.909039 345762 usertrap_amd64.go:122] [ 1136: 1137] Allocate a new trap: 0xc0028130e0 12 D0713 08:45:21.909055 345762 usertrap_amd64.go:225] [ 1136: 1137] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:45:21.909131 345762 usertrap_amd64.go:212] [ 1136: 1137] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.909160 345762 usertrap_amd64.go:122] [ 1136: 1137] Allocate a new trap: 0xc0028130e0 13 D0713 08:45:21.909175 345762 usertrap_amd64.go:225] [ 1136: 1137] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:45:21.909239 345762 task_signals.go:470] [ 1136: 1136] Notified of signal 23 D0713 08:45:21.909334 345762 task_signals.go:220] [ 1136: 1136] Signal 23: delivering to handler D0713 08:45:21.917709 345762 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.917740 345762 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0028130e0 14 D0713 08:45:21.917751 345762 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:45:21.917826 345762 task_exit.go:204] [ 1136: 1136] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.917866 345762 task_exit.go:204] [ 1136: 1136] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.917906 345762 task_signals.go:204] [ 1136: 1140] Signal 1136, PID: 1140, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.917891 345762 task_signals.go:204] [ 1136: 1138] Signal 1136, PID: 1138, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.917920 345762 task_signals.go:204] [ 1136: 1139] Signal 1136, PID: 1139, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.917940 345762 task_exit.go:204] [ 1136: 1140] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.918034 345762 task_signals.go:204] [ 1136: 1137] Signal 1136, PID: 1137, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.918091 345762 task_exit.go:204] [ 1136: 1140] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.918112 345762 task_exit.go:204] [ 1136: 1140] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.918135 345762 task_exit.go:204] [ 1136: 1138] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.918151 345762 task_exit.go:204] [ 1136: 1138] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.918168 345762 task_exit.go:204] [ 1136: 1138] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.918182 345762 task_exit.go:204] [ 1136: 1139] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.918206 345762 task_exit.go:204] [ 1136: 1139] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.918214 345762 task_exit.go:204] [ 1136: 1139] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.918231 345762 task_exit.go:204] [ 1136: 1137] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.919713 345762 task_exit.go:204] [ 1136: 1137] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.919744 345762 task_exit.go:204] [ 1136: 1137] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.919759 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.919790 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.919807 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.920008 345762 task_exit.go:204] [ 1136: 1136] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.920127 345762 task_signals.go:470] [ 5: 16] Notified of signal 23 D0713 08:45:21.920156 345762 task_signals.go:220] [ 5: 16] Signal 23: delivering to handler D0713 08:45:21.920685 345762 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.922399 345762 syscalls.go:262] [ 1141: 1141] Allocating stack with size of 8388608 bytes D0713 08:45:21.922590 345762 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.923973 345762 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.924042 345762 usertrap_amd64.go:106] [ 1141: 1141] Map a usertrap vma at 69000 D0713 08:45:21.924160 345762 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc001680db0 1 D0713 08:45:21.924202 345762 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:21.924694 345762 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.924712 345762 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc001680db0 2 D0713 08:45:21.924720 345762 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:21.925424 345762 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.925449 345762 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc001680db0 3 D0713 08:45:21.925459 345762 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:21.931975 345762 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.932015 345762 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc001680db0 4 D0713 08:45:21.932029 345762 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:21.933602 345762 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.933631 345762 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc001680db0 5 D0713 08:45:21.933647 345762 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:21.933706 345762 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.933715 345762 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc001680db0 6 D0713 08:45:21.933726 345762 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:21.934094 345762 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.934115 345762 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc001680db0 7 D0713 08:45:21.934125 345762 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:21.934328 345762 usertrap_amd64.go:212] [ 1141: 1142] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.934352 345762 usertrap_amd64.go:122] [ 1141: 1142] Allocate a new trap: 0xc001680db0 8 D0713 08:45:21.934365 345762 usertrap_amd64.go:225] [ 1141: 1142] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:21.934649 345762 usertrap_amd64.go:212] [ 1141: 1143] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:21.934672 345762 usertrap_amd64.go:122] [ 1141: 1143] Allocate a new trap: 0xc001680db0 9 D0713 08:45:21.934684 345762 usertrap_amd64.go:225] [ 1141: 1143] Apply the binary patch addr 46b6e0 trap addr 692d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:21.934741 345762 usertrap_amd64.go:212] [ 1141: 1142] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.934777 345762 usertrap_amd64.go:122] [ 1141: 1142] Allocate a new trap: 0xc001680db0 10 D0713 08:45:21.934789 345762 usertrap_amd64.go:225] [ 1141: 1142] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:21.934811 345762 usertrap_amd64.go:212] [ 1141: 1143] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.934824 345762 usertrap_amd64.go:122] [ 1141: 1143] Allocate a new trap: 0xc001680db0 11 D0713 08:45:21.934831 345762 usertrap_amd64.go:225] [ 1141: 1143] Apply the binary patch addr 46b57c trap addr 69370 ([184 202 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:21.942443 345762 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.942484 345762 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc001680db0 12 D0713 08:45:21.942498 345762 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46af29 trap addr 693c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:21.945222 345762 usertrap_amd64.go:212] [ 1141: 1142] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.945261 345762 usertrap_amd64.go:122] [ 1141: 1142] Allocate a new trap: 0xc001680db0 13 D0713 08:45:21.945276 345762 usertrap_amd64.go:225] [ 1141: 1142] Apply the binary patch addr 46b020 trap addr 69410 ([184 39 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:21.945344 345762 usertrap_amd64.go:212] [ 1141: 1142] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.945389 345762 usertrap_amd64.go:122] [ 1141: 1142] Allocate a new trap: 0xc001680db0 14 D0713 08:45:21.945406 345762 usertrap_amd64.go:225] [ 1141: 1142] Apply the binary patch addr 46b04f trap addr 69460 ([184 234 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:21.945477 345762 task_signals.go:470] [ 1141: 1141] Notified of signal 23 D0713 08:45:21.945565 345762 task_signals.go:220] [ 1141: 1141] Signal 23: delivering to handler D0713 08:45:21.954733 345762 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.954754 345762 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc001680db0 15 D0713 08:45:21.954778 345762 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0713 08:45:21.954864 345762 task_exit.go:204] [ 1141: 1141] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.954895 345762 task_exit.go:204] [ 1141: 1141] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.954918 345762 task_signals.go:204] [ 1141: 1143] Signal 1141, PID: 1143, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.954917 345762 task_signals.go:204] [ 1141: 1142] Signal 1141, PID: 1142, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.954935 345762 task_exit.go:204] [ 1141: 1143] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.954939 345762 task_signals.go:204] [ 1141: 1145] Signal 1141, PID: 1145, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.954961 345762 task_exit.go:204] [ 1141: 1143] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.954997 345762 task_exit.go:204] [ 1141: 1143] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.955023 345762 task_signals.go:204] [ 1141: 1144] Signal 1141, PID: 1144, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.955041 345762 task_exit.go:204] [ 1141: 1144] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.955049 345762 task_exit.go:204] [ 1141: 1144] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.955065 345762 task_exit.go:204] [ 1141: 1144] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.955095 345762 task_exit.go:204] [ 1141: 1145] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.955190 345762 task_exit.go:204] [ 1141: 1145] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.955202 345762 task_exit.go:204] [ 1141: 1145] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.955229 345762 task_exit.go:204] [ 1141: 1142] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.956661 345762 task_exit.go:204] [ 1141: 1142] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.956676 345762 task_exit.go:204] [ 1141: 1142] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.956699 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.956737 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.956746 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.956825 345762 task_exit.go:204] [ 1141: 1141] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.957402 345762 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.958833 345762 syscalls.go:262] [ 1146: 1146] Allocating stack with size of 8388608 bytes D0713 08:45:21.958957 345762 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.960154 345762 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.960199 345762 usertrap_amd64.go:106] [ 1146: 1146] Map a usertrap vma at 63000 D0713 08:45:21.960277 345762 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc002813200 1 D0713 08:45:21.960305 345762 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:21.960777 345762 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.960801 345762 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc002813200 2 D0713 08:45:21.960811 345762 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:21.961368 345762 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.961389 345762 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc002813200 3 D0713 08:45:21.961397 345762 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:21.966934 345762 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.966978 345762 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc002813200 4 D0713 08:45:21.966994 345762 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:21.968335 345762 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.968358 345762 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc002813200 5 D0713 08:45:21.968375 345762 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:21.968480 345762 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.968498 345762 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc002813200 6 D0713 08:45:21.968505 345762 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:21.968862 345762 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.968878 345762 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc002813200 7 D0713 08:45:21.968885 345762 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:21.969030 345762 usertrap_amd64.go:212] [ 1146: 1147] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.969048 345762 usertrap_amd64.go:122] [ 1146: 1147] Allocate a new trap: 0xc002813200 8 D0713 08:45:21.969054 345762 usertrap_amd64.go:225] [ 1146: 1147] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:21.969321 345762 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.969344 345762 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc002813200 9 D0713 08:45:21.969352 345762 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:21.969362 345762 usertrap_amd64.go:212] [ 1146: 1147] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.969368 345762 usertrap_amd64.go:122] [ 1146: 1147] Allocate a new trap: 0xc002813200 10 D0713 08:45:21.969375 345762 usertrap_amd64.go:225] [ 1146: 1147] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:21.977180 345762 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.977249 345762 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc002813200 11 D0713 08:45:21.977267 345762 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:21.980046 345762 usertrap_amd64.go:212] [ 1146: 1147] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.980116 345762 usertrap_amd64.go:122] [ 1146: 1147] Allocate a new trap: 0xc002813200 12 D0713 08:45:21.980136 345762 usertrap_amd64.go:225] [ 1146: 1147] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:21.980170 345762 usertrap_amd64.go:212] [ 1146: 1147] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.980175 345762 usertrap_amd64.go:122] [ 1146: 1147] Allocate a new trap: 0xc002813200 13 D0713 08:45:21.980182 345762 usertrap_amd64.go:225] [ 1146: 1147] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:21.980209 345762 task_signals.go:470] [ 1146: 1146] Notified of signal 23 D0713 08:45:21.980330 345762 task_signals.go:220] [ 1146: 1146] Signal 23: delivering to handler D0713 08:45:21.988869 345762 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.988923 345762 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc002813200 14 D0713 08:45:21.988959 345762 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:21.989097 345762 task_exit.go:204] [ 1146: 1146] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.989126 345762 task_exit.go:204] [ 1146: 1146] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.989148 345762 task_signals.go:204] [ 1146: 1149] Signal 1146, PID: 1149, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.989148 345762 task_signals.go:204] [ 1146: 1148] Signal 1146, PID: 1148, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.989169 345762 task_exit.go:204] [ 1146: 1149] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.989176 345762 task_exit.go:204] [ 1146: 1148] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.989193 345762 task_exit.go:204] [ 1146: 1148] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.989200 345762 task_exit.go:204] [ 1146: 1148] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.989222 345762 task_signals.go:204] [ 1146: 1147] Signal 1146, PID: 1147, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.989241 345762 task_signals.go:204] [ 1146: 1150] Signal 1146, PID: 1150, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.989253 345762 task_exit.go:204] [ 1146: 1149] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.989261 345762 task_exit.go:204] [ 1146: 1149] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.989275 345762 task_exit.go:204] [ 1146: 1147] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.989289 345762 task_exit.go:204] [ 1146: 1147] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.989297 345762 task_exit.go:204] [ 1146: 1147] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.989307 345762 task_exit.go:204] [ 1146: 1150] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.990721 345762 task_exit.go:204] [ 1146: 1150] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.990752 345762 task_exit.go:204] [ 1146: 1150] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.990775 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:21.990837 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.990901 345762 task_exit.go:204] [ 1146: 1146] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.990909 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:21.991025 345762 task_signals.go:470] [ 5: 15] Notified of signal 23 D0713 08:45:21.991132 345762 task_signals.go:220] [ 5: 15] Signal 23: delivering to handler D0713 08:45:21.991698 345762 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.993375 345762 syscalls.go:262] [ 1151: 1151] Allocating stack with size of 8388608 bytes D0713 08:45:21.993544 345762 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.994577 345762 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.994625 345762 usertrap_amd64.go:106] [ 1151: 1151] Map a usertrap vma at 64000 D0713 08:45:21.994724 345762 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc001680ed0 1 D0713 08:45:21.994756 345762 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:21.995235 345762 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.995258 345762 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc001680ed0 2 D0713 08:45:21.995279 345762 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:21.995964 345762 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.995987 345762 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc001680ed0 3 D0713 08:45:21.995998 345762 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:22.001662 345762 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:22.001706 345762 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc001680ed0 4 D0713 08:45:22.001718 345762 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:22.003017 345762 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:22.003044 345762 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc001680ed0 5 D0713 08:45:22.003052 345762 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:22.003108 345762 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b214:sysno 13 D0713 08:45:22.003117 345762 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc001680ed0 6 D0713 08:45:22.003126 345762 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:22.003298 345762 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:22.003320 345762 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc001680ed0 7 D0713 08:45:22.003326 345762 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:22.003581 345762 usertrap_amd64.go:212] [ 1151: 1152] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:22.003610 345762 usertrap_amd64.go:122] [ 1151: 1152] Allocate a new trap: 0xc001680ed0 8 D0713 08:45:22.003619 345762 usertrap_amd64.go:225] [ 1151: 1152] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:22.003902 345762 usertrap_amd64.go:212] [ 1151: 1152] Found the pattern at ip 46af76:sysno 35 D0713 08:45:22.003941 345762 usertrap_amd64.go:122] [ 1151: 1152] Allocate a new trap: 0xc001680ed0 9 D0713 08:45:22.003955 345762 usertrap_amd64.go:225] [ 1151: 1152] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:22.004003 345762 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:22.004045 345762 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc001680ed0 10 D0713 08:45:22.004054 345762 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:22.012183 345762 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46af29:sysno 293 D0713 08:45:22.012234 345762 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc001680ed0 11 D0713 08:45:22.012273 345762 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:22.015055 345762 usertrap_amd64.go:212] [ 1151: 1152] Found the pattern at ip 46b020:sysno 39 D0713 08:45:22.015103 345762 usertrap_amd64.go:122] [ 1151: 1152] Allocate a new trap: 0xc001680ed0 12 D0713 08:45:22.015127 345762 usertrap_amd64.go:225] [ 1151: 1152] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:22.015180 345762 usertrap_amd64.go:212] [ 1151: 1152] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:22.015192 345762 usertrap_amd64.go:122] [ 1151: 1152] Allocate a new trap: 0xc001680ed0 13 D0713 08:45:22.015201 345762 usertrap_amd64.go:225] [ 1151: 1152] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:22.015237 345762 task_signals.go:470] [ 1151: 1151] Notified of signal 23 D0713 08:45:22.015334 345762 task_signals.go:220] [ 1151: 1151] Signal 23: delivering to handler D0713 08:45:22.023885 345762 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:22.023948 345762 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc001680ed0 14 D0713 08:45:22.023967 345762 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:22.024068 345762 task_exit.go:204] [ 1151: 1151] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.024107 345762 task_exit.go:204] [ 1151: 1151] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.024138 345762 task_signals.go:204] [ 1151: 1156] Signal 1151, PID: 1156, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.024137 345762 task_signals.go:204] [ 1151: 1152] Signal 1151, PID: 1152, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.024168 345762 task_signals.go:204] [ 1151: 1154] Signal 1151, PID: 1154, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.024176 345762 task_exit.go:204] [ 1151: 1156] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.024172 345762 task_signals.go:204] [ 1151: 1155] Signal 1151, PID: 1155, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.024207 345762 task_signals.go:204] [ 1151: 1153] Signal 1151, PID: 1153, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.024227 345762 task_exit.go:204] [ 1151: 1156] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.024255 345762 task_exit.go:204] [ 1151: 1156] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.024285 345762 task_exit.go:204] [ 1151: 1152] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.024303 345762 task_exit.go:204] [ 1151: 1152] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.024308 345762 task_exit.go:204] [ 1151: 1152] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.024320 345762 task_exit.go:204] [ 1151: 1154] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.024327 345762 task_exit.go:204] [ 1151: 1154] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.024332 345762 task_exit.go:204] [ 1151: 1154] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.024339 345762 task_exit.go:204] [ 1151: 1155] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.024345 345762 task_exit.go:204] [ 1151: 1155] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.024349 345762 task_exit.go:204] [ 1151: 1155] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.024362 345762 task_exit.go:204] [ 1151: 1153] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.025755 345762 task_exit.go:204] [ 1151: 1153] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.025774 345762 task_exit.go:204] [ 1151: 1153] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.025803 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:22.025860 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:22.025882 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:22.026121 345762 task_exit.go:204] [ 1151: 1151] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.027087 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.028741 345762 syscalls.go:262] [ 1157: 1157] Allocating stack with size of 8388608 bytes D0713 08:45:22.028859 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.030392 345762 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:22.030456 345762 usertrap_amd64.go:106] [ 1157: 1157] Map a usertrap vma at 63000 D0713 08:45:22.030547 345762 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc000197b60 1 D0713 08:45:22.030573 345762 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:22.031038 345762 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:22.031077 345762 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc000197b60 2 D0713 08:45:22.031092 345762 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:22.031841 345762 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:22.031862 345762 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc000197b60 3 D0713 08:45:22.031875 345762 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:22.037769 345762 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:22.037830 345762 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc000197b60 4 D0713 08:45:22.037848 345762 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:22.039083 345762 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:22.039138 345762 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc000197b60 5 D0713 08:45:22.039153 345762 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:22.039219 345762 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b214:sysno 13 D0713 08:45:22.039234 345762 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc000197b60 6 D0713 08:45:22.039241 345762 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:22.039682 345762 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:22.039726 345762 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc000197b60 7 D0713 08:45:22.039739 345762 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:22.040021 345762 usertrap_amd64.go:212] [ 1157: 1158] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:22.040052 345762 usertrap_amd64.go:122] [ 1157: 1158] Allocate a new trap: 0xc000197b60 8 D0713 08:45:22.040064 345762 usertrap_amd64.go:225] [ 1157: 1158] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:22.040249 345762 usertrap_amd64.go:212] [ 1157: 1158] Found the pattern at ip 46af76:sysno 35 D0713 08:45:22.040289 345762 usertrap_amd64.go:122] [ 1157: 1158] Allocate a new trap: 0xc000197b60 9 D0713 08:45:22.040309 345762 usertrap_amd64.go:225] [ 1157: 1158] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:22.040363 345762 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:22.040380 345762 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc000197b60 10 D0713 08:45:22.040389 345762 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:22.040437 345762 usertrap_amd64.go:212] [ 1157: 1158] Found the pattern at ip 46b020:sysno 39 D0713 08:45:22.040447 345762 usertrap_amd64.go:122] [ 1157: 1158] Allocate a new trap: 0xc000197b60 11 D0713 08:45:22.040453 345762 usertrap_amd64.go:225] [ 1157: 1158] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:22.040635 345762 usertrap_amd64.go:212] [ 1157: 1158] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:22.040682 345762 usertrap_amd64.go:122] [ 1157: 1158] Allocate a new trap: 0xc000197b60 12 D0713 08:45:22.040703 345762 usertrap_amd64.go:225] [ 1157: 1158] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:22.040748 345762 task_signals.go:470] [ 1157: 1160] Notified of signal 23 D0713 08:45:22.040783 345762 task_signals.go:179] [ 1157: 1160] Restarting syscall 202: interrupted by signal 23 D0713 08:45:22.040792 345762 task_signals.go:220] [ 1157: 1160] Signal 23: delivering to handler D0713 08:45:22.041056 345762 task_signals.go:470] [ 1157: 1157] Notified of signal 23 D0713 08:45:22.041118 345762 task_signals.go:220] [ 1157: 1157] Signal 23: delivering to handler D0713 08:45:22.048277 345762 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46af29:sysno 293 D0713 08:45:22.048305 345762 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc000197b60 13 D0713 08:45:22.048316 345762 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:22.052480 345762 task_signals.go:470] [ 1157: 1157] Notified of signal 23 D0713 08:45:22.052543 345762 task_signals.go:220] [ 1157: 1157] Signal 23: delivering to handler D0713 08:45:22.059366 345762 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:22.059406 345762 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc000197b60 14 D0713 08:45:22.059419 345762 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:22.059491 345762 task_exit.go:204] [ 1157: 1157] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.059513 345762 task_exit.go:204] [ 1157: 1157] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.059534 345762 task_signals.go:204] [ 1157: 1160] Signal 1157, PID: 1160, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.059536 345762 task_signals.go:204] [ 1157: 1159] Signal 1157, PID: 1159, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.059554 345762 task_exit.go:204] [ 1157: 1160] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.059559 345762 task_exit.go:204] [ 1157: 1159] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.059557 345762 task_signals.go:204] [ 1157: 1158] Signal 1157, PID: 1158, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.059575 345762 task_exit.go:204] [ 1157: 1159] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.059584 345762 task_exit.go:204] [ 1157: 1159] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.059600 345762 task_exit.go:204] [ 1157: 1160] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.059621 345762 task_exit.go:204] [ 1157: 1160] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.059604 345762 task_signals.go:204] [ 1157: 1161] Signal 1157, PID: 1161, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.059634 345762 task_exit.go:204] [ 1157: 1158] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.059642 345762 task_exit.go:204] [ 1157: 1158] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.059647 345762 task_exit.go:204] [ 1157: 1158] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.059657 345762 task_exit.go:204] [ 1157: 1161] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.061047 345762 task_exit.go:204] [ 1157: 1161] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.061073 345762 task_exit.go:204] [ 1157: 1161] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.061087 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:22.061110 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:22.061118 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:22.061293 345762 task_exit.go:204] [ 1157: 1157] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.061417 345762 task_signals.go:470] [ 5: 16] Notified of signal 23 D0713 08:45:22.061512 345762 task_signals.go:220] [ 5: 16] Signal 23: delivering to handler D0713 08:45:22.061964 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.063337 345762 syscalls.go:262] [ 1162: 1162] Allocating stack with size of 8388608 bytes D0713 08:45:22.063447 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.065271 345762 usertrap_amd64.go:212] [ 1162: 1162] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:22.065349 345762 usertrap_amd64.go:106] [ 1162: 1162] Map a usertrap vma at 63000 D0713 08:45:22.065516 345762 usertrap_amd64.go:122] [ 1162: 1162] Allocate a new trap: 0xc0016810b0 1 D0713 08:45:22.065585 345762 usertrap_amd64.go:225] [ 1162: 1162] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:22.066224 345762 usertrap_amd64.go:212] [ 1162: 1162] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:22.066251 345762 usertrap_amd64.go:122] [ 1162: 1162] Allocate a new trap: 0xc0016810b0 2 D0713 08:45:22.066263 345762 usertrap_amd64.go:225] [ 1162: 1162] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:22.066760 345762 usertrap_amd64.go:212] [ 1162: 1162] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:22.066778 345762 usertrap_amd64.go:122] [ 1162: 1162] Allocate a new trap: 0xc0016810b0 3 D0713 08:45:22.066786 345762 usertrap_amd64.go:225] [ 1162: 1162] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:22.072514 345762 usertrap_amd64.go:212] [ 1162: 1162] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:22.072543 345762 usertrap_amd64.go:122] [ 1162: 1162] Allocate a new trap: 0xc0016810b0 4 D0713 08:45:22.072555 345762 usertrap_amd64.go:225] [ 1162: 1162] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:22.073798 345762 usertrap_amd64.go:212] [ 1162: 1162] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:22.073821 345762 usertrap_amd64.go:122] [ 1162: 1162] Allocate a new trap: 0xc0016810b0 5 D0713 08:45:22.073833 345762 usertrap_amd64.go:225] [ 1162: 1162] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:22.073901 345762 usertrap_amd64.go:212] [ 1162: 1162] Found the pattern at ip 46b214:sysno 13 D0713 08:45:22.073908 345762 usertrap_amd64.go:122] [ 1162: 1162] Allocate a new trap: 0xc0016810b0 6 D0713 08:45:22.073913 345762 usertrap_amd64.go:225] [ 1162: 1162] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:22.074268 345762 usertrap_amd64.go:212] [ 1162: 1162] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:22.074285 345762 usertrap_amd64.go:122] [ 1162: 1162] Allocate a new trap: 0xc0016810b0 7 D0713 08:45:22.074292 345762 usertrap_amd64.go:225] [ 1162: 1162] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:22.074428 345762 usertrap_amd64.go:212] [ 1162: 1163] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:22.074450 345762 usertrap_amd64.go:122] [ 1162: 1163] Allocate a new trap: 0xc0016810b0 8 D0713 08:45:22.074462 345762 usertrap_amd64.go:225] [ 1162: 1163] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:22.074612 345762 usertrap_amd64.go:212] [ 1162: 1163] Found the pattern at ip 46af76:sysno 35 D0713 08:45:22.074642 345762 usertrap_amd64.go:122] [ 1162: 1163] Allocate a new trap: 0xc0016810b0 9 D0713 08:45:22.074655 345762 usertrap_amd64.go:225] [ 1162: 1163] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:22.074719 345762 usertrap_amd64.go:212] [ 1162: 1162] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:22.074755 345762 usertrap_amd64.go:122] [ 1162: 1162] Allocate a new trap: 0xc0016810b0 10 D0713 08:45:22.074765 345762 usertrap_amd64.go:225] [ 1162: 1162] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:22.082477 345762 usertrap_amd64.go:212] [ 1162: 1162] Found the pattern at ip 46af29:sysno 293 D0713 08:45:22.082546 345762 usertrap_amd64.go:122] [ 1162: 1162] Allocate a new trap: 0xc0016810b0 11 D0713 08:45:22.082561 345762 usertrap_amd64.go:225] [ 1162: 1162] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:22.085344 345762 usertrap_amd64.go:212] [ 1162: 1163] Found the pattern at ip 46b020:sysno 39 D0713 08:45:22.085382 345762 usertrap_amd64.go:122] [ 1162: 1163] Allocate a new trap: 0xc0016810b0 12 D0713 08:45:22.085395 345762 usertrap_amd64.go:225] [ 1162: 1163] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:22.085416 345762 usertrap_amd64.go:212] [ 1162: 1163] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:22.085421 345762 usertrap_amd64.go:122] [ 1162: 1163] Allocate a new trap: 0xc0016810b0 13 D0713 08:45:22.085428 345762 usertrap_amd64.go:225] [ 1162: 1163] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:22.085493 345762 task_signals.go:470] [ 1162: 1162] Notified of signal 23 D0713 08:45:22.085568 345762 task_signals.go:220] [ 1162: 1162] Signal 23: delivering to handler D0713 08:45:22.093114 345762 sys_signal.go:495] [ 1162: 1162] Restart block missing in restart_syscall(2). Did ptrace inject a return value of ERESTART_RESTARTBLOCK? D0713 08:45:22.093234 345762 usertrap_amd64.go:212] [ 1162: 1162] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:22.093261 345762 usertrap_amd64.go:122] [ 1162: 1162] Allocate a new trap: 0xc0016810b0 14 D0713 08:45:22.093278 345762 usertrap_amd64.go:225] [ 1162: 1162] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:22.093372 345762 task_exit.go:204] [ 1162: 1162] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.093455 345762 task_signals.go:204] [ 1162: 1163] Signal 1162, PID: 1163, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.093495 345762 task_exit.go:204] [ 1162: 1162] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.093519 345762 task_signals.go:204] [ 1162: 1165] Signal 1162, PID: 1165, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.093520 345762 task_signals.go:204] [ 1162: 1164] Signal 1162, PID: 1164, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.093544 345762 task_signals.go:204] [ 1162: 1166] Signal 1162, PID: 1166, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.093551 345762 task_signals.go:204] [ 1162: 1167] Signal 1162, PID: 1167, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.093566 345762 task_exit.go:204] [ 1162: 1165] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.093579 345762 task_exit.go:204] [ 1162: 1165] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.093600 345762 task_exit.go:204] [ 1162: 1165] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.093619 345762 task_exit.go:204] [ 1162: 1164] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.093629 345762 task_exit.go:204] [ 1162: 1164] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.093635 345762 task_exit.go:204] [ 1162: 1164] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.093651 345762 task_exit.go:204] [ 1162: 1163] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.093674 345762 task_exit.go:204] [ 1162: 1163] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.093681 345762 task_exit.go:204] [ 1162: 1163] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.093693 345762 task_exit.go:204] [ 1162: 1166] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.093723 345762 task_exit.go:204] [ 1162: 1166] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.093738 345762 task_exit.go:204] [ 1162: 1166] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.093750 345762 task_exit.go:204] [ 1162: 1167] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.095084 345762 task_exit.go:204] [ 1162: 1167] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.095122 345762 task_exit.go:204] [ 1162: 1167] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.095136 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:22.095174 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:22.095193 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:22.095324 345762 task_exit.go:204] [ 1162: 1162] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.096030 345762 task_stop.go:118] [ 5: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.097437 345762 syscalls.go:262] [ 1168: 1168] Allocating stack with size of 8388608 bytes D0713 08:45:22.097581 345762 task_stop.go:138] [ 5: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.098712 345762 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:22.098787 345762 usertrap_amd64.go:106] [ 1168: 1168] Map a usertrap vma at 6a000 D0713 08:45:22.098884 345762 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc0013a6e70 1 D0713 08:45:22.098925 345762 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:22.099406 345762 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:22.099432 345762 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc0013a6e70 2 D0713 08:45:22.099441 345762 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:22.099969 345762 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:22.099989 345762 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc0013a6e70 3 D0713 08:45:22.099999 345762 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:22.106513 345762 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:22.106552 345762 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc0013a6e70 4 D0713 08:45:22.106565 345762 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:22.107795 345762 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:22.107822 345762 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc0013a6e70 5 D0713 08:45:22.107832 345762 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:22.108021 345762 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46b214:sysno 13 D0713 08:45:22.108037 345762 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc0013a6e70 6 D0713 08:45:22.108044 345762 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:22.108355 345762 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:22.108374 345762 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc0013a6e70 7 D0713 08:45:22.108379 345762 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:22.108522 345762 usertrap_amd64.go:212] [ 1168: 1169] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:22.108544 345762 usertrap_amd64.go:122] [ 1168: 1169] Allocate a new trap: 0xc0013a6e70 8 D0713 08:45:22.108552 345762 usertrap_amd64.go:225] [ 1168: 1169] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:22.108728 345762 usertrap_amd64.go:212] [ 1168: 1170] Found the pattern at ip 46af76:sysno 35 D0713 08:45:22.108757 345762 usertrap_amd64.go:122] [ 1168: 1170] Allocate a new trap: 0xc0013a6e70 9 D0713 08:45:22.108770 345762 usertrap_amd64.go:225] [ 1168: 1170] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:22.108929 345762 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:22.109000 345762 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc0013a6e70 10 D0713 08:45:22.109020 345762 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:22.109139 345762 usertrap_amd64.go:212] [ 1168: 1171] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:22.109164 345762 usertrap_amd64.go:122] [ 1168: 1171] Allocate a new trap: 0xc0013a6e70 11 D0713 08:45:22.109174 345762 usertrap_amd64.go:225] [ 1168: 1171] Apply the binary patch addr 46b6e0 trap addr 6a370 ([184 24 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:22.117107 345762 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46af29:sysno 293 D0713 08:45:22.117162 345762 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc0013a6e70 12 D0713 08:45:22.117176 345762 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46af29 trap addr 6a3c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:22.119999 345762 usertrap_amd64.go:212] [ 1168: 1169] Found the pattern at ip 46b020:sysno 39 D0713 08:45:22.120035 345762 usertrap_amd64.go:122] [ 1168: 1169] Allocate a new trap: 0xc0013a6e70 13 D0713 08:45:22.120053 345762 usertrap_amd64.go:225] [ 1168: 1169] Apply the binary patch addr 46b020 trap addr 6a410 ([184 39 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:22.120108 345762 usertrap_amd64.go:212] [ 1168: 1169] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:22.120167 345762 usertrap_amd64.go:122] [ 1168: 1169] Allocate a new trap: 0xc0013a6e70 14 D0713 08:45:22.120182 345762 usertrap_amd64.go:225] [ 1168: 1169] Apply the binary patch addr 46b04f trap addr 6a460 ([184 234 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:22.120231 345762 task_signals.go:470] [ 1168: 1168] Notified of signal 23 D0713 08:45:22.120335 345762 task_signals.go:220] [ 1168: 1168] Signal 23: delivering to handler D0713 08:45:22.129649 345762 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:22.129695 345762 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc0013a6e70 15 D0713 08:45:22.129718 345762 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 08:45:22.129813 345762 task_exit.go:204] [ 1168: 1168] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.129850 345762 task_signals.go:204] [ 1168: 1169] Signal 1168, PID: 1169, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.129870 345762 task_exit.go:204] [ 1168: 1168] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.129883 345762 task_exit.go:204] [ 1168: 1169] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.129891 345762 task_exit.go:204] [ 1168: 1169] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.129896 345762 task_exit.go:204] [ 1168: 1169] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.129922 345762 task_signals.go:204] [ 1168: 1173] Signal 1168, PID: 1173, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.130008 345762 task_exit.go:204] [ 1168: 1173] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.130013 345762 task_signals.go:204] [ 1168: 1172] Signal 1168, PID: 1172, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.130036 345762 task_exit.go:204] [ 1168: 1173] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.130043 345762 task_exit.go:204] [ 1168: 1173] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.130067 345762 task_signals.go:204] [ 1168: 1170] Signal 1168, PID: 1170, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.130097 345762 task_exit.go:204] [ 1168: 1170] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.130125 345762 task_signals.go:204] [ 1168: 1171] Signal 1168, PID: 1171, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.130156 345762 task_exit.go:204] [ 1168: 1170] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.130170 345762 task_exit.go:204] [ 1168: 1170] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.130186 345762 task_exit.go:204] [ 1168: 1172] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.130193 345762 task_exit.go:204] [ 1168: 1172] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.130209 345762 task_exit.go:204] [ 1168: 1172] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.130219 345762 task_exit.go:204] [ 1168: 1171] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.131675 345762 task_exit.go:204] [ 1168: 1171] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.131690 345762 task_exit.go:204] [ 1168: 1171] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.131703 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:22.131735 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:22.131756 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:22.131828 345762 task_exit.go:204] [ 1168: 1168] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.132450 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.133956 345762 syscalls.go:262] [ 1174: 1174] Allocating stack with size of 8388608 bytes D0713 08:45:22.134073 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.135892 345762 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:22.135931 345762 usertrap_amd64.go:106] [ 1174: 1174] Map a usertrap vma at 61000 D0713 08:45:22.136066 345762 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc001681260 1 D0713 08:45:22.136166 345762 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:22.136677 345762 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:22.136701 345762 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc001681260 2 D0713 08:45:22.136719 345762 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:22.137506 345762 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:22.137544 345762 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc001681260 3 D0713 08:45:22.137571 345762 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:45:22.145336 345762 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:22.145400 345762 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc001681260 4 D0713 08:45:22.145418 345762 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:45:22.146537 345762 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:22.146563 345762 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc001681260 5 D0713 08:45:22.146573 345762 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:45:22.146631 345762 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b214:sysno 13 D0713 08:45:22.146644 345762 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc001681260 6 D0713 08:45:22.146649 345762 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:45:22.147039 345762 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:22.147054 345762 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc001681260 7 D0713 08:45:22.147060 345762 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:45:22.147254 345762 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:22.147271 345762 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc001681260 8 D0713 08:45:22.147280 345762 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:45:22.147660 345762 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46af76:sysno 35 D0713 08:45:22.147677 345762 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc001681260 9 D0713 08:45:22.147685 345762 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:45:22.147698 345762 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:22.147725 345762 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc001681260 10 D0713 08:45:22.147751 345762 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:45:22.155671 345762 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46af29:sysno 293 D0713 08:45:22.155725 345762 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc001681260 11 D0713 08:45:22.155740 345762 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:45:22.158223 345762 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46b020:sysno 39 D0713 08:45:22.158266 345762 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc001681260 12 D0713 08:45:22.158280 345762 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:45:22.158388 345762 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:22.158397 345762 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc001681260 13 D0713 08:45:22.158403 345762 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:45:22.158424 345762 task_signals.go:470] [ 1174: 1174] Notified of signal 23 D0713 08:45:22.158510 345762 task_signals.go:220] [ 1174: 1174] Signal 23: delivering to handler D0713 08:45:22.166481 345762 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:22.166533 345762 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc001681260 14 D0713 08:45:22.166550 345762 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:45:22.166678 345762 task_exit.go:204] [ 1174: 1174] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.166718 345762 task_exit.go:204] [ 1174: 1174] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.166752 345762 task_signals.go:204] [ 1174: 1178] Signal 1174, PID: 1178, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.166777 345762 task_exit.go:204] [ 1174: 1178] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.166790 345762 task_signals.go:204] [ 1174: 1177] Signal 1174, PID: 1177, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.166810 345762 task_signals.go:204] [ 1174: 1175] Signal 1174, PID: 1175, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.166839 345762 task_signals.go:204] [ 1174: 1176] Signal 1174, PID: 1176, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.166865 345762 task_exit.go:204] [ 1174: 1178] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.166883 345762 task_exit.go:204] [ 1174: 1178] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.166908 345762 task_exit.go:204] [ 1174: 1177] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.166919 345762 task_exit.go:204] [ 1174: 1177] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.166934 345762 task_exit.go:204] [ 1174: 1177] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.166946 345762 task_exit.go:204] [ 1174: 1176] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.166965 345762 task_exit.go:204] [ 1174: 1176] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.166974 345762 task_exit.go:204] [ 1174: 1176] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.166982 345762 task_exit.go:204] [ 1174: 1175] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.168255 345762 task_exit.go:204] [ 1174: 1175] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.168299 345762 task_exit.go:204] [ 1174: 1175] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.168314 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:22.168381 345762 task_exit.go:204] [ 1174: 1174] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.168380 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:22.168449 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:22.168596 345762 task_signals.go:470] [ 5: 21] Notified of signal 23 D0713 08:45:22.168653 345762 task_signals.go:220] [ 5: 21] Signal 23: delivering to handler D0713 08:45:22.169167 345762 task_stop.go:118] [ 5: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.170722 345762 syscalls.go:262] [ 1179: 1179] Allocating stack with size of 8388608 bytes D0713 08:45:22.170852 345762 task_stop.go:138] [ 5: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.172026 345762 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:22.172074 345762 usertrap_amd64.go:106] [ 1179: 1179] Map a usertrap vma at 69000 D0713 08:45:22.172151 345762 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0028137a0 1 D0713 08:45:22.172182 345762 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:22.172626 345762 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:22.172654 345762 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0028137a0 2 D0713 08:45:22.172665 345762 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:22.173352 345762 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:22.173372 345762 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0028137a0 3 D0713 08:45:22.173379 345762 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:22.179774 345762 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:22.179813 345762 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0028137a0 4 D0713 08:45:22.179825 345762 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:22.181106 345762 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:22.181159 345762 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0028137a0 5 D0713 08:45:22.181173 345762 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:22.181236 345762 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b214:sysno 13 D0713 08:45:22.181252 345762 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0028137a0 6 D0713 08:45:22.181259 345762 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:22.181678 345762 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:22.181707 345762 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0028137a0 7 D0713 08:45:22.181716 345762 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:22.181904 345762 usertrap_amd64.go:212] [ 1179: 1180] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:22.181925 345762 usertrap_amd64.go:122] [ 1179: 1180] Allocate a new trap: 0xc0028137a0 8 D0713 08:45:22.181933 345762 usertrap_amd64.go:225] [ 1179: 1180] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:22.182126 345762 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:22.182148 345762 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0028137a0 9 D0713 08:45:22.182156 345762 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:22.182166 345762 usertrap_amd64.go:212] [ 1179: 1180] Found the pattern at ip 46af76:sysno 35 D0713 08:45:22.182183 345762 usertrap_amd64.go:122] [ 1179: 1180] Allocate a new trap: 0xc0028137a0 10 D0713 08:45:22.182203 345762 usertrap_amd64.go:225] [ 1179: 1180] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:22.189398 345762 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46af29:sysno 293 D0713 08:45:22.189425 345762 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0028137a0 11 D0713 08:45:22.189453 345762 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:22.193166 345762 usertrap_amd64.go:212] [ 1179: 1180] Found the pattern at ip 46b020:sysno 39 D0713 08:45:22.193205 345762 usertrap_amd64.go:122] [ 1179: 1180] Allocate a new trap: 0xc0028137a0 12 D0713 08:45:22.193221 345762 usertrap_amd64.go:225] [ 1179: 1180] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:22.193295 345762 usertrap_amd64.go:212] [ 1179: 1180] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:22.193309 345762 usertrap_amd64.go:122] [ 1179: 1180] Allocate a new trap: 0xc0028137a0 13 D0713 08:45:22.193321 345762 usertrap_amd64.go:225] [ 1179: 1180] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:22.193370 345762 task_signals.go:470] [ 1179: 1179] Notified of signal 23 D0713 08:45:22.193466 345762 task_signals.go:220] [ 1179: 1179] Signal 23: delivering to handler D0713 08:45:22.200363 345762 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:22.200394 345762 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc0028137a0 14 D0713 08:45:22.200403 345762 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:22.200465 345762 task_exit.go:204] [ 1179: 1179] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.200492 345762 task_exit.go:204] [ 1179: 1179] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.200516 345762 task_signals.go:204] [ 1179: 1180] Signal 1179, PID: 1180, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.200541 345762 task_exit.go:204] [ 1179: 1180] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.200549 345762 task_exit.go:204] [ 1179: 1180] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.200553 345762 task_exit.go:204] [ 1179: 1180] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.200535 345762 task_signals.go:204] [ 1179: 1182] Signal 1179, PID: 1182, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.200608 345762 task_exit.go:204] [ 1179: 1182] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.200636 345762 task_exit.go:204] [ 1179: 1182] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.200565 345762 task_signals.go:204] [ 1179: 1183] Signal 1179, PID: 1183, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.200645 345762 task_exit.go:204] [ 1179: 1182] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.200569 345762 task_signals.go:204] [ 1179: 1181] Signal 1179, PID: 1181, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.200664 345762 task_exit.go:204] [ 1179: 1181] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.200680 345762 task_exit.go:204] [ 1179: 1183] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.200700 345762 task_exit.go:204] [ 1179: 1183] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.200708 345762 task_exit.go:204] [ 1179: 1183] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.202158 345762 task_exit.go:204] [ 1179: 1181] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.202189 345762 task_exit.go:204] [ 1179: 1181] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.202211 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:22.202271 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:22.202322 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:22.202362 345762 task_exit.go:204] [ 1179: 1179] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.203110 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.204643 345762 syscalls.go:262] [ 1184: 1184] Allocating stack with size of 8388608 bytes D0713 08:45:22.204798 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.206189 345762 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:22.206230 345762 usertrap_amd64.go:106] [ 1184: 1184] Map a usertrap vma at 65000 D0713 08:45:22.206305 345762 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc000731200 1 D0713 08:45:22.206322 345762 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:22.206796 345762 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:22.206804 345762 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc000731200 2 D0713 08:45:22.206812 345762 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:22.207357 345762 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:22.207374 345762 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc000731200 3 D0713 08:45:22.207381 345762 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:22.213749 345762 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:22.213794 345762 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc000731200 4 D0713 08:45:22.213810 345762 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:22.215040 345762 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:22.215062 345762 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc000731200 5 D0713 08:45:22.215080 345762 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:22.215193 345762 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b214:sysno 13 D0713 08:45:22.215212 345762 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc000731200 6 D0713 08:45:22.215219 345762 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:22.215575 345762 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:22.215592 345762 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc000731200 7 D0713 08:45:22.215599 345762 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:22.215817 345762 usertrap_amd64.go:212] [ 1184: 1185] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:22.215866 345762 usertrap_amd64.go:122] [ 1184: 1185] Allocate a new trap: 0xc000731200 8 D0713 08:45:22.215889 345762 usertrap_amd64.go:225] [ 1184: 1185] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:22.216011 345762 usertrap_amd64.go:212] [ 1184: 1185] Found the pattern at ip 46af76:sysno 35 D0713 08:45:22.216037 345762 usertrap_amd64.go:122] [ 1184: 1185] Allocate a new trap: 0xc000731200 9 D0713 08:45:22.216044 345762 usertrap_amd64.go:225] [ 1184: 1185] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:22.216155 345762 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:22.216182 345762 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc000731200 10 D0713 08:45:22.216193 345762 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:22.223378 345762 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46af29:sysno 293 D0713 08:45:22.223406 345762 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc000731200 11 D0713 08:45:22.223416 345762 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:22.227383 345762 usertrap_amd64.go:212] [ 1184: 1185] Found the pattern at ip 46b020:sysno 39 D0713 08:45:22.227412 345762 usertrap_amd64.go:122] [ 1184: 1185] Allocate a new trap: 0xc000731200 12 D0713 08:45:22.227425 345762 usertrap_amd64.go:225] [ 1184: 1185] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:22.227444 345762 usertrap_amd64.go:212] [ 1184: 1185] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:22.227449 345762 usertrap_amd64.go:122] [ 1184: 1185] Allocate a new trap: 0xc000731200 13 D0713 08:45:22.227456 345762 usertrap_amd64.go:225] [ 1184: 1185] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:22.227473 345762 task_signals.go:470] [ 1184: 1184] Notified of signal 23 D0713 08:45:22.227507 345762 task_signals.go:220] [ 1184: 1184] Signal 23: delivering to handler D0713 08:45:22.234203 345762 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:22.234265 345762 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc000731200 14 D0713 08:45:22.234281 345762 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:22.234368 345762 task_exit.go:204] [ 1184: 1184] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.234418 345762 task_signals.go:204] [ 1184: 1187] Signal 1184, PID: 1187, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.234417 345762 task_exit.go:204] [ 1184: 1184] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.234447 345762 task_signals.go:204] [ 1184: 1185] Signal 1184, PID: 1185, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.234457 345762 task_signals.go:204] [ 1184: 1186] Signal 1184, PID: 1186, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.234458 345762 task_exit.go:204] [ 1184: 1187] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.234491 345762 task_signals.go:204] [ 1184: 1188] Signal 1184, PID: 1188, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.234504 345762 task_exit.go:204] [ 1184: 1187] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.234512 345762 task_exit.go:204] [ 1184: 1187] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.234530 345762 task_exit.go:204] [ 1184: 1185] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.234547 345762 task_exit.go:204] [ 1184: 1185] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.234553 345762 task_exit.go:204] [ 1184: 1185] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.234572 345762 task_exit.go:204] [ 1184: 1188] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.234624 345762 task_exit.go:204] [ 1184: 1188] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.234644 345762 task_exit.go:204] [ 1184: 1188] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.234661 345762 task_exit.go:204] [ 1184: 1186] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.236007 345762 task_exit.go:204] [ 1184: 1186] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.236032 345762 task_exit.go:204] [ 1184: 1186] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.236058 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:22.236090 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:22.236113 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:22.236251 345762 task_exit.go:204] [ 1184: 1184] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.236355 345762 task_signals.go:470] [ 5: 16] Notified of signal 23 D0713 08:45:22.236450 345762 task_signals.go:220] [ 5: 16] Signal 23: delivering to handler D0713 08:45:22.236835 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.238705 345762 syscalls.go:262] [ 1189: 1189] Allocating stack with size of 8388608 bytes D0713 08:45:22.238849 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.239933 345762 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:22.239966 345762 usertrap_amd64.go:106] [ 1189: 1189] Map a usertrap vma at 65000 D0713 08:45:22.240038 345762 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc002813bf0 1 D0713 08:45:22.240064 345762 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:22.240392 345762 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:22.240416 345762 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc002813bf0 2 D0713 08:45:22.240423 345762 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:22.241172 345762 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:22.241197 345762 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc002813bf0 3 D0713 08:45:22.241210 345762 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:22.246819 345762 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:22.246850 345762 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc002813bf0 4 D0713 08:45:22.246859 345762 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:22.248173 345762 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:22.248195 345762 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc002813bf0 5 D0713 08:45:22.248204 345762 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:22.248282 345762 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46b214:sysno 13 D0713 08:45:22.248292 345762 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc002813bf0 6 D0713 08:45:22.248298 345762 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:22.248639 345762 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:22.248656 345762 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc002813bf0 7 D0713 08:45:22.248662 345762 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:22.248831 345762 usertrap_amd64.go:212] [ 1189: 1190] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:22.248850 345762 usertrap_amd64.go:122] [ 1189: 1190] Allocate a new trap: 0xc002813bf0 8 D0713 08:45:22.248860 345762 usertrap_amd64.go:225] [ 1189: 1190] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:22.249083 345762 usertrap_amd64.go:212] [ 1189: 1190] Found the pattern at ip 46af76:sysno 35 D0713 08:45:22.249110 345762 usertrap_amd64.go:122] [ 1189: 1190] Allocate a new trap: 0xc002813bf0 9 D0713 08:45:22.249119 345762 usertrap_amd64.go:225] [ 1189: 1190] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:22.249172 345762 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:22.249203 345762 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc002813bf0 10 D0713 08:45:22.249216 345762 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:22.256834 345762 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46af29:sysno 293 D0713 08:45:22.256864 345762 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc002813bf0 11 D0713 08:45:22.256875 345762 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:22.259776 345762 usertrap_amd64.go:212] [ 1189: 1190] Found the pattern at ip 46b020:sysno 39 D0713 08:45:22.259832 345762 usertrap_amd64.go:122] [ 1189: 1190] Allocate a new trap: 0xc002813bf0 12 D0713 08:45:22.259852 345762 usertrap_amd64.go:225] [ 1189: 1190] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:22.259917 345762 usertrap_amd64.go:212] [ 1189: 1190] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:22.259932 345762 usertrap_amd64.go:122] [ 1189: 1190] Allocate a new trap: 0xc002813bf0 13 D0713 08:45:22.259947 345762 usertrap_amd64.go:225] [ 1189: 1190] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:22.260010 345762 task_signals.go:470] [ 1189: 1189] Notified of signal 23 D0713 08:45:22.260108 345762 task_signals.go:220] [ 1189: 1189] Signal 23: delivering to handler D0713 08:45:22.267826 345762 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:22.267877 345762 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc002813bf0 14 D0713 08:45:22.267890 345762 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:22.268024 345762 task_exit.go:204] [ 1189: 1189] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.268049 345762 task_exit.go:204] [ 1189: 1189] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.268077 345762 task_signals.go:204] [ 1189: 1192] Signal 1189, PID: 1192, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.268101 345762 task_exit.go:204] [ 1189: 1192] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.268106 345762 task_exit.go:204] [ 1189: 1192] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.268101 345762 task_signals.go:204] [ 1189: 1191] Signal 1189, PID: 1191, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.268110 345762 task_exit.go:204] [ 1189: 1192] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.268103 345762 task_signals.go:204] [ 1189: 1193] Signal 1189, PID: 1193, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.268080 345762 task_signals.go:204] [ 1189: 1190] Signal 1189, PID: 1190, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.268129 345762 task_exit.go:204] [ 1189: 1193] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.268167 345762 task_exit.go:204] [ 1189: 1190] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.268225 345762 task_exit.go:204] [ 1189: 1190] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.268247 345762 task_exit.go:204] [ 1189: 1190] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.268266 345762 task_exit.go:204] [ 1189: 1191] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.268361 345762 task_exit.go:204] [ 1189: 1193] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.268378 345762 task_exit.go:204] [ 1189: 1193] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.269683 345762 task_exit.go:204] [ 1189: 1191] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.269733 345762 task_exit.go:204] [ 1189: 1191] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.269759 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:22.269797 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:22.269815 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:22.269905 345762 task_exit.go:204] [ 1189: 1189] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.270027 345762 task_signals.go:470] [ 5: 16] Notified of signal 23 D0713 08:45:22.270096 345762 task_signals.go:220] [ 5: 16] Signal 23: delivering to handler D0713 08:45:22.270560 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.270674 345762 task_signals.go:481] [ 5: 16] No task notified of signal 23 D0713 08:45:22.271886 345762 syscalls.go:262] [ 1194: 1194] Allocating stack with size of 8388608 bytes D0713 08:45:22.271999 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.272112 345762 task_signals.go:220] [ 5: 16] Signal 23: delivering to handler D0713 08:45:22.272225 345762 task_signals.go:470] [ 5: 16] Notified of signal 23 D0713 08:45:22.272351 345762 task_signals.go:220] [ 5: 16] Signal 23: delivering to handler D0713 08:45:22.273187 345762 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:22.273225 345762 usertrap_amd64.go:106] [ 1194: 1194] Map a usertrap vma at 69000 D0713 08:45:22.273306 345762 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc0011c0330 1 D0713 08:45:22.273323 345762 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:22.273589 345762 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:22.273622 345762 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc0011c0330 2 D0713 08:45:22.273643 345762 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:22.274331 345762 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:22.274361 345762 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc0011c0330 3 D0713 08:45:22.274372 345762 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:22.279745 345762 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:22.279780 345762 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc0011c0330 4 D0713 08:45:22.279791 345762 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:22.281099 345762 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:22.281127 345762 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc0011c0330 5 D0713 08:45:22.281137 345762 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:22.281197 345762 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b214:sysno 13 D0713 08:45:22.281204 345762 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc0011c0330 6 D0713 08:45:22.281210 345762 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:22.281637 345762 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:22.281665 345762 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc0011c0330 7 D0713 08:45:22.281678 345762 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:22.281842 345762 usertrap_amd64.go:212] [ 1194: 1195] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:22.281864 345762 usertrap_amd64.go:122] [ 1194: 1195] Allocate a new trap: 0xc0011c0330 8 D0713 08:45:22.281873 345762 usertrap_amd64.go:225] [ 1194: 1195] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:22.282060 345762 usertrap_amd64.go:212] [ 1194: 1195] Found the pattern at ip 46af76:sysno 35 D0713 08:45:22.282079 345762 usertrap_amd64.go:122] [ 1194: 1195] Allocate a new trap: 0xc0011c0330 9 D0713 08:45:22.282085 345762 usertrap_amd64.go:225] [ 1194: 1195] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:22.282093 345762 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:22.282098 345762 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc0011c0330 10 D0713 08:45:22.282103 345762 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:22.289510 345762 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46af29:sysno 293 D0713 08:45:22.289546 345762 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc0011c0330 11 D0713 08:45:22.289557 345762 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:22.293213 345762 usertrap_amd64.go:212] [ 1194: 1195] Found the pattern at ip 46b020:sysno 39 D0713 08:45:22.293252 345762 usertrap_amd64.go:122] [ 1194: 1195] Allocate a new trap: 0xc0011c0330 12 D0713 08:45:22.293266 345762 usertrap_amd64.go:225] [ 1194: 1195] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:22.293325 345762 usertrap_amd64.go:212] [ 1194: 1195] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:22.293336 345762 usertrap_amd64.go:122] [ 1194: 1195] Allocate a new trap: 0xc0011c0330 13 D0713 08:45:22.293345 345762 usertrap_amd64.go:225] [ 1194: 1195] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:22.293370 345762 task_signals.go:470] [ 1194: 1194] Notified of signal 23 D0713 08:45:22.293531 345762 task_signals.go:220] [ 1194: 1194] Signal 23: delivering to handler D0713 08:45:22.299841 345762 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:22.299880 345762 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc0011c0330 14 D0713 08:45:22.299903 345762 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:22.299983 345762 task_exit.go:204] [ 1194: 1194] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.300007 345762 task_exit.go:204] [ 1194: 1194] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.300050 345762 task_signals.go:204] [ 1194: 1198] Signal 1194, PID: 1198, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.300072 345762 task_exit.go:204] [ 1194: 1198] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.300079 345762 task_exit.go:204] [ 1194: 1198] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.300084 345762 task_exit.go:204] [ 1194: 1198] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.300054 345762 task_signals.go:204] [ 1194: 1196] Signal 1194, PID: 1196, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.300097 345762 task_signals.go:204] [ 1194: 1195] Signal 1194, PID: 1195, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.300107 345762 task_exit.go:204] [ 1194: 1195] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.300100 345762 task_signals.go:204] [ 1194: 1197] Signal 1194, PID: 1197, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.300116 345762 task_exit.go:204] [ 1194: 1196] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.300141 345762 task_exit.go:204] [ 1194: 1196] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.300149 345762 task_exit.go:204] [ 1194: 1196] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.300160 345762 task_exit.go:204] [ 1194: 1197] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.300176 345762 task_exit.go:204] [ 1194: 1197] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.300180 345762 task_exit.go:204] [ 1194: 1197] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.301482 345762 task_exit.go:204] [ 1194: 1195] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.301493 345762 task_exit.go:204] [ 1194: 1195] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.301504 345762 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 08:45:22.301596 345762 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 08:45:22.301647 345762 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 08:45:22.301724 345762 task_exit.go:204] [ 1194: 1194] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.302406 345762 task_stop.go:118] [ 5: 16] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.304205 345762 syscalls.go:262] [ 1199: 1199] Allocating stack with size of 8388608 bytes D0713 08:45:22.304330 345762 task_stop.go:138] [ 5: 16] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.305987 345762 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:22.306049 345762 usertrap_amd64.go:106] [ 1199: 1199] Map a usertrap vma at 66000 D0713 08:45:22.306182 345762 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc002813f80 1 D0713 08:45:22.306224 345762 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:22.306635 345762 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:22.306659 345762 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc002813f80 2 D0713 08:45:22.306685 345762 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:22.307408 345762 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:22.307437 345762 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc002813f80 3 D0713 08:45:22.307448 345762 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:22.313376 345762 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:22.313404 345762 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc002813f80 4 D0713 08:45:22.313416 345762 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:22.314747 345762 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:22.314768 345762 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc002813f80 5 D0713 08:45:22.314777 345762 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:22.314834 345762 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b214:sysno 13 D0713 08:45:22.314845 345762 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc002813f80 6 D0713 08:45:22.314850 345762 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:22.315273 345762 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:22.315290 345762 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc002813f80 7 D0713 08:45:22.315296 345762 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:22.315458 345762 usertrap_amd64.go:212] [ 1199: 1200] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:22.315472 345762 usertrap_amd64.go:122] [ 1199: 1200] Allocate a new trap: 0xc002813f80 8 D0713 08:45:22.315478 345762 usertrap_amd64.go:225] [ 1199: 1200] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:22.315657 345762 usertrap_amd64.go:212] [ 1199: 1200] Found the pattern at ip 46af76:sysno 35 D0713 08:45:22.315696 345762 usertrap_amd64.go:122] [ 1199: 1200] Allocate a new trap: 0xc002813f80 9 D0713 08:45:22.315711 345762 usertrap_amd64.go:225] [ 1199: 1200] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:22.315774 345762 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:22.315792 345762 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc002813f80 10 D0713 08:45:22.315799 345762 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:22.316415 345762 usertrap_amd64.go:212] [ 1199: 1200] Found the pattern at ip 46b020:sysno 39 D0713 08:45:22.316439 345762 usertrap_amd64.go:122] [ 1199: 1200] Allocate a new trap: 0xc002813f80 11 D0713 08:45:22.316495 345762 usertrap_amd64.go:225] [ 1199: 1200] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:22.316617 345762 usertrap_amd64.go:212] [ 1199: 1200] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:22.316634 345762 usertrap_amd64.go:122] [ 1199: 1200] Allocate a new trap: 0xc002813f80 12 D0713 08:45:22.316641 345762 usertrap_amd64.go:225] [ 1199: 1200] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:22.316657 345762 task_signals.go:470] [ 1199: 1199] Notified of signal 23 D0713 08:45:22.316689 345762 task_signals.go:220] [ 1199: 1199] Signal 23: delivering to handler D0713 08:45:22.323916 345762 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46af29:sysno 293 D0713 08:45:22.323944 345762 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc002813f80 13 D0713 08:45:22.323953 345762 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:22.326866 345762 task_signals.go:470] [ 1199: 1199] Notified of signal 23 D0713 08:45:22.326935 345762 task_signals.go:220] [ 1199: 1199] Signal 23: delivering to handler D0713 08:45:22.335051 345762 task_signals.go:309] [ 1199: 1199] failed to restore from a signal frame: bad address D0713 08:45:22.335108 345762 task_signals.go:470] [ 1199: 1199] Notified of signal 11 D0713 08:45:22.335126 345762 task_signals.go:220] [ 1199: 1199] Signal 11: delivering to handler W0713 08:45:22.354622 345863 util.go:64] FATAL ERROR: waiting on pid 5: waiting on PID 5 in sandbox "ci-gvisor-systrap-1-test-0": urpc method "containerManager.WaitPID" failed: EOF waiting on pid 5: waiting on PID 5 in sandbox "ci-gvisor-systrap-1-test-0": urpc method "containerManager.WaitPID" failed: EOF W0713 08:45:22.354754 345863 main.go:274] Failure to execute command, err: 1 D0713 08:45:22.368009 1 connection.go:127] sock read failed, closing connection: EOF I0713 08:45:22.368116 1 gofer.go:319] All lisafs servers exited. I0713 08:45:22.368148 1 main.go:265] Exiting with status: 0 W0713 08:45:22.368225 345741 sandbox.go:1111] Wait RPC to container "ci-gvisor-systrap-1-test-0" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. D0713 08:45:22.369222 345741 container.go:771] Destroy container, cid: ci-gvisor-systrap-1-test-0 D0713 08:45:22.369331 345741 container.go:1007] Destroying container, cid: ci-gvisor-systrap-1-test-0 D0713 08:45:22.369340 345741 sandbox.go:1403] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-test-0 D0713 08:45:22.369363 345741 sandbox.go:1153] Destroying sandbox "ci-gvisor-systrap-1-test-0" D0713 08:45:22.369488 345741 container.go:1021] Killing gofer for container, cid: ci-gvisor-systrap-1-test-0, PID: 345756 D0713 08:45:22.372695 345741 cgroup.go:549] Deleting cgroup "ci-gvisor-systrap-1-test-0" D0713 08:45:22.372761 345741 cgroup.go:557] Removing cgroup controller for key="pids" path="/sys/fs/cgroup/pids/ci-gvisor-systrap-1-test-0" D0713 08:45:22.372846 345741 cgroup.go:557] Removing cgroup controller for key="net_prio" path="/sys/fs/cgroup/net_prio/ci-gvisor-systrap-1-test-0" D0713 08:45:22.372868 345741 cgroup.go:557] Removing cgroup controller for key="blkio" path="/sys/fs/cgroup/blkio/ci-gvisor-systrap-1-test-0" D0713 08:45:22.372891 345741 cgroup.go:557] Removing cgroup controller for key="cpuacct" path="/sys/fs/cgroup/cpuacct/ci-gvisor-systrap-1-test-0" D0713 08:45:22.372905 345741 cgroup.go:557] Removing cgroup controller for key="devices" path="/sys/fs/cgroup/devices/ci-gvisor-systrap-1-test-0" D0713 08:45:22.373013 345741 cgroup.go:557] Removing cgroup controller for key="freezer" path="/sys/fs/cgroup/freezer/ci-gvisor-systrap-1-test-0" D0713 08:45:22.373033 345741 cgroup.go:557] Removing cgroup controller for key="perf_event" path="/sys/fs/cgroup/perf_event/ci-gvisor-systrap-1-test-0" D0713 08:45:22.373048 345741 cgroup.go:557] Removing cgroup controller for key="rdma" path="/sys/fs/cgroup/rdma/ci-gvisor-systrap-1-test-0" D0713 08:45:22.373075 345741 cgroup.go:557] Removing cgroup controller for key="systemd" path="/sys/fs/cgroup/systemd/ci-gvisor-systrap-1-test-0" D0713 08:45:22.373084 345741 cgroup.go:557] Removing cgroup controller for key="cpuset" path="/sys/fs/cgroup/cpuset/ci-gvisor-systrap-1-test-0" D0713 08:45:22.373091 345741 cgroup.go:557] Removing cgroup controller for key="memory" path="/sys/fs/cgroup/memory/ci-gvisor-systrap-1-test-0" D0713 08:45:22.373097 345741 cgroup.go:557] Removing cgroup controller for key="net_cls" path="/sys/fs/cgroup/net_cls/ci-gvisor-systrap-1-test-0" D0713 08:45:22.373104 345741 cgroup.go:557] Removing cgroup controller for key="cpu" path="/sys/fs/cgroup/cpu/ci-gvisor-systrap-1-test-0" I0713 08:45:22.374199 345741 main.go:265] Exiting with status: 9 VM DIAGNOSIS: I0713 08:45:22.392433 346784 main.go:230] *************************** I0713 08:45:22.392506 346784 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-test-0] I0713 08:45:22.392532 346784 main.go:232] Version 0.0.0 I0713 08:45:22.392547 346784 main.go:233] GOOS: linux I0713 08:45:22.392562 346784 main.go:234] GOARCH: amd64 I0713 08:45:22.392576 346784 main.go:235] PID: 346784 I0713 08:45:22.392602 346784 main.go:236] UID: 0, GID: 0 I0713 08:45:22.392617 346784 main.go:237] Configuration: I0713 08:45:22.392639 346784 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root I0713 08:45:22.392661 346784 main.go:239] Platform: systrap I0713 08:45:22.392676 346784 main.go:240] FileAccess: shared I0713 08:45:22.392705 346784 main.go:241] Directfs: true I0713 08:45:22.392720 346784 main.go:242] Overlay: none I0713 08:45:22.392743 346784 main.go:243] Network: sandbox, logging: false I0713 08:45:22.392767 346784 main.go:244] Strace: false, max size: 1024, syscalls: I0713 08:45:22.392789 346784 main.go:245] IOURING: false I0713 08:45:22.392810 346784 main.go:246] Debug: true I0713 08:45:22.392832 346784 main.go:247] Systemd: false I0713 08:45:22.392853 346784 main.go:248] *************************** D0713 08:45:22.392905 346784 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-test-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 08:45:22.393083 346784 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-test-0": file does not exist loading container "ci-gvisor-systrap-1-test-0": file does not exist W0713 08:45:22.393169 346784 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-gso=false" "-net-raw" "-watchdog-action=panic" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-test-0"]: exit status 128 I0713 08:45:22.392433 346784 main.go:230] *************************** I0713 08:45:22.392506 346784 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-test-0] I0713 08:45:22.392532 346784 main.go:232] Version 0.0.0 I0713 08:45:22.392547 346784 main.go:233] GOOS: linux I0713 08:45:22.392562 346784 main.go:234] GOARCH: amd64 I0713 08:45:22.392576 346784 main.go:235] PID: 346784 I0713 08:45:22.392602 346784 main.go:236] UID: 0, GID: 0 I0713 08:45:22.392617 346784 main.go:237] Configuration: I0713 08:45:22.392639 346784 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root I0713 08:45:22.392661 346784 main.go:239] Platform: systrap I0713 08:45:22.392676 346784 main.go:240] FileAccess: shared I0713 08:45:22.392705 346784 main.go:241] Directfs: true I0713 08:45:22.392720 346784 main.go:242] Overlay: none I0713 08:45:22.392743 346784 main.go:243] Network: sandbox, logging: false I0713 08:45:22.392767 346784 main.go:244] Strace: false, max size: 1024, syscalls: I0713 08:45:22.392789 346784 main.go:245] IOURING: false I0713 08:45:22.392810 346784 main.go:246] Debug: true I0713 08:45:22.392832 346784 main.go:247] Systemd: false I0713 08:45:22.392853 346784 main.go:248] *************************** D0713 08:45:22.392905 346784 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-test-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 08:45:22.393083 346784 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-test-0": file does not exist loading container "ci-gvisor-systrap-1-test-0": file does not exist W0713 08:45:22.393169 346784 main.go:274] Failure to execute command, err: 1 [11549096.771134] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.818012] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.868139] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549098.287705] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.335253] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.362160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.411664] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549102.265611] exe[812626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.316062] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.367142] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549103.277443] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.327611] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.372667] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.373629] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549106.101121] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.158749] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.214409] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.203702] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.313805] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.832041] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.896096] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.936191] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.147625] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.194975] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.239317] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.666464] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.709186] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.769134] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.396423] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.447035] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.470585] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.507121] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.469316] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.516733] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.561202] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.841101] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.883653] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.906352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.946285] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.885765] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.938026] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.963555] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.014465] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.831133] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.882033] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.884100] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.956006] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.456966] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.503734] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.962386] warn_bad_vsyscall: 1 callbacks suppressed [11549182.962389] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.012121] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.059746] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.080637] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.284008] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.367576] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.445261] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549193.339186] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.395517] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.461816] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.489679] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.663958] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.712460] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.763669] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.788181] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549207.982095] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.032318] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.053090] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.095858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549213.428629] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.465578] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.503510] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549215.928549] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549216.000149] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549217.237542] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.283499] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.346633] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549219.657475] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.701623] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.741378] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.937988] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.993970] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.015601] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.066260] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.088244] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.744875] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.802594] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.852978] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.853165] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.897681] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.919524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.957057] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549272.386964] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.430873] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.472074] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549284.010961] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.056302] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.080381] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.131020] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.676878] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.732251] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.778232] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549305.996414] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.039916] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.087233] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.108856] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549312.155430] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.212534] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.318757] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549322.225490] exe[762988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562bd7b3c839 cs:33 sp:7fa30ef1dee8 ax:0 si:20000040 di:ffffffffff600000 [11549322.630226] exe[764150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfd46d0839 cs:33 sp:7faa79d58ee8 ax:0 si:20000040 di:ffffffffff600000 [11549324.167848] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.225685] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.290963] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.248247] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.295182] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.339907] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549332.992606] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.032076] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.055923] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.100145] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549335.966184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.011362] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.012156] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.070502] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.114461] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.160317] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549338.584854] warn_bad_vsyscall: 2 callbacks suppressed [11549338.584858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.635465] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.677495] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.698822] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549340.992026] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.047021] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.090860] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.757473] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.798199] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.800483] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549348.007006] warn_bad_vsyscall: 1 callbacks suppressed [11549348.007011] exe[810081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549348.123020] exe[791686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549350.842435] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901911] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901928] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.014907] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.053068] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.180049] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.331135] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.395122] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.416889] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549364.967687] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.283036] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.311226] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.607785] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.633332] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.913539] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.952794] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549371.002201] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.234160] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.271594] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.294407] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.333242] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.357403] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.827451] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.879499] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.902128] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.944274] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.945164] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.055187] exe[801669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed61f88839 cs:33 sp:7fe8832e6ee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.056978] exe[807650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565118c94839 cs:33 sp:7f5e3a4beee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.354001] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.404830] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.452731] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549390.994794] warn_bad_vsyscall: 3 callbacks suppressed [11549390.994799] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.055906] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.103464] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.731184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.798921] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.850231] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549421.224700] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.287217] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.330715] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.332297] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.364793] exe[733349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079ee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.644237] exe[777007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564419386839 cs:33 sp:7f341debdee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.652842] exe[812391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b98a4cd839 cs:33 sp:7fdb944daee8 ax:0 si:20000040 di:ffffffffff600000 [11549422.842044] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.891535] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.931486] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.356143] warn_bad_vsyscall: 6 callbacks suppressed [11549426.356147] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.409055] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.429411] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.469059] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.492130] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.953107] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.002112] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.051579] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.052798] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.523865] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.574374] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.617270] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.644076] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.542912] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.586509] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.635656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.656472] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.333222] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.385051] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.407654] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.463938] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.486314] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.506017] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549450.523743] warn_bad_vsyscall: 66 callbacks suppressed [11549450.523747] exe[813165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13bc63839 cs:33 sp:7fab0d06fee8 ax:0 si:20000040 di:ffffffffff600000 [11549450.715540] exe[807311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9a7633839 cs:33 sp:7f1120b17ee8 ax:0 si:20000040 di:ffffffffff600000 [11549455.474323] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.517320] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.539071] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.582910] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549462.474386] exe[756116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1de600839 cs:33 sp:7fba5c050ee8 ax:0 si:20000040 di:ffffffffff600000 [11549462.926878] exe[794394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559edb8a0839 cs:33 sp:7f1c503e2ee8 ax:0 si:20000040 di:ffffffffff600000 [11549466.434155] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.490814] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.533742] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.534602] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.211071] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.252741] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.291120] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.295633] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.635585] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.677652] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.719660] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.867443] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.908983] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.909927] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.964262] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.495137] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.790729] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.859182] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.290345] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.357829] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.426947] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549593.412229] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549593.562650] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.243778] exe[812951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c749ce839 cs:33 sp:7ea297e86ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.710759] exe[828296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c970632839 cs:33 sp:7ec3ceeb7ee8 ax:0 si:20000040 di:ffffffffff600000 [11549714.981109] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549715.749772] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.546233] exe[814844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5b0f9a839 cs:33 sp:7fc5bfbfeee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.735375] exe[814714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b554191839 cs:33 sp:7f6febbf8ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.362481] exe[783694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.735183] exe[800231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549816.546602] exe[821122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549817.188403] exe[822913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549840.206573] exe[828178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcd7d54839 cs:33 sp:7eba87823ee8 ax:0 si:20000040 di:ffffffffff600000 [11549842.390425] exe[822623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41ee8 ax:0 si:20000040 di:ffffffffff600000 [11549851.814988] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549851.979785] exe[834049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037235] exe[831079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9be858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037247] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549869.928825] exe[833586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d7fa8b839 cs:33 sp:7fd723b3eee8 ax:0 si:20000040 di:ffffffffff600000 [11549870.243345] exe[834928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56062534e839 cs:33 sp:7f0757548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549959.675292] exe[797744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558fc8494839 cs:33 sp:7f29d40d3ee8 ax:0 si:20000040 di:ffffffffff600000 [11549964.327083] exe[816565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d710109839 cs:33 sp:7f42012e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11550011.778578] exe[785408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.328909] exe[777936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.464501] exe[784143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550449.411992] exe[840751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d4deee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.543051] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.570209] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.601466] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.628501] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.655874] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.684944] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.711295] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.738186] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.768990] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11551293.287525] warn_bad_vsyscall: 57 callbacks suppressed [11551293.287528] exe[872567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.432824] exe[872441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64d6ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.635840] exe[878590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551350.987871] exe[802426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.133434] exe[801154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.264861] exe[800782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551739.212650] exe[891790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.358004] exe[874588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.423302] exe[876706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11552746.340520] exe[917620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552746.540849] exe[917777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552749.324099] exe[916114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11553787.312373] exe[918824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd909c3bee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.233139] exe[932505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097feee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.702294] exe[918368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097bcee8 ax:0 si:20000300 di:ffffffffff600000 [11556405.744028] exe[973340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.888821] exe[974236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.889344] exe[972981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.769888] exe[966210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.770120] exe[966208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556828.744398] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556828.924558] exe[26205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.059181] exe[13280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.100292] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556926.028445] exe[987233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8fe9a7839 cs:33 sp:7f1b02da7858 ax:0 si:55d8fea00070 di:ffffffffff600000 [11556931.514747] exe[2731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecfc56a839 cs:33 sp:7efc33043858 ax:0 si:55ecfc5c3070 di:ffffffffff600000 [11556932.678559] exe[32873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c147b8d839 cs:33 sp:7f3ef85dc858 ax:0 si:55c147be6070 di:ffffffffff600000 [11556950.820318] exe[29772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561443faf839 cs:33 sp:7f0e531fe858 ax:0 si:561444008070 di:ffffffffff600000 [11557024.979366] exe[990140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557025.945778] exe[989269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557026.183320] exe[36260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556217b32839 cs:33 sp:7fddcd279858 ax:0 si:556217b8b070 di:ffffffffff600000 [11557026.761986] exe[18772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1290fa839 cs:33 sp:7fc527cc9858 ax:0 si:55e129153070 di:ffffffffff600000 [11557029.543342] exe[10486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4073da839 cs:33 sp:7ee9c91fe858 ax:0 si:55a407433070 di:ffffffffff600000 [11557029.565342] exe[955869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f019e21839 cs:33 sp:7ec4f6665858 ax:0 si:55f019e7a070 di:ffffffffff600000 [11557070.452747] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557071.382941] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557079.659895] exe[37699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557079.763841] exe[37791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557081.617680] exe[31464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557081.699452] exe[32275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557085.755120] exe[978697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557086.768436] exe[984524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557092.839673] exe[19916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb78120839 cs:33 sp:7fb79022c858 ax:0 si:55bb78179070 di:ffffffffff600000 [11557105.272126] exe[16964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558fd61d839 cs:33 sp:7fb861029858 ax:0 si:5558fd676070 di:ffffffffff600000 [11557125.514096] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557127.078867] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557154.900378] exe[36166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557159.639958] exe[39906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557221.493537] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557226.224888] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557248.504217] exe[43502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557250.866532] exe[43487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557522.293434] exe[57221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.454602] exe[43299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f0d858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.576325] exe[56829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11558001.442748] exe[17430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.578829] exe[36871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.610672] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.923774] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558002.987979] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.102566] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.246645] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.372957] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.494809] exe[20846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.643478] exe[20903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11560610.686110] warn_bad_vsyscall: 8 callbacks suppressed [11560610.686113] exe[99111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560610.846189] exe[96849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560611.008067] exe[96916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcd2858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560620.483506] exe[100810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11561057.499685] exe[98831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.289038] exe[108411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3eff858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.393219] exe[101690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561923.921251] exe[152411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3feee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.060175] exe[152385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.128957] exe[154085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11562242.603414] exe[164541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.658947] exe[164509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.726852] exe[164557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562318.141986] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.185850] exe[165157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.230040] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562508.870615] exe[162696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562508.954821] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee79778e858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.041779] exe[152279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.053797] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.099380] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.158846] exe[154196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.222873] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.299400] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.361377] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.442875] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562513.886961] warn_bad_vsyscall: 78 callbacks suppressed [11562513.886964] exe[153246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562513.966428] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.077335] exe[150507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.160213] exe[166511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.255440] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.324063] exe[148511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.397110] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.417360] exe[153945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.500074] exe[148482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.657039] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562518.891334] warn_bad_vsyscall: 242 callbacks suppressed [11562518.891337] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.918008] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.940541] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.962612] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.984566] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.004824] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.026469] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.052169] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.077333] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.100492] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562523.895932] warn_bad_vsyscall: 195 callbacks suppressed [11562523.895936] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562523.979579] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.056179] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.153870] exe[157649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.235431] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.312684] exe[163330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.336197] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.425044] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.462329] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.531409] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.910818] warn_bad_vsyscall: 88 callbacks suppressed [11562528.910821] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.988209] exe[148466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.051915] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.121864] exe[148494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.148494] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.234883] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.511729] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.649601] exe[155191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.693598] exe[155337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.749781] exe[145592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11563296.983914] warn_bad_vsyscall: 51 callbacks suppressed [11563296.983917] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.050803] exe[209501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.121483] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.191808] exe[245375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11564162.444776] exe[282975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.703356] exe[282980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.920885] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.952924] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.989739] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.026962] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.062712] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.106058] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.144988] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.183482] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11565099.136493] warn_bad_vsyscall: 57 callbacks suppressed [11565099.136497] exe[293094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565099.258727] exe[294155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.043336] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.121398] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11566632.890447] exe[349719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f764152839 cs:33 sp:7fdb7b72b858 ax:0 si:55f7641ab062 di:ffffffffff600000 [11567358.170812] exe[372737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda5a9a839 cs:33 sp:7f549c97e858 ax:0 si:55fda5af3062 di:ffffffffff600000 [11568031.388619] exe[351576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d82c2e839 cs:33 sp:7ecffe498858 ax:0 si:558d82c87062 di:ffffffffff600000 [11569260.474399] exe[375466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569261.377312] exe[338184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569262.181339] exe[382316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d087f858 ax:0 si:559bde482062 di:ffffffffff600000 [11569309.954783] exe[405267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.065111] exe[352156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.120066] exe[398935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.176797] exe[393693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.243561] exe[405400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.277532] exe[399019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.333288] exe[393672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569717.914214] exe[406088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094052] exe[372314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bbcee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094670] exe[337720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.213977] exe[406250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bddee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11570627.586664] exe[417752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.638479] exe[417746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.766448] exe[441957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11572038.765476] exe[475895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889db1ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572038.977536] exe[479441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572039.176765] exe[479800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572342.507294] exe[481351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf282c5839 cs:33 sp:7f5c28337858 ax:0 si:55cf2831e070 di:ffffffffff600000 [11572577.393150] exe[486689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572577.473226] exe[486687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572578.211498] exe[486677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572754.198775] exe[481332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56477294c839 cs:33 sp:7f001edd1858 ax:0 si:5647729a5062 di:ffffffffff600000 [11574240.728150] exe[551421] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6f0ee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574241.487023] exe[545323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6aeee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574242.469682] exe[546003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6cfee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11575422.643597] exe[620510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.701376] exe[619500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.762542] exe[619046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575566.007915] exe[523991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.091195] exe[551819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.166155] exe[628916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11576445.764659] exe[712019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.878131] exe[712009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.982369] exe[711902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576887.854922] exe[723515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576887.911232] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.005831] exe[716298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.078248] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11578050.810150] exe[736914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.915350] exe[806208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.957314] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578050.969802] exe[799678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.032458] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.066640] exe[799655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.100539] exe[801517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.138612] exe[806683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.200188] exe[801281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.222257] exe[734041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11579845.499536] exe[851008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2109ed839 cs:33 sp:7f547858c858 ax:0 si:55e210a46062 di:ffffffffff600000 [11579884.100862] exe[859314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.173286] exe[861221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.225785] exe[861085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11580352.706875] exe[880278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc72733839 cs:33 sp:7ece8f07f858 ax:0 si:55dc7278c062 di:ffffffffff600000 [11581411.682652] exe[910863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555579041839 cs:33 sp:7eedc077f858 ax:0 si:55557909a062 di:ffffffffff600000 [11583407.177111] docker0: port 1(vethe259598) entered blocking state [11583407.183502] docker0: port 1(vethe259598) entered disabled state [11583407.190068] device vethe259598 entered promiscuous mode [11583408.741833] eth0: renamed from veth1e830bc [11583408.814556] IPv6: ADDRCONF(NETDEV_CHANGE): vethe259598: link becomes ready [11583408.822198] docker0: port 1(vethe259598) entered blocking state [11583408.828542] docker0: port 1(vethe259598) entered forwarding state [11583408.835194] IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready [11583412.300279] veth1e830bc: renamed from eth0 [11583412.448612] docker0: port 1(vethe259598) entered disabled state [11583412.462563] docker0: port 1(vethe259598) entered disabled state [11583412.479276] device vethe259598 left promiscuous mode [11583412.485146] docker0: port 1(vethe259598) entered disabled state [11583431.825145] docker0: port 1(vethc7abddf) entered blocking state [11583431.831533] docker0: port 1(vethc7abddf) entered disabled state [11583431.838215] device vethc7abddf entered promiscuous mode [11583432.494406] eth0: renamed from vethd633b4d [11583432.599425] IPv6: ADDRCONF(NETDEV_CHANGE): vethc7abddf: link becomes ready [11583432.607140] docker0: port 1(vethc7abddf) entered blocking state [11583432.613499] docker0: port 1(vethc7abddf) entered forwarding state [11583817.129561] vethd633b4d: renamed from eth0 [11583817.523399] docker0: port 1(vethc7abddf) entered disabled state [11583817.532193] docker0: port 1(vethc7abddf) entered disabled state [11583817.545763] device vethc7abddf left promiscuous mode [11583817.552461] docker0: port 1(vethc7abddf) entered disabled state [11584054.884518] audit: type=1326 audit(1689187802.116:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584055.879755] audit: type=1326 audit(1689187803.112:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103700 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584567.089744] audit: type=1326 audit(1689188314.320:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=182950 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584611.088374] audit: type=1326 audit(1689188358.312:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263707 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584672.762944] audit: type=1326 audit(1689188419.991:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584875.420389] audit: type=1326 audit(1689188622.651:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=188936 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584965.440931] audit: type=1326 audit(1689188712.671:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585225.740695] audit: type=1326 audit(1689188972.971:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585229.617269] audit: type=1326 audit(1689188976.847:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585232.156357] audit: type=1326 audit(1689188979.387:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=272781 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585314.538060] audit: type=1326 audit(1689189061.767:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343964 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585378.674528] audit: type=1326 audit(1689189125.902:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=441825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585433.090919] audit: type=1326 audit(1689189180.318:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585457.504489] audit: type=1326 audit(1689189204.734:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585481.843203] audit: type=1326 audit(1689189229.070:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488144 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585504.254722] audit: type=1326 audit(1689189251.482:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.053267] audit: type=1326 audit(1689189275.282:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493114 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.807884] audit: type=1326 audit(1689189276.034:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585528.832541] audit: type=1326 audit(1689189276.038:28): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442984 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585545.824476] audit: type=1326 audit(1689189293.054:29): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585551.212031] audit: type=1326 audit(1689189298.438:30): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585623.106438] audit: type=1326 audit(1689189370.334:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=368087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585650.678959] audit: type=1326 audit(1689189397.906:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=503494 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585666.774803] audit: type=1326 audit(1689189413.998:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585672.549526] audit: type=1326 audit(1689189419.774:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585675.835169] audit: type=1326 audit(1689189423.062:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=519541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585680.990321] audit: type=1326 audit(1689189428.218:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585682.225303] audit: type=1326 audit(1689189429.454:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=523487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585692.507931] audit: type=1326 audit(1689189439.734:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529974 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585700.810773] audit: type=1326 audit(1689189448.038:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585707.330135] audit: type=1326 audit(1689189454.558:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585707.355627] audit: type=1326 audit(1689189454.570:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585760.137664] audit: type=1326 audit(1689189507.366:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585842.181262] audit: type=1326 audit(1689189589.410:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=543905 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585953.240671] audit: type=1326 audit(1689189700.466:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=436527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585977.153008] audit: type=1326 audit(1689189724.382:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585983.993412] audit: type=1326 audit(1689189731.222:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586006.672711] audit: type=1326 audit(1689189753.898:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586140.152824] audit: type=1326 audit(1689189887.377:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586207.321863] audit: type=1326 audit(1689189954.549:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586222.617377] audit: type=1326 audit(1689189969.845:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586222.733853] audit: type=1326 audit(1689189969.961:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586283.299802] audit: type=1326 audit(1689190030.525:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586425.211851] audit: type=1326 audit(1689190172.437:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=660268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586448.276864] audit: type=1326 audit(1689190195.501:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=709276 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586599.517442] audit: type=1326 audit(1689190346.745:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586697.763797] audit: type=1326 audit(1689190444.989:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=749851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586721.351015] audit: type=1326 audit(1689190468.577:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=795666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586855.921790] audit: type=1326 audit(1689190603.152:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796699 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586945.894236] audit: type=1326 audit(1689190693.124:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=533305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.031898] audit: type=1326 audit(1689190744.260:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.140632] audit: type=1326 audit(1689190744.368:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862850 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586998.283858] audit: type=1326 audit(1689190745.512:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587012.567629] audit: type=1326 audit(1689190759.796:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879241 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587019.764188] audit: type=1326 audit(1689190766.992:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=885098 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587033.584838] audit: type=1326 audit(1689190780.812:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=895459 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587037.458391] audit: type=1326 audit(1689190784.688:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587047.438093] audit: type=1326 audit(1689190794.652:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587181.826148] audit: type=1326 audit(1689190929.056:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=905801 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587280.280946] audit: type=1326 audit(1689191027.508:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587323.352812] audit: type=1326 audit(1689191070.580:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587345.059700] audit: type=1326 audit(1689191092.288:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=549018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587346.322122] audit: type=1326 audit(1689191093.552:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=930804 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587481.789421] audit: type=1326 audit(1689191229.016:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931842 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587625.478553] audit: type=1326 audit(1689191372.707:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587708.307169] audit: type=1326 audit(1689191455.535:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=756034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587769.707671] audit: type=1326 audit(1689191516.935:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587868.987704] audit: type=1326 audit(1689191616.215:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587911.691294] audit: type=1326 audit(1689191658.919:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=953497 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587972.252639] audit: type=1326 audit(1689191719.479:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949672 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588027.579353] audit: type=1326 audit(1689191774.807:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=964425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11588054.186210] audit: type=1326 audit(1689191801.411:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=959048 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588196.763380] audit: type=1326 audit(1689191943.991:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=966784 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588241.418032] audit: type=1326 audit(1689191988.643:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961678 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588257.524755] exe[970083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563948302839 cs:33 sp:7f701577b858 ax:0 si:56394835b062 di:ffffffffff600000 [11588338.712384] audit: type=1326 audit(1689192085.938:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588361.040657] audit: type=1326 audit(1689192108.266:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588415.532026] audit: type=1326 audit(1689192162.758:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=601426 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588610.783264] audit: type=1326 audit(1689192358.006:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984049 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588726.496588] audit: type=1326 audit(1689192473.722:88): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588753.178927] audit: type=1326 audit(1689192500.402:89): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988316 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588776.098474] audit: type=1326 audit(1689192523.322:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992296 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588907.567479] audit: type=1326 audit(1689192654.790:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588943.441393] audit: type=1326 audit(1689192690.666:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=997051 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589004.500919] audit: type=1326 audit(1689192751.725:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589049.699452] audit: type=1326 audit(1689192796.921:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589192.852319] audit: type=1326 audit(1689192940.077:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589224.823353] audit: type=1326 audit(1689192972.045:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=957390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589279.679649] audit: type=1326 audit(1689193026.901:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999123 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589317.854470] audit: type=1326 audit(1689193065.077:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9166 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589336.359512] audit: type=1326 audit(1689193083.581:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589429.636946] audit: type=1326 audit(1689193176.861:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589439.329881] audit: type=1326 audit(1689193186.553:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589452.248556] audit: type=1326 audit(1689193199.473:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589478.982418] audit: type=1326 audit(1689193226.205:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10335 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589556.277003] audit: type=1326 audit(1689193303.501:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589580.979071] audit: type=1326 audit(1689193328.201:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589586.686728] audit: type=1326 audit(1689193333.909:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589621.171546] audit: type=1326 audit(1689193368.393:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19657 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589724.809423] audit: type=1326 audit(1689193472.032:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=975428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589728.293279] audit: type=1326 audit(1689193475.516:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589733.237752] audit: type=1326 audit(1689193480.460:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589743.161653] audit: type=1326 audit(1689193490.388:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589764.186602] audit: type=1326 audit(1689193511.412:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589776.120531] audit: type=1326 audit(1689193523.348:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589831.237562] audit: type=1326 audit(1689193578.464:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=991342 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589866.353844] audit: type=1326 audit(1689193613.580:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589870.843852] audit: type=1326 audit(1689193618.068:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589881.503035] exe[37537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589881.579767] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.310348] exe[38197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.415993] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589905.778137] audit: type=1326 audit(1689193653.004:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589907.278419] audit: type=1326 audit(1689193654.504:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36131 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589910.766143] audit: type=1326 audit(1689193657.992:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590010.704598] audit: type=1326 audit(1689193757.928:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590013.206490] audit: type=1326 audit(1689193760.432:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43383 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590049.200088] audit: type=1326 audit(1689193796.424:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=47282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590068.122169] audit: type=1326 audit(1689193815.348:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50694 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590073.502291] audit: type=1326 audit(1689193820.728:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590120.931053] audit: type=1326 audit(1689193868.156:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590155.535046] audit: type=1326 audit(1689193902.760:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=54378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590175.976226] audit: type=1326 audit(1689193923.200:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=981718 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590178.057670] audit: type=1326 audit(1689193925.284:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=60876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590190.713262] audit: type=1326 audit(1689193937.940:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56012 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590230.205782] audit: type=1326 audit(1689193977.432:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590235.472981] audit: type=1326 audit(1689193982.700:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58981 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590334.418166] audit: type=1326 audit(1689194081.644:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=62081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590356.564544] audit: type=1326 audit(1689194103.788:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=68645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590368.499637] audit: type=1326 audit(1689194115.724:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=69347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590393.106260] audit: type=1326 audit(1689194140.332:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590397.337896] audit: type=1326 audit(1689194144.564:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590421.065575] audit: type=1326 audit(1689194168.292:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=55042 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590427.197777] audit: type=1326 audit(1689194174.424:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=66561 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590480.784621] exe[70942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6628c839 cs:33 sp:7fa6d27d0858 ax:0 si:563a662e5062 di:ffffffffff600000 [11590563.298809] audit: type=1326 audit(1689194310.523:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=73853 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590570.174470] audit: type=1326 audit(1689194317.399:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74121 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590579.511563] audit: type=1326 audit(1689194326.735:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=41148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.165028] audit: type=1326 audit(1689194365.387:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.556131] audit: type=1326 audit(1689194365.779:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76917 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590659.789661] audit: type=1326 audit(1689194407.015:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=72204 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590667.566138] audit: type=1326 audit(1689194414.791:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=59720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590713.717972] audit: type=1326 audit(1689194460.943:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=81970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590760.577913] audit: type=1326 audit(1689194507.803:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=85519 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590773.925188] audit: type=1326 audit(1689194521.147:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=86433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590829.878288] audit: type=1326 audit(1689194577.103:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590843.309873] audit: type=1326 audit(1689194590.535:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=90249 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590856.337400] audit: type=1326 audit(1689194603.563:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=91077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590883.659438] exe[98704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.745839] exe[98692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.804815] exe[73130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590905.357910] audit: type=1326 audit(1689194652.583:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590994.002065] audit: type=1326 audit(1689194741.227:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=82851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590997.870766] audit: type=1326 audit(1689194745.095:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98690 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591045.573250] audit: type=1326 audit(1689194792.795:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=61248 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591047.449319] audit: type=1326 audit(1689194794.671:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=100862 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591140.220327] audit: type=1326 audit(1689194887.443:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103773 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591190.314804] audit: type=1326 audit(1689194937.538:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591282.744645] audit: type=1326 audit(1689195029.966:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=110698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591291.245979] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.293995] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.340272] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.365662] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591332.697604] audit: type=1326 audit(1689195079.918:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=112617 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591355.547113] audit: type=1326 audit(1689195102.770:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=116982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591358.161112] audit: type=1326 audit(1689195105.382:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98099 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591425.677450] audit: type=1326 audit(1689195172.898:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=115486 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591448.624599] audit: type=1326 audit(1689195195.846:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=119555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591607.174755] audit: type=1326 audit(1689195354.398:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=120483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591633.329281] audit: type=1326 audit(1689195380.550:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=118107 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591699.123909] audit: type=1326 audit(1689195446.346:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=123336 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591750.549397] audit: type=1326 audit(1689195497.770:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=124794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591808.120865] audit: type=1326 audit(1689195555.342:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591843.602538] audit: type=1326 audit(1689195590.826:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127514 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591873.374278] audit: type=1326 audit(1689195620.594:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591893.157685] audit: type=1326 audit(1689195640.377:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128877 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591982.621819] audit: type=1326 audit(1689195729.841:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127317 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591989.377409] audit: type=1326 audit(1689195736.597:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131086 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592022.574487] audit: type=1326 audit(1689195769.793:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87153 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592035.999430] audit: type=1326 audit(1689195783.221:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=132961 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592132.313885] audit: type=1326 audit(1689195879.533:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135592 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592143.607778] audit: type=1326 audit(1689195890.829:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128178 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592178.641536] audit: type=1326 audit(1689195925.861:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138468 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592254.513447] audit: type=1326 audit(1689196001.733:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592273.875922] audit: type=1326 audit(1689196021.097:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=140726 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592302.580569] audit: type=1326 audit(1689196049.801:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592321.531004] audit: type=1326 audit(1689196068.753:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=142352 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592339.728090] audit: type=1326 audit(1689196086.949:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=130223 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592369.761746] audit: type=1326 audit(1689196116.981:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103571 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592410.933916] audit: type=1326 audit(1689196158.153:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=150341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592416.511036] audit: type=1326 audit(1689196163.733:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=145063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592462.058974] audit: type=1326 audit(1689196209.281:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=141810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592463.310936] audit: type=1326 audit(1689196210.533:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592485.344448] audit: type=1326 audit(1689196232.565:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153095 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592558.476558] audit: type=1326 audit(1689196305.697:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=151044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592615.624930] audit: type=1326 audit(1689196362.844:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592699.997739] audit: type=1326 audit(1689196447.220:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592710.156296] audit: type=1326 audit(1689196457.380:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156955 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592721.951674] audit: type=1326 audit(1689196469.176:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592736.718023] audit: type=1326 audit(1689196483.940:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153479 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592741.098019] audit: type=1326 audit(1689196488.320:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592755.557937] audit: type=1326 audit(1689196502.780:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=149411 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592759.276627] audit: type=1326 audit(1689196506.500:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158134 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592769.332142] audit: type=1326 audit(1689196516.556:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592779.678505] audit: type=1326 audit(1689196526.900:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=144000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592781.810254] audit: type=1326 audit(1689196529.032:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592864.422847] audit: type=1326 audit(1689196611.644:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161799 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592924.228200] audit: type=1326 audit(1689196671.452:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164650 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592972.503710] audit: type=1326 audit(1689196719.728:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166288 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593019.764197] audit: type=1326 audit(1689196766.988:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=168704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593032.140808] audit: type=1326 audit(1689196779.364:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=169078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593079.379374] audit: type=1326 audit(1689196826.600:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593114.910849] audit: type=1326 audit(1689196862.132:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.622118] audit: type=1326 audit(1689196921.844:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.825662] audit: type=1326 audit(1689196922.048:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593178.076737] audit: type=1326 audit(1689196925.300:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162576 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593234.654096] audit: type=1326 audit(1689196981.876:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593257.424976] audit: type=1326 audit(1689197004.648:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=177244 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593293.232827] audit: type=1326 audit(1689197040.456:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=137729 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593317.825573] audit: type=1326 audit(1689197065.048:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=180616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593323.667486] audit: type=1326 audit(1689197070.888:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=189200 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593328.061505] audit: type=1326 audit(1689197075.284:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=148080 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593329.981467] audit: type=1326 audit(1689197077.204:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593338.759166] audit: type=1326 audit(1689197085.979:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=165105 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593389.569262] audit: type=1326 audit(1689197136.791:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=186680 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593396.219631] exe[152440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d776adb40a cs:33 sp:7ed61def9ee8 ax:12 si:ffffffffff600000 di:55d776b47ff2 [11593399.988581] audit: type=1326 audit(1689197147.211:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=187139 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593439.960246] exe[66056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be798b40a cs:33 sp:7f6af116aee8 ax:12 si:ffffffffff600000 di:555be79f7ff2 [11593461.573435] audit: type=1326 audit(1689197208.795:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=190626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593485.256569] audit: type=1326 audit(1689197232.479:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593497.873599] audit: type=1326 audit(1689197245.095:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593518.294739] audit: type=1326 audit(1689197265.515:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593521.883008] exe[199220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da1a09d40a cs:33 sp:7f85f4e68ee8 ax:12 si:ffffffffff600000 di:55da1a109ff2 [11593544.715149] audit: type=1326 audit(1689197291.935:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=197050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593545.100259] audit: type=1326 audit(1689197292.323:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=196843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593575.000948] exe[134062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639deab340a cs:33 sp:7f755d14fee8 ax:12 si:ffffffffff600000 di:5639deb1fff2 [11593604.159283] audit: type=1326 audit(1689197351.379:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=200356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593640.473262] audit: type=1326 audit(1689197387.695:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202521 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593657.667580] exe[179402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591c09e940a cs:33 sp:7f261affeee8 ax:12 si:ffffffffff600000 di:5591c0a55ff2 [11593674.309236] audit: type=1326 audit(1689197421.531:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593689.965207] audit: type=1326 audit(1689197437.187:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205540 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593691.547751] exe[160101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569db9d240a cs:33 sp:7fa8a79ccee8 ax:12 si:ffffffffff600000 di:5569dba3eff2 [11593699.961762] audit: type=1326 audit(1689197447.183:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=206003 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593728.160554] audit: type=1326 audit(1689197475.383:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593746.828768] audit: type=1326 audit(1689197494.051:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=207759 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593795.835659] audit: type=1326 audit(1689197543.055:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209535 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593832.663491] audit: type=1326 audit(1689197579.883:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210532 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593838.669590] exe[171215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56258f57d40a cs:33 sp:7eee19bc0ee8 ax:12 si:ffffffffff600000 di:56258f5e9ff2 [11593855.337569] audit: type=1326 audit(1689197602.559:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211977 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593873.582187] exe[168156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea3654340a cs:33 sp:7ee36dc7fee8 ax:12 si:ffffffffff600000 di:55ea365afff2 [11593890.297485] audit: type=1326 audit(1689197637.519:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=212765 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593894.219651] audit: type=1326 audit(1689197641.439:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=203030 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593950.988419] audit: type=1326 audit(1689197698.211:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215006 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593958.108331] exe[223988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55790709f40a cs:33 sp:7fc0e2306ee8 ax:12 si:ffffffffff600000 di:55790710bff2 [11593975.515820] audit: type=1326 audit(1689197722.735:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=216520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594010.397443] audit: type=1326 audit(1689197757.615:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594030.252814] audit: type=1326 audit(1689197777.475:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594033.719885] audit: type=1326 audit(1689197780.939:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=220218 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594106.182590] audit: type=1326 audit(1689197853.402:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594117.815412] audit: type=1326 audit(1689197865.034:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=239115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594117.935385] audit: type=1326 audit(1689197865.154:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225643 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594165.847268] audit: type=1326 audit(1689197913.066:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=230078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594174.793835] audit: type=1326 audit(1689197922.014:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=244854 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594175.873367] audit: type=1326 audit(1689197923.094:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594199.462125] audit: type=1326 audit(1689197946.682:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594224.432971] audit: type=1326 audit(1689197971.654:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=249792 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594261.404105] audit: type=1326 audit(1689198008.622:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=241022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594318.932606] audit: type=1326 audit(1689198066.150:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594320.925806] audit: type=1326 audit(1689198068.146:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594356.854437] audit: type=1326 audit(1689198104.074:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594380.768141] audit: type=1326 audit(1689198127.986:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=240966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594390.465281] audit: type=1326 audit(1689198137.686:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=228574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594461.153994] audit: type=1326 audit(1689198208.374:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=255268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594476.069454] audit: type=1326 audit(1689198223.290:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=256911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594518.406656] audit: type=1326 audit(1689198265.626:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594523.088185] audit: type=1326 audit(1689198270.306:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594597.381921] audit: type=1326 audit(1689198344.602:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=191172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594603.685087] audit: type=1326 audit(1689198350.906:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=266554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594631.412121] audit: type=1326 audit(1689198378.630:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=268442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594632.657909] audit: type=1326 audit(1689198379.878:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=258967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594662.779958] exe[279809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594662.854447] exe[276685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713532] exe[277223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713638] exe[279858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bddee8 ax:0 si:20000080 di:ffffffffff600000 [11594665.693757] audit: type=1326 audit(1689198412.914:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594673.507995] audit: type=1326 audit(1689198420.726:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594730.359948] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.445155] exe[278569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.446222] exe[278851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.540368] exe[278597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.552108] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.612605] exe[281701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.638579] exe[278601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594746.644836] audit: type=1326 audit(1689198493.862:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=277230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594768.991618] audit: type=1326 audit(1689198516.210:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291770 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594786.336470] audit: type=1326 audit(1689198533.553:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594808.089645] audit: type=1326 audit(1689198555.309:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=281516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594828.717418] audit: type=1326 audit(1689198575.937:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=284014 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594880.645359] audit: type=1326 audit(1689198627.865:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=276757 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594915.736039] audit: type=1326 audit(1689198662.953:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=296537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594941.113632] audit: type=1326 audit(1689198688.333:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=293790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594951.088221] audit: type=1326 audit(1689198698.305:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594973.980095] audit: type=1326 audit(1689198721.197:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=298957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595018.844858] audit: type=1326 audit(1689198766.061:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595030.820319] audit: type=1326 audit(1689198778.037:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263124 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595032.223366] audit: type=1326 audit(1689198779.441:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595145.554563] audit: type=1326 audit(1689198892.773:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=300890 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595161.269631] audit: type=1326 audit(1689198908.489:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=301412 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595170.431765] audit: type=1326 audit(1689198917.649:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595185.313809] audit: type=1326 audit(1689198932.533:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595201.280000] audit: type=1326 audit(1689198948.497:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=304270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595223.038909] audit: type=1326 audit(1689198970.257:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=305529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595268.993349] audit: type=1326 audit(1689199016.209:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280239 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595304.435314] audit: type=1326 audit(1689199051.653:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595356.370847] audit: type=1326 audit(1689199103.589:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=311169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595366.975635] audit: type=1326 audit(1689199114.193:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=312137 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595426.830311] audit: type=1326 audit(1689199174.049:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=315053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595427.662370] audit: type=1326 audit(1689199174.881:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=303097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595446.025545] audit: type=1326 audit(1689199193.241:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=316510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595464.682020] audit: type=1326 audit(1689199211.901:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=318190 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595509.649702] audit: type=1326 audit(1689199256.864:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323600 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595510.657426] audit: type=1326 audit(1689199257.872:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595542.116878] audit: type=1326 audit(1689199289.332:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=302591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595581.328126] audit: type=1326 audit(1689199328.548:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328777 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595587.640931] audit: type=1326 audit(1689199334.860:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=329367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595651.155320] audit: type=1326 audit(1689199398.376:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=333972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595702.302607] audit: type=1326 audit(1689199449.524:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595730.144192] audit: type=1326 audit(1689199477.364:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=337996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595740.233803] audit: type=1326 audit(1689199487.452:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=338460 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595792.585821] audit: type=1326 audit(1689199539.804:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=341419 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595825.580712] audit: type=1326 audit(1689199572.800:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595875.108425] audit: type=1326 audit(1689199622.328:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595901.852174] audit: type=1326 audit(1689199649.072:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344849 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595905.389538] audit: type=1326 audit(1689199652.608:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=314916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595925.496842] audit: type=1326 audit(1689199672.716:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=335810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595934.736760] audit: type=1326 audit(1689199681.956:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=345386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595971.418522] audit: type=1326 audit(1689199718.640:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308731 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595980.227077] audit: type=1326 audit(1689199727.448:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596018.056630] audit: type=1326 audit(1689199765.276:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=356309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596056.500390] audit: type=1326 audit(1689199803.720:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=361636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596075.947223] audit: type=1326 audit(1689199823.168:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=363826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596134.937184] audit: type=1326 audit(1689199882.156:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=373258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596159.034584] audit: type=1326 audit(1689199906.256:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=375929 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596177.422094] audit: type=1326 audit(1689199924.640:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383229 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596180.530915] audit: type=1326 audit(1689199927.752:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596187.965307] audit: type=1326 audit(1689199935.184:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596211.290275] audit: type=1326 audit(1689199958.508:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596218.125572] audit: type=1326 audit(1689199965.344:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596246.667371] audit: type=1326 audit(1689199993.887:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=389789 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596290.009508] audit: type=1326 audit(1689200037.227:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=382687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596301.649961] audit: type=1326 audit(1689200048.867:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383548 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596322.674538] audit: type=1326 audit(1689200069.891:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=385382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596359.395258] audit: type=1326 audit(1689200106.615:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=388832 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596368.814653] audit: type=1326 audit(1689200116.035:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=401516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596443.646206] audit: type=1326 audit(1689200190.863:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=396416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596466.257416] audit: type=1326 audit(1689200213.475:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=407911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596502.013601] audit: type=1326 audit(1689200249.231:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=403529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596564.211893] audit: type=1326 audit(1689200311.431:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=406533 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596594.833485] audit: type=1326 audit(1689200342.051:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596642.054964] audit: type=1326 audit(1689200389.275:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596644.775799] audit: type=1326 audit(1689200391.995:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412267 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596718.281279] audit: type=1326 audit(1689200465.499:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420908 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596748.828125] exe[433668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b25822839 cs:33 sp:7f1f6d4d3858 ax:0 si:558b2587b062 di:ffffffffff600000 [11596786.178383] audit: type=1326 audit(1689200533.395:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=425510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596794.175733] audit: type=1326 audit(1689200541.395:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426145 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596845.812515] audit: type=1326 audit(1689200593.031:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431991 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596871.244869] audit: type=1326 audit(1689200618.463:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596896.868375] audit: type=1326 audit(1689200644.087:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=405560 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596929.235998] audit: type=1326 audit(1689200676.455:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596963.597646] audit: type=1326 audit(1689200710.814:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431840 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596988.259748] audit: type=1326 audit(1689200735.478:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=440156 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597030.957935] audit: type=1326 audit(1689200778.174:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597070.847230] audit: type=1326 audit(1689200818.066:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443447 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597089.178816] audit: type=1326 audit(1689200836.394:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444711 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597129.189094] audit: type=1326 audit(1689200876.406:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=445864 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597150.586654] audit: type=1326 audit(1689200897.802:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447377 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597150.630455] audit: type=1326 audit(1689200897.846:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597213.244332] audit: type=1326 audit(1689200960.462:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=455277 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597271.316230] audit: type=1326 audit(1689201018.534:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=460261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597310.051733] audit: type=1326 audit(1689201057.270:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597313.276441] audit: type=1326 audit(1689201060.494:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597314.610726] audit: type=1326 audit(1689201061.826:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=464050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597357.135100] audit: type=1326 audit(1689201104.350:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=468066 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597413.137470] audit: type=1326 audit(1689201160.354:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443184 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597414.535659] audit: type=1326 audit(1689201161.754:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=471566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597474.924098] audit: type=1326 audit(1689201222.142:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597476.117154] audit: type=1326 audit(1689201223.334:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476538 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597498.269056] audit: type=1326 audit(1689201245.486:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597555.566526] audit: type=1326 audit(1689201302.782:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=482783 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597641.232540] audit: type=1326 audit(1689201388.450:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=489586 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597669.950313] exe[494500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e652697839 cs:33 sp:7f7b088e1858 ax:0 si:55e6526f0070 di:ffffffffff600000 [11597698.119005] audit: type=1326 audit(1689201445.333:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597723.766240] audit: type=1326 audit(1689201470.981:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494635 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597725.580971] audit: type=1326 audit(1689201472.797:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=487339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597778.424545] audit: type=1326 audit(1689201525.641:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497122 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597782.912946] audit: type=1326 audit(1689201530.129:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597839.779249] audit: type=1326 audit(1689201586.993:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=500302 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597924.949065] audit: type=1326 audit(1689201672.165:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597927.023142] audit: type=1326 audit(1689201674.237:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597928.907409] audit: type=1326 audit(1689201676.121:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=484211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597933.552953] audit: type=1326 audit(1689201680.769:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=510701 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597976.279809] audit: type=1326 audit(1689201723.493:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597982.541467] audit: type=1326 audit(1689201729.757:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=513162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598067.159794] audit: type=1326 audit(1689201814.373:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=518642 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598088.313475] audit: type=1326 audit(1689201835.529:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520919 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598125.471872] audit: type=1326 audit(1689201872.685:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522253 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598131.148243] audit: type=1326 audit(1689201878.365:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598204.492781] audit: type=1326 audit(1689201951.709:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598208.863021] audit: type=1326 audit(1689201956.077:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=526331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598243.575830] audit: type=1326 audit(1689201990.789:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528273 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598268.259679] audit: type=1326 audit(1689202015.473:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528775 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598286.099005] audit: type=1326 audit(1689202033.313:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598350.997125] audit: type=1326 audit(1689202098.213:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531385 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598352.184658] audit: type=1326 audit(1689202099.401:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541070 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598410.602708] audit: type=1326 audit(1689202157.816:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535596 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598458.134205] audit: type=1326 audit(1689202205.352:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=530585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598471.516156] audit: type=1326 audit(1689202218.732:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598480.334947] audit: type=1326 audit(1689202227.552:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531824 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598482.921116] audit: type=1326 audit(1689202230.140:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598493.766116] audit: type=1326 audit(1689202240.984:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=542354 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598537.882169] audit: type=1326 audit(1689202285.100:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552304 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598552.794779] audit: type=1326 audit(1689202300.012:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=545958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598601.517055] audit: type=1326 audit(1689202348.736:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=550148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598636.422226] audit: type=1326 audit(1689202383.640:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598696.930725] audit: type=1326 audit(1689202444.148:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598699.992536] audit: type=1326 audit(1689202447.208:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555330 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598764.002598] audit: type=1326 audit(1689202511.220:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=558821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598778.707897] audit: type=1326 audit(1689202525.924:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=559751 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598781.495884] audit: type=1326 audit(1689202528.712:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=571608 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598838.336938] audit: type=1326 audit(1689202585.556:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=566812 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598851.686782] audit: type=1326 audit(1689202598.904:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=557043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598921.757010] audit: type=1326 audit(1689202668.976:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=572500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598946.863553] audit: type=1326 audit(1689202694.080:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574758 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598979.367746] audit: type=1326 audit(1689202726.584:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=575821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599001.943831] audit: type=1326 audit(1689202749.160:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=577673 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599054.749238] audit: type=1326 audit(1689202801.968:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=573675 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599065.610701] audit: type=1326 audit(1689202812.828:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=579525 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599121.528672] audit: type=1326 audit(1689202868.744:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=583090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599156.266882] audit: type=1326 audit(1689202903.483:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599198.828291] audit: type=1326 audit(1689202946.043:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599208.132916] audit: type=1326 audit(1689202955.347:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586082 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599230.502686] audit: type=1326 audit(1689202977.719:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=576573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599296.025793] audit: type=1326 audit(1689203043.243:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=589839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599311.286462] audit: type=1326 audit(1689203058.503:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=590816 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599353.781004] audit: type=1326 audit(1689203100.995:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599357.016179] audit: type=1326 audit(1689203104.231:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599357.503764] audit: type=1326 audit(1689203104.719:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592880 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599379.763425] audit: type=1326 audit(1689203126.979:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599466.065105] audit: type=1326 audit(1689203213.279:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=597822 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599499.137048] audit: type=1326 audit(1689203246.351:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599505.276837] audit: type=1326 audit(1689203252.491:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=595019 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599507.683755] audit: type=1326 audit(1689203254.899:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598796 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599570.540316] audit: type=1326 audit(1689203317.755:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599584.813655] audit: type=1326 audit(1689203332.031:428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602286 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599642.444173] audit: type=1326 audit(1689203389.659:429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=603065 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599671.529067] audit: type=1326 audit(1689203418.743:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=596545 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599691.211475] audit: type=1326 audit(1689203438.427:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605507 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599691.379627] audit: type=1326 audit(1689203438.595:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599727.545269] audit: type=1326 audit(1689203474.759:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.062166] audit: type=1326 audit(1689203509.279:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.086813] audit: type=1326 audit(1689203509.279:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599794.446274] audit: type=1326 audit(1689203541.663:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604351 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599853.075039] audit: type=1326 audit(1689203600.290:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599854.839725] audit: type=1326 audit(1689203602.054:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599869.641444] audit: type=1326 audit(1689203616.854:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612658 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599904.012459] audit: type=1326 audit(1689203651.226:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=613836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600015.137399] audit: type=1326 audit(1689203762.350:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600016.195425] audit: type=1326 audit(1689203763.410:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600047.639331] audit: type=1326 audit(1689203794.854:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=609967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600049.671506] audit: type=1326 audit(1689203796.886:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600093.041099] audit: type=1326 audit(1689203840.254:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620895 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600136.261927] audit: type=1326 audit(1689203883.474:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=621806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600176.566249] audit: type=1326 audit(1689203923.778:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622882 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600177.846245] audit: type=1326 audit(1689203925.062:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622980 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600245.983660] audit: type=1326 audit(1689203993.198:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600255.622819] audit: type=1326 audit(1689204002.838:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627117 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600301.130225] audit: type=1326 audit(1689204048.342:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600313.685675] audit: type=1326 audit(1689204060.898:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600338.550728] audit: type=1326 audit(1689204085.766:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600339.475173] audit: type=1326 audit(1689204086.690:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600346.117313] audit: type=1326 audit(1689204093.330:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=625492 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600389.332439] audit: type=1326 audit(1689204136.546:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633029 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600413.679225] exe[552330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.533366] exe[616525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.845071] exe[553784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd587feee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600444.823774] audit: type=1326 audit(1689204192.038:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=628939 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600454.783559] audit: type=1326 audit(1689204201.998:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600460.297963] audit: type=1326 audit(1689204207.510:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=634120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600501.054928] audit: type=1326 audit(1689204248.270:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600501.459095] audit: type=1326 audit(1689204248.674:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600522.075266] audit: type=1326 audit(1689204269.290:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600532.895480] audit: type=1326 audit(1689204280.110:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=637127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600542.361069] audit: type=1326 audit(1689204289.574:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642337 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600618.878528] audit: type=1326 audit(1689204366.089:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=646857 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600662.564294] audit: type=1326 audit(1689204409.777:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642395 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600712.374259] audit: type=1326 audit(1689204459.585:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=644142 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600758.320683] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.381302] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.435987] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.460840] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600791.517421] audit: type=1326 audit(1689204538.729:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=647911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600796.510774] audit: type=1326 audit(1689204543.721:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=643074 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600821.804316] audit: type=1326 audit(1689204569.017:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600824.112759] audit: type=1326 audit(1689204571.325:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600837.837171] audit: type=1326 audit(1689204585.049:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=650926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600838.202708] audit: type=1326 audit(1689204585.413:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639619 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600862.491741] audit: type=1326 audit(1689204609.705:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=635997 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600952.331157] audit: type=1326 audit(1689204699.545:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=655568 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600984.800020] audit: type=1326 audit(1689204732.013:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=658564 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601000.447556] audit: type=1326 audit(1689204747.661:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659232 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601000.483579] audit: type=1326 audit(1689204747.697:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659242 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601093.169914] audit: type=1326 audit(1689204840.381:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=656730 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601098.482808] audit: type=1326 audit(1689204845.693:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=657512 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601113.225254] audit: type=1326 audit(1689204860.437:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666002 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601141.312313] audit: type=1326 audit(1689204888.525:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666552 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601145.359933] audit: type=1326 audit(1689204892.573:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666990 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601274.291260] audit: type=1326 audit(1689205021.505:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=671926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601306.606072] audit: type=1326 audit(1689205053.816:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601309.957748] audit: type=1326 audit(1689205057.168:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674553 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601341.904200] audit: type=1326 audit(1689205089.120:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=675836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601352.797313] audit: type=1326 audit(1689205100.012:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=670357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601367.443182] audit: type=1326 audit(1689205114.656:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601405.264683] audit: type=1326 audit(1689205152.480:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=678379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601436.248250] audit: type=1326 audit(1689205183.464:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=679261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601467.634913] audit: type=1326 audit(1689205214.848:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=680833 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601505.709842] audit: type=1326 audit(1689205252.924:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681793 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601506.056017] audit: type=1326 audit(1689205253.272:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601511.171917] audit: type=1326 audit(1689205258.388:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682176 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601597.695181] audit: type=1326 audit(1689205344.908:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=685750 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601628.435570] audit: type=1326 audit(1689205375.652:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687165 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601639.279190] audit: type=1326 audit(1689205386.492:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=693456 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601646.751183] audit: type=1326 audit(1689205393.964:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687780 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601648.323195] audit: type=1326 audit(1689205395.536:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601704.970538] audit: type=1326 audit(1689205452.184:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601726.438303] audit: type=1326 audit(1689205473.652:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=696962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601790.231890] audit: type=1326 audit(1689205537.448:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694256 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601870.281316] audit: type=1326 audit(1689205617.496:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692648 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601888.842697] audit: type=1326 audit(1689205636.056:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=698719 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601905.721655] audit: type=1326 audit(1689205652.936:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=699618 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601947.458397] audit: type=1326 audit(1689205694.672:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=700466 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601952.073376] audit: type=1326 audit(1689205699.288:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=701007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601958.768477] audit: type=1326 audit(1689205705.984:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=677034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601988.295493] audit: type=1326 audit(1689205735.508:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692547 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602050.588332] audit: type=1326 audit(1689205797.803:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=706687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602092.633316] audit: type=1326 audit(1689205839.847:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710024 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602109.458983] audit: type=1326 audit(1689205856.671:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.463185] audit: type=1326 audit(1689205857.675:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711039 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.945264] audit: type=1326 audit(1689205858.159:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602113.494614] audit: type=1326 audit(1689205860.707:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602167.835209] audit: type=1326 audit(1689205915.047:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=705931 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602212.164413] audit: type=1326 audit(1689205959.379:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=719035 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602228.614047] audit: type=1326 audit(1689205975.827:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602251.890213] audit: type=1326 audit(1689205999.103:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723451 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602263.451544] audit: type=1326 audit(1689206010.663:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=714805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602274.588673] audit: type=1326 audit(1689206021.803:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=726182 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602370.143134] audit: type=1326 audit(1689206117.355:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602373.347637] audit: type=1326 audit(1689206120.559:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735693 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602393.590611] audit: type=1326 audit(1689206140.803:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=737207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602422.998822] audit: type=1326 audit(1689206170.211:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=728959 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602436.005176] audit: type=1326 audit(1689206183.219:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=739202 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602484.595155] audit: type=1326 audit(1689206231.807:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=722293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602507.546522] audit: type=1326 audit(1689206254.759:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602535.958765] audit: type=1326 audit(1689206283.171:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742213 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602560.451117] audit: type=1326 audit(1689206307.663:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743728 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602579.163230] exe[728877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.244070] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.318329] exe[741075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602597.777330] audit: type=1326 audit(1689206344.991:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=745885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602603.869164] audit: type=1326 audit(1689206351.083:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=754999 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.285215] audit: type=1326 audit(1689206425.499:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=755000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.677713] audit: type=1326 audit(1689206425.891:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602696.843980] audit: type=1326 audit(1689206444.055:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=753602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602743.097537] audit: type=1326 audit(1689206490.311:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602743.122326] audit: type=1326 audit(1689206490.311:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602759.499374] audit: type=1326 audit(1689206506.710:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=760841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602854.344933] audit: type=1326 audit(1689206601.558:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=765622 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602859.040813] audit: type=1326 audit(1689206606.254:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=765875 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602884.867590] audit: type=1326 audit(1689206632.078:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=767807 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602895.802192] audit: type=1326 audit(1689206643.014:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=750390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602921.417882] audit: type=1326 audit(1689206668.630:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=769293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602934.284216] audit: type=1326 audit(1689206681.494:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=763696 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602998.074154] audit: type=1326 audit(1689206745.286:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=771543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603001.490232] audit: type=1326 audit(1689206748.702:547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772848 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603019.886473] exe[728911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603019.961263] exe[723449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.012456] exe[723112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.033883] exe[723112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.390766] audit: type=1326 audit(1689206767.602:548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603082.847524] audit: type=1326 audit(1689206830.058:549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=775665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603138.090907] audit: type=1326 audit(1689206885.302:550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=777413 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603172.298141] audit: type=1326 audit(1689206919.510:551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=777217 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603182.461434] audit: type=1326 audit(1689206929.674:552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=780255 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603243.896847] audit: type=1326 audit(1689206991.106:553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=786666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603279.127507] audit: type=1326 audit(1689207026.338:554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=787634 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603309.589653] audit: type=1326 audit(1689207056.802:555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=774472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603335.471219] audit: type=1326 audit(1689207082.682:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=788938 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603343.797267] audit: type=1326 audit(1689207091.010:557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=790140 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603405.836680] audit: type=1326 audit(1689207153.046:558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=792319 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603420.441739] audit: type=1326 audit(1689207167.654:559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=792652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603427.753376] audit: type=1326 audit(1689207174.966:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=774364 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603505.176389] audit: type=1326 audit(1689207252.385:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796183 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603533.829677] audit: type=1326 audit(1689207281.041:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=797063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603562.278422] audit: type=1326 audit(1689207309.489:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603667.052521] audit: type=1326 audit(1689207414.261:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=805774 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603667.905373] audit: type=1326 audit(1689207415.113:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=807621 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603676.505802] audit: type=1326 audit(1689207423.717:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=806198 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603684.820900] audit: type=1326 audit(1689207432.029:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=793728 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603795.965747] audit: type=1326 audit(1689207543.177:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=812556 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603804.637990] audit: type=1326 audit(1689207551.849:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603810.551130] audit: type=1326 audit(1689207557.761:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810358 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603820.309874] audit: type=1326 audit(1689207567.521:571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=811185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603836.504336] audit: type=1326 audit(1689207583.713:572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=800972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603841.793876] audit: type=1326 audit(1689207589.005:573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603870.199020] audit: type=1326 audit(1689207617.409:574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=802386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603951.796356] audit: type=1326 audit(1689207699.005:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=816857 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603957.195581] audit: type=1326 audit(1689207704.405:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817252 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603991.129069] audit: type=1326 audit(1689207738.337:577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=819555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604091.585729] audit: type=1326 audit(1689207838.793:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=821309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604093.722432] audit: type=1326 audit(1689207840.933:579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=821440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604119.143756] audit: type=1326 audit(1689207866.353:580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=822836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604204.469045] audit: type=1326 audit(1689207951.676:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817690 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604217.655924] audit: type=1326 audit(1689207964.864:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=818547 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604224.651590] audit: type=1326 audit(1689207971.860:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=825537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604234.352201] audit: type=1326 audit(1689207981.564:584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=826179 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604235.997704] audit: type=1326 audit(1689207983.208:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=826343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604256.614441] audit: type=1326 audit(1689208003.828:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=831317 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604263.313503] audit: type=1326 audit(1689208010.524:587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=828626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604308.646673] audit: type=1326 audit(1689208055.860:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=831393 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604427.403379] audit: type=1326 audit(1689208174.616:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=833669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604450.026228] audit: type=1326 audit(1689208197.240:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=834371 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604459.830108] audit: type=1326 audit(1689208207.040:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=829683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604476.678391] audit: type=1326 audit(1689208223.892:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=829944 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604506.595388] audit: type=1326 audit(1689208253.808:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=836737 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604536.910472] audit: type=1326 audit(1689208284.124:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824480 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604588.801578] audit: type=1326 audit(1689208336.012:595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=840416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604590.878115] audit: type=1326 audit(1689208338.088:596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=840555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604613.330191] audit: type=1326 audit(1689208360.540:597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=849945 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604648.014559] audit: type=1326 audit(1689208395.228:598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=844081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604655.910760] audit: type=1326 audit(1689208403.124:599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604731.191216] audit: type=1326 audit(1689208478.404:600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=841978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604750.453981] audit: type=1326 audit(1689208497.664:601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850369 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604790.297089] audit: type=1326 audit(1689208537.508:602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=851838 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604911.917454] audit: type=1326 audit(1689208659.128:603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=855574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604932.248331] audit: type=1326 audit(1689208679.459:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=856349 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604979.039220] audit: type=1326 audit(1689208726.251:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=854027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605001.217428] audit: type=1326 audit(1689208748.427:606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=863243 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605004.825105] audit: type=1326 audit(1689208752.035:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605073.388168] audit: type=1326 audit(1689208820.599:608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=861356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605073.905125] audit: type=1326 audit(1689208821.115:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=861403 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605096.082181] audit: type=1326 audit(1689208843.291:610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=865622 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605129.878423] audit: type=1326 audit(1689208877.087:611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=866278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605177.031421] audit: type=1326 audit(1689208924.243:612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=865008 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605235.963087] exe[867632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bc192d40a cs:33 sp:7f06f0682ee8 ax:12 si:ffffffffff600000 di:559bc1999ff2 [11605242.250840] audit: type=1326 audit(1689208989.459:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=863306 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605259.396277] exe[729169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605259.444946] exe[734784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605259.493436] exe[735065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605345.057961] audit: type=1326 audit(1689209092.267:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=867457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605366.290442] audit: type=1326 audit(1689209113.499:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=872748 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605379.568477] audit: type=1326 audit(1689209126.779:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=868919 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605400.381802] audit: type=1326 audit(1689209147.591:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=873868 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605499.168636] audit: type=1326 audit(1689209246.379:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=873036 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605641.112938] audit: type=1326 audit(1689209388.322:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=878736 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605650.594619] audit: type=1326 audit(1689209397.802:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879055 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605769.011148] audit: type=1326 audit(1689209516.218:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897739 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605783.192934] audit: type=1326 audit(1689209530.402:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=888577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605785.006125] audit: type=1326 audit(1689209532.214:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=874679 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605792.566409] audit: type=1326 audit(1689209539.774:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=899333 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605803.584285] audit: type=1326 audit(1689209550.794:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=889127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605917.107175] audit: type=1326 audit(1689209664.314:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=900168 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605999.175587] audit: type=1326 audit(1689209746.386:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=903724 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606057.989861] audit: type=1326 audit(1689209805.198:628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=908771 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606081.023977] audit: type=1326 audit(1689209828.234:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901681 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606081.049199] audit: type=1326 audit(1689209828.234:630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901680 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606140.480349] audit: type=1326 audit(1689209887.690:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=913100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606161.551475] audit: type=1326 audit(1689209908.758:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919744 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606199.187532] audit: type=1326 audit(1689209946.394:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=916010 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606218.913397] audit: type=1326 audit(1689209966.122:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922661 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606232.077547] audit: type=1326 audit(1689209979.282:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=923826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606380.343966] audit: type=1326 audit(1689210127.553:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922822 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606411.655428] audit: type=1326 audit(1689210158.861:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927181 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606523.891076] audit: type=1326 audit(1689210271.097:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606544.833841] audit: type=1326 audit(1689210292.041:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932874 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606553.082384] audit: type=1326 audit(1689210300.289:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=934463 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606576.113741] audit: type=1326 audit(1689210323.321:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=939578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606603.669625] audit: type=1326 audit(1689210350.877:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=918032 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606666.104511] audit: type=1326 audit(1689210413.313:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=938428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606700.273078] audit: type=1326 audit(1689210447.481:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922650 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606722.409710] audit: type=1326 audit(1689210469.617:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=944587 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606723.591484] audit: type=1326 audit(1689210470.797:646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=918004 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606726.625428] audit: type=1326 audit(1689210473.833:647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=925543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606749.842751] audit: type=1326 audit(1689210497.049:648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=945425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606774.216268] audit: type=1326 audit(1689210521.421:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606775.272993] audit: type=1326 audit(1689210522.481:650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946844 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606808.022043] audit: type=1326 audit(1689210555.229:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=942712 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606825.235825] audit: type=1326 audit(1689210572.441:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=943616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606903.854733] audit: type=1326 audit(1689210651.061:653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=951196 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606950.408866] audit: type=1326 audit(1689210697.617:654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607046.030686] audit: type=1326 audit(1689210793.237:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=955433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607082.153088] audit: type=1326 audit(1689210829.361:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=963715 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607091.177801] audit: type=1326 audit(1689210838.384:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607204.949220] audit: type=1326 audit(1689210952.160:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961511 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607214.149455] audit: type=1326 audit(1689210961.360:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958295 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607234.203101] audit: type=1326 audit(1689210981.412:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=965279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607246.591122] audit: type=1326 audit(1689210993.800:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607346.908337] audit: type=1326 audit(1689211094.116:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=968094 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607347.810535] audit: type=1326 audit(1689211095.020:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=976275 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607373.022204] audit: type=1326 audit(1689211120.232:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=977516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607377.243731] audit: type=1326 audit(1689211124.452:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=969402 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607487.048913] audit: type=1326 audit(1689211234.256:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946299 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607489.734138] audit: type=1326 audit(1689211236.944:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=977298 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607499.561410] audit: type=1326 audit(1689211246.772:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=969537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607519.191537] audit: type=1326 audit(1689211266.400:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=979626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607624.457049] audit: type=1326 audit(1689211371.664:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=985128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607631.705291] audit: type=1326 audit(1689211378.916:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=983126 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607638.204050] audit: type=1326 audit(1689211385.412:672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=979517 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607751.083724] audit: type=1326 audit(1689211498.292:673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=989206 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607766.193883] audit: type=1326 audit(1689211513.404:674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988722 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607770.820805] audit: type=1326 audit(1689211518.028:675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=972203 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607889.548013] audit: type=1326 audit(1689211636.755:676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=995356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607890.272191] audit: type=1326 audit(1689211637.479:677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984084 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607892.217788] audit: type=1326 audit(1689211639.427:678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=994449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607973.414133] audit: type=1326 audit(1689211720.623:679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2977 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607997.840992] audit: type=1326 audit(1689211745.047:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608009.823096] exe[880088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7e9858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608009.862814] exe[908958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7e9858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608009.905875] exe[880060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7a7858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608031.274871] audit: type=1326 audit(1689211778.483:681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=998191 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608034.038701] audit: type=1326 audit(1689211781.247:682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=998422 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608075.873755] audit: type=1326 audit(1689211823.083:683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992937 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608174.269361] audit: type=1326 audit(1689211921.475:684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6993 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608175.997697] audit: type=1326 audit(1689211923.203:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7295 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608317.934996] audit: type=1326 audit(1689212065.143:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16671 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608318.010584] audit: type=1326 audit(1689212065.219:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16326 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608345.573784] audit: type=1326 audit(1689212092.779:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11133 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608451.296340] audit: type=1326 audit(1689212198.503:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29829 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608460.035472] audit: type=1326 audit(1689212207.243:690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608462.176738] audit: type=1326 audit(1689212209.383:691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25141 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608503.267767] audit: type=1326 audit(1689212250.475:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=34498 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608533.390892] audit: type=1326 audit(1689212280.598:693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999989 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11608586.343765] audit: type=1326 audit(1689212333.550:694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11132 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608603.172815] audit: type=1326 audit(1689212350.378:695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608604.375648] audit: type=1326 audit(1689212351.582:696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608625.227797] audit: type=1326 audit(1689212372.434:697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=40856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608653.653041] audit: type=1326 audit(1689212400.858:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996310 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11608746.810007] audit: type=1326 audit(1689212494.014:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=40920 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608759.068622] audit: type=1326 audit(1689212506.274:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=41674 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608844.060417] audit: type=1326 audit(1689212591.266:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=47509 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608849.979155] audit: type=1326 audit(1689212597.186:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26927 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608866.192620] audit: type=1326 audit(1689212613.398:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50432 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608900.419588] audit: type=1326 audit(1689212647.626:704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=48313 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609041.941064] audit: type=1326 audit(1689212789.146:705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43723 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609043.267962] audit: type=1326 audit(1689212790.474:706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=51808 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609101.039399] exe[19846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857168ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.200826] exe[42029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857168ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.233088] exe[21925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857147ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.359654] exe[14202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857147ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609114.859756] audit: type=1326 audit(1689212862.066:707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=53392 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609136.468568] audit: type=1326 audit(1689212883.674:708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=63106 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609184.539557] audit: type=1326 audit(1689212931.746:709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=55835 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609224.389789] exe[66337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.508861] exe[66337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d6cee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.664605] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.692561] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.721718] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.758715] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.820055] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.852642] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.874621] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.926286] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609296.412170] audit: type=1326 audit(1689213043.617:710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=38807 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609346.942415] audit: type=1326 audit(1689213094.145:711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=67199 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609386.199827] audit: type=1326 audit(1689213133.405:712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=70379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609407.497500] audit: type=1326 audit(1689213154.701:713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=80674 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609489.512442] audit: type=1326 audit(1689213236.717:714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=78397 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609536.734812] audit: type=1326 audit(1689213283.937:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=44670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609540.467947] audit: type=1326 audit(1689213287.673:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=82162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609578.029249] audit: type=1326 audit(1689213325.233:717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94920 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609580.700973] audit: type=1326 audit(1689213327.905:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=95574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609630.673391] audit: type=1326 audit(1689213377.877:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87760 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609672.894466] audit: type=1326 audit(1689213420.097:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609673.764769] audit: type=1326 audit(1689213420.969:721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56076 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609682.185992] audit: type=1326 audit(1689213429.389:722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=93458 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609689.245620] audit: type=1326 audit(1689213436.449:723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=39787 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609704.620136] audit: type=1326 audit(1689213451.825:724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103151 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609718.303851] audit: type=1326 audit(1689213465.509:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=104879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609732.024113] audit: type=1326 audit(1689213479.229:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609746.654594] audit: type=1326 audit(1689213493.857:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=99508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609891.802556] audit: type=1326 audit(1689213639.005:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=107746 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609980.959613] audit: type=1326 audit(1689213728.164:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=111400 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610037.921958] warn_bad_vsyscall: 57 callbacks suppressed [11610037.921961] exe[104886] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cf1f3e40a cs:33 sp:7f9740193ee8 ax:12 si:ffffffffff600000 di:557cf1faaff2 [11610091.078793] audit: type=1326 audit(1689213838.284:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=114972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610124.942162] audit: type=1326 audit(1689213872.148:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=115939 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610177.285395] audit: type=1326 audit(1689213924.492:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=102441 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610193.441605] audit: type=1326 audit(1689213940.648:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=96416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610225.810101] audit: type=1326 audit(1689213973.016:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=123167 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610233.553409] audit: type=1326 audit(1689213980.760:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=121916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610256.024194] audit: type=1326 audit(1689214003.232:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128638 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610300.269297] audit: type=1326 audit(1689214047.476:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76644 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610367.800104] audit: type=1326 audit(1689214115.008:738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128262 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610392.269170] audit: type=1326 audit(1689214139.476:739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=129506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610463.704357] audit: type=1326 audit(1689214210.912:740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=96544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610509.525530] audit: type=1326 audit(1689214256.732:741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=133363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610534.233051] audit: type=1326 audit(1689214281.440:742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=134147 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610535.552490] audit: type=1326 audit(1689214282.760:743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=102360 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610558.818901] audit: type=1326 audit(1689214306.024:744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138968 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610563.001154] audit: type=1326 audit(1689214310.208:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=125930 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610652.067752] audit: type=1326 audit(1689214399.272:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=137958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610675.976391] audit: type=1326 audit(1689214423.180:747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138768 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610794.201252] audit: type=1326 audit(1689214541.407:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146110 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610817.416788] audit: type=1326 audit(1689214564.623:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=147787 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610824.164743] audit: type=1326 audit(1689214571.371:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=132652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610917.045624] audit: type=1326 audit(1689214664.247:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=155879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610935.100843] audit: type=1326 audit(1689214682.307:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=154665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610957.386648] audit: type=1326 audit(1689214704.591:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=160285 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611044.973755] audit: type=1326 audit(1689214792.179:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=104427 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611052.355082] exe[161359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.396817] exe[161402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.417215] exe[161406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.458817] exe[161406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9dd858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611057.686547] audit: type=1326 audit(1689214804.891:755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=159476 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611080.561894] audit: type=1326 audit(1689214827.767:756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611091.751769] audit: type=1326 audit(1689214838.955:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=163210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611106.510657] audit: type=1326 audit(1689214853.715:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164175 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611206.621679] audit: type=1326 audit(1689214953.827:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162899 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611226.105804] audit: type=1326 audit(1689214973.311:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=157532 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11611328.860902] audit: type=1326 audit(1689215076.067:761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=136219 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611349.685728] audit: type=1326 audit(1689215096.891:762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166089 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611355.989960] audit: type=1326 audit(1689215103.195:763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166685 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611470.897001] exe[173131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611470.982692] exe[172685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611471.068495] exe[172788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611491.624312] audit: type=1326 audit(1689215238.826:764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=171348 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611498.281194] audit: type=1326 audit(1689215245.486:765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=171656 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611545.887586] audit: type=1326 audit(1689215293.090:766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=140912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611556.965422] audit: type=1326 audit(1689215304.170:767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11611636.098091] audit: type=1326 audit(1689215383.302:768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611641.171130] audit: type=1326 audit(1689215388.374:769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176464 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611712.598686] audit: type=1326 audit(1689215459.802:770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611779.405216] audit: type=1326 audit(1689215526.606:771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=183629 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611784.275845] audit: type=1326 audit(1689215531.478:772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=184164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611807.175705] audit: type=1326 audit(1689215554.378:773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=139924 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611845.278909] exe[175719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.131823] exe[175495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.132343] exe[62220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d6cee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.255247] exe[192224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611865.951902] exe[193267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96258cee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611866.843870] exe[194427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96254aee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611866.849440] exe[193278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96256bee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611867.684536] exe[193231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96256bee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611867.685047] exe[193276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96254aee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611923.773068] audit: type=1326 audit(1689215670.974:774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611927.131634] audit: type=1326 audit(1689215674.334:775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192265 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611946.855512] audit: type=1326 audit(1689215694.058:776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=199407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612069.445142] audit: type=1326 audit(1689215816.646:777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=199539 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612092.184084] audit: type=1326 audit(1689215839.386:778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205940 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612109.628298] audit: type=1326 audit(1689215856.830:779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=167586 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612169.655524] audit: type=1326 audit(1689215916.857:780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=179867 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612196.158283] audit: type=1326 audit(1689215943.361:781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612321.757529] audit: type=1326 audit(1689216068.961:782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181741 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612338.198911] audit: type=1326 audit(1689216085.401:783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210033 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612341.930437] audit: type=1326 audit(1689216089.133:784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210184 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612480.723412] audit: type=1326 audit(1689216227.925:785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612484.182272] audit: type=1326 audit(1689216231.385:786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215515 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612623.704171] audit: type=1326 audit(1689216370.905:787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612627.491761] audit: type=1326 audit(1689216374.693:788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219947 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612650.811661] audit: type=1326 audit(1689216398.017:789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=222663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612725.881937] audit: type=1326 audit(1689216473.081:790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215502 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612768.073479] audit: type=1326 audit(1689216515.273:791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=222552 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612911.907957] exe[230755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55784c9cc40a cs:33 sp:7f8d98f46ee8 ax:12 si:ffffffffff600000 di:55784ca38ff2 [11612912.026179] audit: type=1326 audit(1689216659.232:792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=229411 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612928.029305] audit: type=1326 audit(1689216675.232:793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=228871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612933.884371] audit: type=1326 audit(1689216681.088:794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=237418 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613007.977947] audit: type=1326 audit(1689216755.180:795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242949 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613034.707467] exe[210137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed66be340a cs:33 sp:7fd40805cee8 ax:12 si:ffffffffff600000 di:55ed66c4fff2 [11613067.683364] audit: type=1326 audit(1689216814.888:796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=238399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613090.757129] audit: type=1326 audit(1689216837.960:797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=246266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613156.842452] audit: type=1326 audit(1689216904.048:798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162031 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613176.892347] audit: type=1326 audit(1689216924.096:799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=187836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613225.327240] audit: type=1326 audit(1689216972.532:800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=246495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613257.820594] audit: type=1326 audit(1689217005.024:801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248201 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613259.764460] exe[113089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613259.896766] exe[129485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613259.994509] exe[113108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613260.035649] exe[167068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613367.064209] audit: type=1326 audit(1689217114.268:802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=257164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613389.920266] audit: type=1326 audit(1689217137.124:803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=265247 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613400.171681] audit: type=1326 audit(1689217147.376:804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=261413 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613423.461311] audit: type=1326 audit(1689217170.664:805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=267746 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613556.820936] audit: type=1326 audit(1689217304.024:806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=269567 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613639.322076] audit: type=1326 audit(1689217386.523:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=271970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613662.359245] audit: type=1326 audit(1689217409.563:808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=279508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613699.545408] audit: type=1326 audit(1689217446.747:809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=274933 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613729.742873] audit: type=1326 audit(1689217476.947:810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=227591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11613758.457839] audit: type=1326 audit(1689217505.659:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=208877 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613841.828755] audit: type=1326 audit(1689217589.031:812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613865.039411] audit: type=1326 audit(1689217612.243:813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=285941 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613909.215817] exe[280649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613909.285023] exe[281621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613910.102687] exe[280647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613911.927175] audit: type=1326 audit(1689217659.131:814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=283958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613926.880021] audit: type=1326 audit(1689217674.083:815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=250982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613951.214334] audit: type=1326 audit(1689217698.415:816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=287791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613994.384142] audit: type=1326 audit(1689217741.587:817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=289847 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614054.357636] audit: type=1326 audit(1689217801.559:818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=287127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614197.565657] audit: type=1326 audit(1689217944.767:819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=293965 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614243.930801] audit: type=1326 audit(1689217991.131:820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295865 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614340.962187] audit: type=1326 audit(1689218088.162:821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=300981 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614378.700022] audit: type=1326 audit(1689218125.902:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=302653 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614436.168021] audit: type=1326 audit(1689218183.370:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=306526 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614488.028688] audit: type=1326 audit(1689218235.230:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=311362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614531.437813] audit: type=1326 audit(1689218278.638:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=313198 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614546.864834] audit: type=1326 audit(1689218294.066:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=319188 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614567.377282] audit: type=1326 audit(1689218314.578:827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=299618 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614623.636542] audit: type=1326 audit(1689218370.838:828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=315967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614629.720322] audit: type=1326 audit(1689218376.922:829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=316747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614697.032081] audit: type=1326 audit(1689218444.234:830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=319591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614708.565361] audit: type=1326 audit(1689218455.766:831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=321370 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614725.059201] audit: type=1326 audit(1689218472.258:832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614725.083797] audit: type=1326 audit(1689218472.270:833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323371 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614763.316197] audit: type=1326 audit(1689218510.518:834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614783.657848] audit: type=1326 audit(1689218530.858:835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=329235 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614825.377379] audit: type=1326 audit(1689218572.578:836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614825.954441] audit: type=1326 audit(1689218573.154:837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614826.473984] audit: type=1326 audit(1689218573.674:838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331273 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614849.192210] audit: type=1326 audit(1689218596.394:839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=347434 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614869.432839] audit: type=1326 audit(1689218616.634:840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=339235 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614904.547842] audit: type=1326 audit(1689218651.746:841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=347437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614919.904813] audit: type=1326 audit(1689218667.106:842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344659 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614989.331061] audit: type=1326 audit(1689218736.530:843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=339164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615026.778194] audit: type=1326 audit(1689218773.978:844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615046.792010] audit: type=1326 audit(1689218793.989:845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=353766 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615075.957721] audit: type=1326 audit(1689218823.157:846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=355648 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615092.070251] audit: type=1326 audit(1689218839.269:847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=356959 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615105.006673] audit: type=1326 audit(1689218852.205:848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=338914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615115.088959] audit: type=1326 audit(1689218862.289:849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=374087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615140.436699] audit: type=1326 audit(1689218887.637:850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=379563 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615189.321653] audit: type=1326 audit(1689218936.521:851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=369018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615249.883397] audit: type=1326 audit(1689218997.081:852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=377300 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615278.181181] audit: type=1326 audit(1689219025.381:853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=365614 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615285.687507] audit: type=1326 audit(1689219032.885:854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383294 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615334.361923] audit: type=1326 audit(1689219081.561:855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=386918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615358.021042] audit: type=1326 audit(1689219105.221:856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=397046 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615372.830891] audit: type=1326 audit(1689219120.029:857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349834 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615392.629913] audit: type=1326 audit(1689219139.829:858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=391869 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615418.819110] audit: type=1326 audit(1689219166.017:859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615534.998711] audit: type=1326 audit(1689219282.197:860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=400105 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615536.639688] audit: type=1326 audit(1689219283.837:861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=400210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615572.252941] audit: type=1326 audit(1689219319.453:862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=407652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615572.566380] audit: type=1326 audit(1689219319.765:863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=402658 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615607.239874] audit: type=1326 audit(1689219354.437:864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=404197 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615682.174935] audit: type=1326 audit(1689219429.373:865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=395486 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615749.676438] audit: type=1326 audit(1689219496.873:866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=409554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615772.856758] audit: type=1326 audit(1689219520.056:867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=415966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615782.603424] audit: type=1326 audit(1689219529.800:868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=393960 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615837.996675] audit: type=1326 audit(1689219585.196:869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414088 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615855.905148] audit: type=1326 audit(1689219603.108:870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414742 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615855.959406] audit: type=1326 audit(1689219603.160:871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414743 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615907.170690] audit: type=1326 audit(1689219654.372:872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=416210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616016.968741] audit: type=1326 audit(1689219764.168:873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=419234 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616018.174727] audit: type=1326 audit(1689219765.376:874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=419205 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616049.790873] audit: type=1326 audit(1689219796.992:875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420016 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616179.467941] audit: type=1326 audit(1689219926.668:876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423482 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616180.555813] audit: type=1326 audit(1689219927.756:877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616192.430465] audit: type=1326 audit(1689219939.632:878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616204.730256] audit: type=1326 audit(1689219951.932:879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426323 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616215.467880] audit: type=1326 audit(1689219962.668:880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426686 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616342.057416] audit: type=1326 audit(1689220089.260:881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616344.197343] audit: type=1326 audit(1689220091.400:882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=427038 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616349.922513] audit: type=1326 audit(1689220097.124:883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=427482 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616463.003124] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117536ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.155216] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec1174f4ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.334664] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.365978] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.395492] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.434812] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.469559] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.499013] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.528098] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.559286] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.856088] audit: type=1326 audit(1689220211.056:884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433896 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616468.036730] warn_bad_vsyscall: 56 callbacks suppressed [11616468.036733] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.143022] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.346868] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.476775] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.602391] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.747206] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.905526] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.069465] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.228264] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.373763] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616478.212932] audit: type=1326 audit(1689220225.412:885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=399179 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616486.892502] audit: type=1326 audit(1689220234.092:886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437011 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616504.636883] audit: type=1326 audit(1689220251.835:887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434647 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616506.387296] audit: type=1326 audit(1689220253.587:888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434742 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616618.325394] audit: type=1326 audit(1689220365.523:889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616624.272672] audit: type=1326 audit(1689220371.471:890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426766 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616641.156448] audit: type=1326 audit(1689220388.355:891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616646.887273] audit: type=1326 audit(1689220394.087:892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=416646 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616669.130945] audit: type=1326 audit(1689220416.331:893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=439543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616671.357319] audit: type=1326 audit(1689220418.555:894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=439483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616685.822247] audit: type=1326 audit(1689220433.023:895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426318 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616727.733883] warn_bad_vsyscall: 14 callbacks suppressed [11616727.733887] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616727.854758] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616727.896011] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.024074] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.060517] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.174456] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.285948] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.286187] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.433658] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.542871] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.745666] warn_bad_vsyscall: 149 callbacks suppressed [11616732.745670] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.778992] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.807892] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.837387] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.866886] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.895047] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.005828] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.156311] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.302872] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.344866] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616737.937508] warn_bad_vsyscall: 156 callbacks suppressed [11616737.937511] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616737.978420] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.107496] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.221153] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.332316] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.371403] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.516981] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.646772] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.793750] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.925501] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616742.938460] warn_bad_vsyscall: 95 callbacks suppressed [11616742.938463] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.139113] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.249995] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.287426] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.799359] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.961896] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.123243] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a32ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.277308] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.579977] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.680400] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.059194] warn_bad_vsyscall: 179 callbacks suppressed [11616748.059198] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.099340] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.218641] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.353244] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.514493] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.675188] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.816625] exe[376189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616748.957631] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616749.061746] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616749.178713] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.071882] warn_bad_vsyscall: 129 callbacks suppressed [11616753.071903] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.188917] exe[376189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.305604] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.308145] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.434246] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.463792] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.573550] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.690786] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.948656] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616754.057794] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.088841] warn_bad_vsyscall: 69 callbacks suppressed [11616758.088845] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.198407] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.325846] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.452371] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.611864] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.848362] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.023674] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.223697] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.378129] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.414350] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.247975] warn_bad_vsyscall: 67 callbacks suppressed [11616763.247978] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.379531] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.506568] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.576974] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.712296] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.868809] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.012072] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.044986] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.075153] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.105612] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.632673] warn_bad_vsyscall: 72 callbacks suppressed [11616768.632677] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.764563] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.797201] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.945297] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.977094] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.105815] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.219603] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.319274] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.446879] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.586043] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.407661] warn_bad_vsyscall: 20 callbacks suppressed [11616774.407665] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.443917] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.480792] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.515412] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.549287] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.577325] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.615687] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.650789] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.680564] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.712742] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616779.732922] warn_bad_vsyscall: 59 callbacks suppressed [11616779.732927] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616779.873482] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.015511] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.144019] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.148245] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.292227] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.408584] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.554021] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.587092] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a32ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.707671] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616831.354738] audit: type=1326 audit(1689220578.555:896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444247 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616849.536866] audit: type=1326 audit(1689220596.735:897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616891.400048] audit: type=1326 audit(1689220638.599:898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=445340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616955.867342] audit: type=1326 audit(1689220703.067:899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616993.610115] audit: type=1326 audit(1689220740.811:900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=448725 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617027.425260] warn_bad_vsyscall: 1 callbacks suppressed [11617027.425263] exe[423335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559734aa5839 cs:33 sp:7f1166de5ee8 ax:0 si:20000240 di:ffffffffff600000 [11617031.423364] audit: type=1326 audit(1689220778.623:901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442960 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617034.068901] audit: type=1326 audit(1689220781.267:902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=450336 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617036.395177] exe[403877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2071a9839 cs:33 sp:7f1205849ee8 ax:0 si:20000240 di:ffffffffff600000 [11617110.112230] exe[450940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563710d72839 cs:33 sp:7fb6768c9ee8 ax:0 si:20000240 di:ffffffffff600000 [11617120.897024] audit: type=1326 audit(1689220868.095:903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=452760 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617155.771686] audit: type=1326 audit(1689220902.971:904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453418 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617163.858912] audit: type=1326 audit(1689220911.059:905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=456904 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617173.909893] audit: type=1326 audit(1689220921.107:906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=359483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617177.166434] audit: type=1326 audit(1689220924.363:907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453803 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617199.530594] audit: type=1326 audit(1689220946.731:908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458135 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617242.071168] exe[456653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d54535f839 cs:33 sp:7fddbdecbee8 ax:0 si:20000240 di:ffffffffff600000 [11617242.806185] exe[452415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f7ccdb9839 cs:33 sp:7f37b6bf9ee8 ax:0 si:20000240 di:ffffffffff600000 [11617285.999616] exe[453136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55772e5b8839 cs:33 sp:7ea5ab3feee8 ax:0 si:20000240 di:ffffffffff600000 [11617310.725595] exe[352485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564403af1839 cs:33 sp:7fe27b9feee8 ax:0 si:20000240 di:ffffffffff600000 [11617320.633665] audit: type=1326 audit(1689221067.830:909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617333.963647] audit: type=1326 audit(1689221081.162:910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617344.534053] exe[456677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b6142f839 cs:33 sp:7fcfb7eebee8 ax:0 si:20000240 di:ffffffffff600000 [11617407.485335] audit: type=1326 audit(1689221154.682:911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=462220 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617407.510562] audit: type=1326 audit(1689221154.682:912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=462220 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617450.603853] audit: type=1326 audit(1689221197.802:913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444772 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617458.156564] exe[464010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55932fcf1839 cs:33 sp:7fadc19c2ee8 ax:0 si:20000240 di:ffffffffff600000 [11617470.363479] exe[373491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56224fbf2839 cs:33 sp:7f9f309ccee8 ax:0 si:20000240 di:ffffffffff600000 [11617473.971610] audit: type=1326 audit(1689221221.170:914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=448685 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617475.605465] exe[461182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796b1a858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617475.707828] exe[462051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796ad8858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617475.818558] exe[462052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796ad8858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617485.057212] audit: type=1326 audit(1689221232.254:915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463642 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617570.056481] audit: type=1326 audit(1689221317.254:916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=465697 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617597.277555] audit: type=1326 audit(1689221344.474:917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617616.134916] exe[368535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b36f85f839 cs:33 sp:7ecb96446ee8 ax:0 si:20000240 di:ffffffffff600000 [11617648.439900] audit: type=1326 audit(1689221395.638:918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=467841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617678.970527] audit: type=1326 audit(1689221426.166:919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=457982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617700.643689] audit: type=1326 audit(1689221447.842:920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=470993 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617732.017925] audit: type=1326 audit(1689221479.214:921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=469314 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617738.589958] audit: type=1326 audit(1689221485.786:922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=466971 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617740.351068] audit: type=1326 audit(1689221487.550:923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=469544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617792.775079] exe[470535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93a6ea839 cs:33 sp:7ea8e19feee8 ax:0 si:20000240 di:ffffffffff600000 [11617809.463896] audit: type=1326 audit(1689221556.662:924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=470733 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617812.958637] exe[473479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578a49e9839 cs:33 sp:7f4af18abee8 ax:0 si:20000240 di:ffffffffff600000 [11617850.443757] audit: type=1326 audit(1689221597.642:925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476094 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617882.299739] audit: type=1326 audit(1689221629.498:926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=472723 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617893.147005] audit: type=1326 audit(1689221640.346:927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=473353 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617934.186694] audit: type=1326 audit(1689221681.382:928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617983.641154] audit: type=1326 audit(1689221730.833:929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476496 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618007.754035] exe[479109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bc7088839 cs:33 sp:7f115bb4aee8 ax:0 si:20000240 di:ffffffffff600000 [11618023.408403] exe[477266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618023.501534] exe[471958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618023.601684] exe[471707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618024.400520] audit: type=1326 audit(1689221771.597:930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=477359 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618074.174434] audit: type=1326 audit(1689221821.369:931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618146.086115] audit: type=1326 audit(1689221893.281:932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=480365 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618165.619972] audit: type=1326 audit(1689221912.817:933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=482007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618235.009828] audit: type=1326 audit(1689221982.205:934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437493 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618235.035898] audit: type=1326 audit(1689221982.233:935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=485075 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618257.120281] audit: type=1326 audit(1689222004.317:936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488337 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618306.553982] audit: type=1326 audit(1689222053.749:937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=486520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618309.160749] audit: type=1326 audit(1689222056.357:938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=486567 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618328.009567] audit: type=1326 audit(1689222075.205:939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=491196 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618396.215364] audit: type=1326 audit(1689222143.413:940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618458.057109] audit: type=1326 audit(1689222205.253:941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618471.167306] audit: type=1326 audit(1689222218.365:942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493625 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618558.971085] audit: type=1326 audit(1689222306.165:943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=498306 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618599.005616] audit: type=1326 audit(1689222346.201:944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=500998 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618614.605767] audit: type=1326 audit(1689222361.801:945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=471350 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618616.160870] audit: type=1326 audit(1689222363.357:946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453695 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618632.621352] audit: type=1326 audit(1689222379.817:947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=502952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618740.688253] audit: type=1326 audit(1689222487.888:948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511011 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618794.782232] audit: type=1326 audit(1689222541.980:949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=516208 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618828.244900] audit: type=1326 audit(1689222575.444:950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442795 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618883.250327] audit: type=1326 audit(1689222630.448:951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=527662 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618905.654237] audit: type=1326 audit(1689222652.852:952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=539741 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618955.994306] audit: type=1326 audit(1689222703.192:953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618991.070845] audit: type=1326 audit(1689222738.268:954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538243 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618995.914657] exe[531498] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae92ee8 ax:0 si:20000500 di:ffffffffff600000 [11618996.576485] exe[545055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae71ee8 ax:0 si:20000500 di:ffffffffff600000 [11618996.698654] exe[515605] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae71ee8 ax:0 si:20000500 di:ffffffffff600000 [11618998.466088] audit: type=1326 audit(1689222745.664:955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=545946 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619039.105891] audit: type=1326 audit(1689222786.304:956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=540251 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619081.481628] audit: type=1326 audit(1689222828.680:957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=472579 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619132.788973] audit: type=1326 audit(1689222879.988:958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=546430 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619169.205197] audit: type=1326 audit(1689222916.404:959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552581 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619181.529368] audit: type=1326 audit(1689222928.728:960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=548478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619204.740432] audit: type=1326 audit(1689222951.940:961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=554938 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619231.628546] audit: type=1326 audit(1689222978.828:962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619294.278304] audit: type=1326 audit(1689223041.476:963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=466747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619302.932977] audit: type=1326 audit(1689223050.132:964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=553420 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619324.619811] audit: type=1326 audit(1689223071.816:965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619336.253946] audit: type=1326 audit(1689223083.452:966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560808 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619398.879385] exe[536155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619398.939422] exe[516375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619398.982844] exe[535671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619453.791031] audit: type=1326 audit(1689223200.987:967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619465.706772] audit: type=1326 audit(1689223212.903:968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=550448 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619487.423938] exe[566400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563c4858 ax:0 si:55deab481062 di:ffffffffff600000 [11619487.482399] exe[562461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563a3858 ax:0 si:55deab481062 di:ffffffffff600000 [11619487.528570] exe[563319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563a3858 ax:0 si:55deab481062 di:ffffffffff600000 [11619585.499945] audit: type=1326 audit(1689223332.695:969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=565379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619596.902218] audit: type=1326 audit(1689223344.099:970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=565827 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619607.979102] audit: type=1326 audit(1689223355.175:971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=571806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619689.631929] audit: type=1326 audit(1689223436.827:972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=572275 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619831.695309] audit: type=1326 audit(1689223578.891:973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=575570 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619856.886854] audit: type=1326 audit(1689223604.083:974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=577025 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619974.006322] audit: type=1326 audit(1689223721.203:975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=579928 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620035.655078] audit: type=1326 audit(1689223782.851:976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=581361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620114.896040] audit: type=1326 audit(1689223862.090:977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=547279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11620115.147632] audit: type=1326 audit(1689223862.342:978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585834 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620215.428928] exe[578382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620215.470748] exe[578378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620215.508820] exe[545514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620227.851853] audit: type=1326 audit(1689223975.046:979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=588747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620256.627986] audit: type=1326 audit(1689224003.822:980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=591341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620370.738511] audit: type=1326 audit(1689224117.934:981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=595623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620399.160346] audit: type=1326 audit(1689224146.354:982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=596641 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620513.054444] audit: type=1326 audit(1689224260.250:983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599303 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620514.934894] audit: type=1326 audit(1689224262.130:984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=600527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620580.941265] audit: type=1326 audit(1689224328.134:985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=557075 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620643.919662] audit: type=1326 audit(1689224391.114:986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620654.467678] audit: type=1326 audit(1689224401.662:987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602612 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620678.185533] audit: type=1326 audit(1689224425.382:988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620753.378385] audit: type=1326 audit(1689224500.574:989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606613 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620775.839985] audit: type=1326 audit(1689224523.034:990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620787.380160] audit: type=1326 audit(1689224534.574:991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606348 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620878.192117] audit: type=1326 audit(1689224625.385:992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=593770 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11620910.511245] audit: type=1326 audit(1689224657.705:993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620929.852560] audit: type=1326 audit(1689224677.045:994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=611154 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620952.654833] audit: type=1326 audit(1689224699.849:995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=615888 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620975.728228] exe[616067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11620975.809466] exe[616334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11620975.900989] exe[616113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11621052.917706] audit: type=1326 audit(1689224800.113:996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614987 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621080.863296] audit: type=1326 audit(1689224828.057:997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=566561 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621086.905149] audit: type=1326 audit(1689224834.097:998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616503 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621093.759891] audit: type=1326 audit(1689224840.953:999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604697 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621116.237723] audit: type=1326 audit(1689224863.429:1000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620684 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621196.426285] audit: type=1326 audit(1689224943.621:1001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=619071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621228.541993] audit: type=1326 audit(1689224975.737:1002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621254.426277] audit: type=1326 audit(1689225001.621:1003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=625916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621296.541965] audit: type=1326 audit(1689225043.737:1004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621338.665441] audit: type=1326 audit(1689225085.857:1005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=624649 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621388.698603] audit: type=1326 audit(1689225135.893:1006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=626245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621531.083825] audit: type=1326 audit(1689225278.277:1007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621601.363569] audit: type=1326 audit(1689225348.560:1008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=629565 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621641.234574] audit: type=1326 audit(1689225388.432:1009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=635600 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621743.423222] audit: type=1326 audit(1689225490.620:1010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=637147 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621783.864792] audit: type=1326 audit(1689225531.060:1011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=638357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621809.898362] audit: type=1326 audit(1689225557.092:1012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11621826.174675] audit: type=1326 audit(1689225573.372:1013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620203 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621885.405910] audit: type=1326 audit(1689225632.600:1014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=645644 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621926.533008] audit: type=1326 audit(1689225673.728:1015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652011 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621949.459338] audit: type=1326 audit(1689225696.656:1016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=662571 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11621949.730129] audit: type=1326 audit(1689225696.924:1017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=662605 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11622002.580862] audit: type=1326 audit(1689225749.776:1018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11622027.131721] audit: type=1326 audit(1689225774.328:1019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=655663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622069.015849] audit: type=1326 audit(1689225816.212:1020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=662354 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622089.768391] audit: type=1326 audit(1689225836.964:1021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=653611 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622168.625168] audit: type=1326 audit(1689225915.820:1022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=670119 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622169.672061] audit: type=1326 audit(1689225916.868:1023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=676306 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622191.522526] audit: type=1326 audit(1689225938.716:1024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682767 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622312.206917] audit: type=1326 audit(1689226059.399:1025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622325.849714] audit: type=1326 audit(1689226073.043:1026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=683978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622348.404390] audit: type=1326 audit(1689226095.599:1027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=701496 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622362.583610] audit: type=1326 audit(1689226109.779:1028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=704093 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622455.088113] audit: type=1326 audit(1689226202.283:1029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=700283 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622466.935089] audit: type=1326 audit(1689226214.127:1030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=705187 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622477.541452] audit: type=1326 audit(1689226224.735:1031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710134 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622557.455601] audit: type=1326 audit(1689226304.651:1032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=607978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622607.655309] audit: type=1326 audit(1689226354.851:1033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=717863 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622608.716470] audit: type=1326 audit(1689226355.911:1034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710766 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622691.701380] audit: type=1326 audit(1689226438.895:1035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=621731 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622713.800154] audit: type=1326 audit(1689226460.995:1036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=677619 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622751.328494] audit: type=1326 audit(1689226498.523:1037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=718888 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622762.643571] audit: type=1326 audit(1689226509.839:1038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=727402 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622857.536823] audit: type=1326 audit(1689226604.731:1039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=724188 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622886.710765] audit: type=1326 audit(1689226633.903:1040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=669577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11622895.764400] audit: type=1326 audit(1689226642.959:1041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=727948 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622897.145368] audit: type=1326 audit(1689226644.339:1042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=728115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622929.466357] audit: type=1326 audit(1689226676.659:1043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735287 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11622956.410483] audit: type=1326 audit(1689226703.603:1044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=722520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622978.960508] audit: type=1326 audit(1689226726.155:1045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=738227 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623001.003074] audit: type=1326 audit(1689226748.195:1046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=732248 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623039.810310] audit: type=1326 audit(1689226787.002:1047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=734521 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623143.007157] audit: type=1326 audit(1689226890.198:1048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=739865 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623181.887500] audit: type=1326 audit(1689226929.078:1049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=741553 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623285.059938] audit: type=1326 audit(1689227032.254:1050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=745101 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623305.303399] audit: type=1326 audit(1689227052.494:1051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=736691 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11623325.244781] audit: type=1326 audit(1689227072.438:1052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=747270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623428.088017] audit: type=1326 audit(1689227175.282:1053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=752283 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623463.547698] audit: type=1326 audit(1689227210.738:1054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=754498 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623474.427571] audit: type=1326 audit(1689227221.618:1055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=738468 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623495.937493] audit: type=1326 audit(1689227243.130:1056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=761376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623568.906516] audit: type=1326 audit(1689227316.098:1057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=758566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623595.832182] exe[730275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c07ac44b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:85000 [11623595.961141] exe[644712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c07ac44b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:85000 [11623596.000996] exe[652865] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c07ac44b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:85000 [11623596.743131] exe[637295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c07ac44b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:85000 [11623604.447949] audit: type=1326 audit(1689227351.638:1058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=760384 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623658.555316] audit: type=1326 audit(1689227405.746:1059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560888 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11623710.394610] audit: type=1326 audit(1689227457.586:1060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764275 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623726.609203] audit: type=1326 audit(1689227473.801:1061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=766143 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623747.678166] audit: type=1326 audit(1689227494.869:1062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=770150 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623851.594772] audit: type=1326 audit(1689227598.785:1063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=769254 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623880.762779] audit: type=1326 audit(1689227627.953:1064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=770395 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623966.702688] audit: type=1326 audit(1689227713.893:1065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772847 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624021.714876] audit: type=1326 audit(1689227768.905:1066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=773928 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624107.271418] audit: type=1326 audit(1689227854.461:1067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=776320 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624163.256303] audit: type=1326 audit(1689227910.445:1068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=778098 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624190.491756] audit: type=1326 audit(1689227937.681:1069): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=780487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624190.516497] audit: type=1326 audit(1689227937.681:1070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=780487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624304.302834] audit: type=1326 audit(1689228051.493:1071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=781625 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624308.164373] audit: type=1326 audit(1689228055.353:1072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=754509 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11624331.516421] audit: type=1326 audit(1689228078.705:1073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=782698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624445.669622] audit: type=1326 audit(1689228192.861:1074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=785440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624473.221794] audit: type=1326 audit(1689228220.412:1075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=786791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624555.592591] exe[793350] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104af6ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624555.750660] exe[793763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104af6ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624555.917923] exe[794368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624555.959425] exe[792613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624555.991400] exe[792445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624556.018684] exe[792445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624556.046809] exe[792445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624556.077658] exe[792445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624556.109453] exe[794436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624556.141961] exe[792456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624587.760151] audit: type=1326 audit(1689228334.952:1076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=791612 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624614.813722] audit: type=1326 audit(1689228362.008:1077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=792821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624618.861142] warn_bad_vsyscall: 25 callbacks suppressed [11624618.861146] exe[794214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951732ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624618.991086] exe[784251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.109805] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.131399] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.152622] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.173362] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.193902] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.214545] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.235685] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.256595] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624732.224293] audit: type=1326 audit(1689228479.416:1078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=794869 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624753.931616] audit: type=1326 audit(1689228501.124:1079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624758.040439] audit: type=1326 audit(1689228505.232:1080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=795639 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624767.348557] audit: type=1326 audit(1689228514.540:1081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624833.344804] warn_bad_vsyscall: 25 callbacks suppressed [11624833.344807] exe[800273] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e926cfc839 cs:33 sp:7f78a7943858 ax:0 si:55e926d55070 di:ffffffffff600000 [11624833.429199] exe[800476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e926cfc839 cs:33 sp:7f78a7943858 ax:0 si:55e926d55070 di:ffffffffff600000 [11624833.462524] exe[800159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e926cfc839 cs:33 sp:7f78a7922858 ax:0 si:55e926d55070 di:ffffffffff600000 [11624833.541509] exe[800004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e926cfc839 cs:33 sp:7f78a7943858 ax:0 si:55e926d55070 di:ffffffffff600000 [11624833.578722] exe[800004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e926cfc839 cs:33 sp:7f78a7922858 ax:0 si:55e926d55070 di:ffffffffff600000 [11624899.299493] audit: type=1326 audit(1689228646.492:1082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798894 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625016.749456] audit: type=1326 audit(1689228763.944:1083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=801453 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625040.759280] audit: type=1326 audit(1689228787.952:1084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=802295 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625158.624329] audit: type=1326 audit(1689228905.816:1085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=806217 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625180.785519] audit: type=1326 audit(1689228927.975:1086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625183.324190] audit: type=1326 audit(1689228930.515:1087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=807481 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625274.601942] audit: type=1326 audit(1689229021.795:1088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625274.626774] audit: type=1326 audit(1689229021.795:1089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625314.783822] audit: type=1326 audit(1689229061.975:1090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625416.747406] audit: type=1326 audit(1689229163.939:1091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=814251 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625456.396419] audit: type=1326 audit(1689229203.587:1092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=815492 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625478.400977] audit: type=1326 audit(1689229225.591:1093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=819367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625559.615083] audit: type=1326 audit(1689229306.807:1094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=818268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625581.523653] audit: type=1326 audit(1689229328.715:1095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824092 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625595.643023] audit: type=1326 audit(1689229342.835:1096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824605 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625608.211350] audit: type=1326 audit(1689229355.403:1097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=825162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625619.033525] audit: type=1326 audit(1689229366.223:1098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=825508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625632.774332] audit: type=1326 audit(1689229379.967:1099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=826762 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625647.248629] audit: type=1326 audit(1689229394.439:1100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=827431 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625647.274488] audit: type=1326 audit(1689229394.439:1101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=827431 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625691.645735] exe[759702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a9e17d839 cs:33 sp:7f1fbd892ee8 ax:0 si:20000140 di:ffffffffff600000 [11625691.722394] exe[759702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a9e17d839 cs:33 sp:7f1fbd892ee8 ax:0 si:20000140 di:ffffffffff600000 [11625691.788927] exe[759679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a9e17d839 cs:33 sp:7f1fbd871ee8 ax:0 si:20000140 di:ffffffffff600000 [11625693.603423] exe[805730] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557d2f3f839 cs:33 sp:7f3992dc3ee8 ax:0 si:20000140 di:ffffffffff600000 [11625693.659667] exe[777097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557d2f3f839 cs:33 sp:7f3992dc3ee8 ax:0 si:20000140 di:ffffffffff600000 [11625693.711809] exe[759699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557d2f3f839 cs:33 sp:7f3992dc3ee8 ax:0 si:20000140 di:ffffffffff600000 [11625693.768562] exe[762237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557d2f3f839 cs:33 sp:7f3992dc3ee8 ax:0 si:20000140 di:ffffffffff600000 [11625693.823356] exe[760291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557d2f3f839 cs:33 sp:7f3992dc3ee8 ax:0 si:20000140 di:ffffffffff600000 [11625725.681681] exe[830444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603ec851839 cs:33 sp:7fb485284ee8 ax:0 si:20002140 di:ffffffffff600000 [11625725.785481] exe[831134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603ec851839 cs:33 sp:7fb485263ee8 ax:0 si:20002140 di:ffffffffff600000 [11625725.787596] exe[831141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603ec851839 cs:33 sp:7fb485242ee8 ax:0 si:20002140 di:ffffffffff600000 [11625725.901955] exe[830351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603ec851839 cs:33 sp:7fb485242ee8 ax:0 si:20002140 di:ffffffffff600000 [11625728.991542] audit: type=1326 audit(1689229476.183:1102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=825245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625749.908122] audit: type=1326 audit(1689229497.099:1103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=831791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625780.587397] audit: type=1326 audit(1689229527.779:1104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=828014 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625923.389938] audit: type=1326 audit(1689229670.578:1105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=835161 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625999.663124] audit: type=1326 audit(1689229746.854:1106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=842077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626029.740163] audit: type=1326 audit(1689229776.930:1107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=768381 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11626030.055739] audit: type=1326 audit(1689229777.246:1108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=762300 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626053.289519] audit: type=1326 audit(1689229800.478:1109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=856967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626060.094477] audit: type=1326 audit(1689229807.286:1110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=734646 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626065.611638] audit: type=1326 audit(1689229812.802:1111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=844994 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626115.632108] audit: type=1326 audit(1689229862.822:1112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=853899 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626207.428319] audit: type=1326 audit(1689229954.618:1113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=859579 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626229.347667] audit: type=1326 audit(1689229976.538:1114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=869176 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626257.801803] audit: type=1326 audit(1689230004.990:1115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=864812 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626281.709351] audit: type=1326 audit(1689230028.898:1116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=786513 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11626362.915375] audit: type=1326 audit(1689230110.106:1117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=869647 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626384.676313] audit: type=1326 audit(1689230131.866:1118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879535 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626400.465790] audit: type=1326 audit(1689230147.654:1119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=871948 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626431.889582] exe[824456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557385ecb839 cs:33 sp:7fbbb5ab9858 ax:0 si:557385f24062 di:ffffffffff600000 [11626431.977003] exe[822566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557385ecb839 cs:33 sp:7fbbb5a98858 ax:0 si:557385f24062 di:ffffffffff600000 [11626432.752727] exe[868912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557385ecb839 cs:33 sp:7fbbb5a98858 ax:0 si:557385f24062 di:ffffffffff600000 [11626449.844604] audit: type=1326 audit(1689230197.034:1120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=859247 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626467.900586] audit: type=1326 audit(1689230215.090:1121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=858178 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11626471.085337] audit: type=1326 audit(1689230218.274:1122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=884835 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626518.208159] audit: type=1326 audit(1689230265.398:1123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=880419 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626541.520466] audit: type=1326 audit(1689230288.710:1124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=882137 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626621.306742] audit: type=1326 audit(1689230368.493:1125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=802627 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626661.669412] audit: type=1326 audit(1689230408.857:1126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=889407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626682.654851] audit: type=1326 audit(1689230429.841:1127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=857778 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626683.322679] audit: type=1326 audit(1689230430.509:1128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=891507 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626685.102443] exe[763210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc0745a839 cs:33 sp:7fc5092f0858 ax:0 si:55fc074b3097 di:ffffffffff600000 [11626685.897261] exe[760292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc0745a839 cs:33 sp:7fc5092cf858 ax:0 si:55fc074b3097 di:ffffffffff600000 [11626685.947864] exe[759743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc0745a839 cs:33 sp:7fc5092cf858 ax:0 si:55fc074b3097 di:ffffffffff600000 [11626802.478088] audit: type=1326 audit(1689230549.665:1129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=898944 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626802.608213] audit: type=1326 audit(1689230549.797:1130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897429 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626870.811131] audit: type=1326 audit(1689230617.997:1131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=887503 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11626884.103833] audit: type=1326 audit(1689230631.293:1132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=895716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626944.498138] audit: type=1326 audit(1689230691.685:1133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=906454 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626945.317806] audit: type=1326 audit(1689230692.505:1134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=906607 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626967.298336] audit: type=1326 audit(1689230714.485:1135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=913573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627084.586021] audit: type=1326 audit(1689230831.773:1136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=885479 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627085.711150] audit: type=1326 audit(1689230832.897:1137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=913506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627216.037403] audit: type=1326 audit(1689230963.225:1138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=918841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627226.699396] audit: type=1326 audit(1689230973.885:1139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627292.565800] audit: type=1326 audit(1689231039.753:1140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=926237 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627306.809578] audit: type=1326 audit(1689231053.997:1141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=898956 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627326.411262] audit: type=1326 audit(1689231073.597:1142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627329.171050] audit: type=1326 audit(1689231076.357:1143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=929663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627343.697582] audit: type=1326 audit(1689231090.884:1144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=929991 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627347.341765] audit: type=1326 audit(1689231094.528:1145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919635 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627387.724194] audit: type=1326 audit(1689231134.916:1146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=911230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627460.083551] audit: type=1326 audit(1689231207.272:1147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=930161 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627471.117425] audit: type=1326 audit(1689231218.308:1148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=928833 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627602.515828] audit: type=1326 audit(1689231349.708:1149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=935893 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627612.770608] audit: type=1326 audit(1689231359.960:1150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=936377 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627702.324683] audit: type=1326 audit(1689231449.516:1151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=876414 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627718.852703] audit: type=1326 audit(1689231466.044:1152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627744.507821] audit: type=1326 audit(1689231491.696:1153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=939972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627747.677132] audit: type=1326 audit(1689231494.868:1154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940246 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627883.851097] audit: type=1326 audit(1689231631.040:1155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=947704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627889.977150] audit: type=1326 audit(1689231637.168:1156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=948272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628024.911620] audit: type=1326 audit(1689231772.100:1157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=952771 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628031.160290] audit: type=1326 audit(1689231778.352:1158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=953010 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628040.642956] audit: type=1326 audit(1689231787.832:1159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=875034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11628046.113827] audit: type=1326 audit(1689231793.304:1160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958380 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628172.389002] audit: type=1326 audit(1689231919.579:1161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628179.234029] audit: type=1326 audit(1689231926.423:1162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958842 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628314.064309] audit: type=1326 audit(1689232061.251:1163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=962918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628322.164937] audit: type=1326 audit(1689232069.355:1164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=963597 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628455.457515] audit: type=1326 audit(1689232202.647:1165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=968091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628464.666558] audit: type=1326 audit(1689232211.855:1166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946366 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628465.406719] audit: type=1326 audit(1689232212.595:1167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=968407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628570.305980] audit: type=1326 audit(1689232317.495:1168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931969 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628597.543731] audit: type=1326 audit(1689232344.731:1169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973452 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628607.168180] audit: type=1326 audit(1689232354.355:1170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628620.077308] audit: type=1326 audit(1689232367.267:1171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978694 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628686.349336] audit: type=1326 audit(1689232433.539:1172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=945407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628716.179608] audit: type=1326 audit(1689232463.367:1173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978986 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628753.935398] audit: type=1326 audit(1689232501.123:1174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=979334 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628770.433520] audit: type=1326 audit(1689232517.623:1175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=933516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628827.383465] exe[951513] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b75558c839 cs:33 sp:7eb6bfe7cee8 ax:0 si:2001a180 di:ffffffffff600000 [11628830.369955] exe[947115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b75558c839 cs:33 sp:7eb6bfe3aee8 ax:0 si:2001a180 di:ffffffffff600000 [11628830.550136] exe[929130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b75558c839 cs:33 sp:7eb6bf9feee8 ax:0 si:2001a180 di:ffffffffff600000 [11628832.839056] exe[953074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d4422bb40a cs:33 sp:7f991b73fee8 ax:12 si:ffffffffff600000 di:55d442327ff2 [11628832.962027] exe[916409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d4422bb40a cs:33 sp:7f991b73fee8 ax:12 si:ffffffffff600000 di:55d442327ff2 [11628833.786893] exe[955401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d4422bb40a cs:33 sp:7f991b73fee8 ax:12 si:ffffffffff600000 di:55d442327ff2 [11628842.002990] audit: type=1326 audit(1689232589.190:1176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984756 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628857.897703] audit: type=1326 audit(1689232605.086:1177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=982954 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628984.531869] audit: type=1326 audit(1689232731.718:1178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988722 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629025.421318] audit: type=1326 audit(1689232772.606:1179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=989495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629126.804451] audit: type=1326 audit(1689232873.990:1180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629148.856386] audit: type=1326 audit(1689232896.042:1181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996756 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629167.381892] audit: type=1326 audit(1689232914.570:1182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=993836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629194.884387] audit: type=1326 audit(1689232942.070:1183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=977629 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629208.030223] audit: type=1326 audit(1689232955.218:1184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629230.447902] audit: type=1326 audit(1689232977.634:1185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629283.572378] audit: type=1326 audit(1689233030.758:1186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=998418 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629309.223026] audit: type=1326 audit(1689233056.410:1187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1131 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629402.127757] exe[15167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56552e3c6839 cs:33 sp:7f930ad20858 ax:0 si:56552e41f070 di:ffffffffff600000 [11629402.925691] exe[15173] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56552e3c6839 cs:33 sp:7f930ad20858 ax:0 si:56552e41f070 di:ffffffffff600000 [11629403.044266] exe[13690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56552e3c6839 cs:33 sp:7f930ad20858 ax:0 si:56552e41f070 di:ffffffffff600000 [11629412.163848] audit: type=1326 audit(1689233159.350:1188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11629425.210591] audit: type=1326 audit(1689233172.398:1189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10800 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629451.501171] audit: type=1326 audit(1689233198.686:1190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12290 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629473.439893] audit: type=1326 audit(1689233220.626:1191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629546.455933] audit: type=1326 audit(1689233293.641:1192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19086 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11629606.448034] audit: type=1326 audit(1689233353.633:1193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24065 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629607.009921] audit: type=1326 audit(1689233354.197:1194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5631 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629609.955561] audit: type=1326 audit(1689233357.141:1195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=981256 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629627.321516] audit: type=1326 audit(1689233374.505:1196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629707.742545] audit: type=1326 audit(1689233454.929:1197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33526 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11629850.465525] audit: type=1326 audit(1689233597.649:1198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=45171 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629868.399707] audit: type=1326 audit(1689233615.585:1199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=44717 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11629872.952680] audit: type=1326 audit(1689233620.137:1200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=52721 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630030.618773] audit: type=1326 audit(1689233777.805:1201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=54149 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630045.395436] audit: type=1326 audit(1689233792.581:1202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=911851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630106.444998] audit: type=1326 audit(1689233853.629:1203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630109.684123] audit: type=1326 audit(1689233856.869:1204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36525 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630122.415862] audit: type=1326 audit(1689233869.601:1205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=59663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630133.035799] audit: type=1326 audit(1689233880.221:1206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630145.615898] audit: type=1326 audit(1689233892.801:1207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65800 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630159.315944] audit: type=1326 audit(1689233906.501:1208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=960226 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630160.574939] audit: type=1326 audit(1689233907.761:1209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=66744 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630178.188428] audit: type=1326 audit(1689233925.373:1210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2937 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630208.508185] audit: type=1326 audit(1689233955.693:1211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=63231 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630268.539316] audit: type=1326 audit(1689234015.728:1212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=66010 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630294.692266] audit: type=1326 audit(1689234041.880:1213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=67332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630400.813582] audit: type=1326 audit(1689234148.000:1214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=73111 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630430.900562] audit: type=1326 audit(1689234178.088:1215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=72864 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630432.555274] audit: type=1326 audit(1689234179.744:1216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65961 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630472.924734] audit: type=1326 audit(1689234220.112:1217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36697 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630543.165758] audit: type=1326 audit(1689234290.352:1218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=77048 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630592.902117] audit: type=1326 audit(1689234340.088:1219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=79980 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630612.779733] audit: type=1326 audit(1689234359.968:1220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=71421 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630671.563741] exe[933990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.656538] exe[935243] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e8f2858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.657094] exe[934183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.775717] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.796107] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.817615] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.838102] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.858928] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.879745] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.900515] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630686.088924] audit: type=1326 audit(1689234433.276:1221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=84298 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630754.429805] audit: type=1326 audit(1689234501.616:1222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630797.015329] audit: type=1326 audit(1689234544.204:1223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630803.172429] audit: type=1326 audit(1689234550.360:1224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=68809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630803.316628] audit: type=1326 audit(1689234550.504:1225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=68744 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630826.140992] audit: type=1326 audit(1689234573.328:1226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=95385 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630828.789712] audit: type=1326 audit(1689234575.976:1227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=90871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630931.941194] audit: type=1326 audit(1689234679.128:1228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94864 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630960.968341] audit: type=1326 audit(1689234708.155:1229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=95691 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630971.081558] audit: type=1326 audit(1689234718.267:1230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=96327 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630993.604507] audit: type=1326 audit(1689234740.791:1231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=100210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11631095.668165] audit: type=1326 audit(1689234842.855:1232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=99577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631128.093354] audit: type=1326 audit(1689234875.279:1233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=100868 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11631257.642898] audit: type=1326 audit(1689235004.827:1234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=105488 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631270.385609] audit: type=1326 audit(1689235017.571:1235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106057 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11631419.419518] audit: type=1326 audit(1689235166.607:1236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=111526 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631582.300448] audit: type=1326 audit(1689235329.487:1237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=121859 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631624.654817] audit: type=1326 audit(1689235371.839:1238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=125492 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631699.023697] audit: type=1326 audit(1689235446.210:1239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=81303 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11631736.259800] audit: type=1326 audit(1689235483.442:1240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=125186 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11631759.179290] audit: type=1326 audit(1689235506.362:1241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=126745 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631800.686165] audit: type=1326 audit(1689235547.870:1242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=130695 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631856.695284] audit: type=1326 audit(1689235603.878:1243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=88236 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631900.127702] audit: type=1326 audit(1689235647.310:1244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=134034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631916.772415] audit: type=1326 audit(1689235663.954:1245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131196 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631942.479555] audit: type=1326 audit(1689235689.662:1246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138955 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11632080.328408] audit: type=1326 audit(1689235827.514:1247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=139436 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11632164.881969] audit: type=1326 audit(1689235912.066:1248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=126954 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632208.737639] audit: type=1326 audit(1689235955.922:1249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=151918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632215.574738] audit: type=1326 audit(1689235962.758:1250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=152768 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632242.906806] audit: type=1326 audit(1689235990.090:1251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=148869 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11632259.274629] audit: type=1326 audit(1689236006.458:1252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=129914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632286.126517] audit: type=1326 audit(1689236033.310:1253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=157913 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11632408.470177] audit: type=1326 audit(1689236155.653:1254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146569 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11632535.457323] audit: type=1326 audit(1689236282.641:1255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=160861 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11632540.257343] audit: type=1326 audit(1689236287.441:1256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=168975 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11632540.286544] audit: type=1326 audit(1689236287.469:1257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=168972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11632542.632756] audit: type=1326 audit(1689236289.817:1258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158102 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632697.975936] audit: type=1326 audit(1689236445.157:1259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=169691 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11632735.256192] audit: type=1326 audit(1689236482.437:1260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=154417 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632862.166502] audit: type=1326 audit(1689236609.349:1261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=155712 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632869.895056] audit: type=1326 audit(1689236617.077:1262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=173000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633011.322614] audit: type=1326 audit(1689236758.505:1263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=145378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11633014.331009] audit: type=1326 audit(1689236761.513:1264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=159475 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11633032.164525] audit: type=1326 audit(1689236779.345:1265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=184437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633074.646811] audit: type=1326 audit(1689236821.825:1266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=194947 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633178.382123] audit: type=1326 audit(1689236925.568:1267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=193526 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633210.844870] audit: type=1326 audit(1689236958.028:1268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=196118 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633237.472180] audit: type=1326 audit(1689236984.656:1269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=189795 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11633320.216899] audit: type=1326 audit(1689237067.400:1270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=212167 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633372.631508] audit: type=1326 audit(1689237119.816:1271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=218119 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633442.080125] audit: type=1326 audit(1689237189.264:1272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=224638 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633451.953592] audit: type=1326 audit(1689237199.140:1273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=191551 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11633534.694699] audit: type=1326 audit(1689237281.880:1274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=227751 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633583.260228] audit: type=1326 audit(1689237330.444:1275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=229288 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633605.153463] audit: type=1326 audit(1689237352.336:1276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=238358 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633618.327114] audit: type=1326 audit(1689237365.512:1277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176708 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11633674.629388] audit: type=1326 audit(1689237421.812:1278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=159190 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11633695.748765] audit: type=1326 audit(1689237442.932:1279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=237130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633775.199511] audit: type=1326 audit(1689237522.384:1280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=184119 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11633856.443829] audit: type=1326 audit(1689237603.627:1281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633857.100887] audit: type=1326 audit(1689237604.283:1282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248583 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633879.369215] audit: type=1326 audit(1689237626.551:1283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=262612 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633894.013646] audit: type=1326 audit(1689237641.195:1284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=273812 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11634019.963746] audit: type=1326 audit(1689237767.147:1285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=275224 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11634029.100027] host.test[300842] bad frame in rt_sigreturn frame:000000009bf7b9ad ip:ffffffffffffd8ef sp:ffffffffffffd8ef orax:ffffffffffffffff [11634062.961914] audit: type=1326 audit(1689237810.147:1286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=312178 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11634077.117957] audit: type=1326 audit(1689237824.303:1287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=319405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000