last executing test programs: 27.924751918s ago: executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$ARCH_SET_GS(0x4207, r1, 0x0, 0x1001) r2 = memfd_create(&(0x7f0000000180)='\x00\xac=W[[\x87\x12\x04\xd5\xbc\x80K\x06\xcd]4(\xa2\xee2>\xa1\x9c\x86x\x1c\x9f\x97\x87\xd9c\xecR\xd6\xe8\xf3Y\x121p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00M\xc2N%\x93t[\xf3\xee\xa4\xb4\xfbf\x8dz7\\\x8e\xac\x18\x00\xfd\x89\xe1d\xfa\xcfb\xf3\xdc\xd4CY\x9a\xef\xa3\\\xa7\xa9^\xafL:[\x8e\x83U\xff\xfd\xb0\xfa\xdaL\xa99\x9b\xcfA\xe4n\xa0^\n\x1c\x84\x04\xc5a\xdf\xe5\xd4Hyn\xba:/\xa5\xf4\xaa\xfa\xcd\xc7T\x83\xf5N^\xf2n\xd0=\xb9\t\xdd-F\xacb\xac \xd3\xccj\x13\xa2\x9fLu\'\xed\x91\x867\xaa\xf5\xa0]\xb6\xaa\xea\xfd\xde\xa6\xec\b\x16\x86l:;\xf9\xdb\xcf\x88\"\xca\xe0E\xdb\xec\xf9\xb3\xed\a\x00\x00\x00\x00\x00\x00\x00\xd6.\xf7\x92\xc42\xdf\xefE\xce}\x1b\xda\xdd?\n6\xe1\xb1\xd8Y\x960\xd1\x00\x00\x00\x00\x00\x00MW\x8f\xc6\x82\xe4\x15\xf7\xe9\xd8\xc5b\x0e\x91\xc5\xc76$\x18\xa4\xbe\xe8V\x8d-\xe3\x8fC\xd5\xf5\xd6L\xe3\xce\xa1\x8dz\xce\xa7\xa5\xc8\xcbhM\x1b\xf8\x98\xc4\xfbD6\x88\xfd\xe5i\x8a\xd8\xcfm\x81Z\x19\xf0\xef\xc15\xe8\xcb\xf5\t\t\x00\x17\xfa\x1fqb\xe7\"\xcb4\xb8\xe5/\xd52\x17\x12\x1d\xd8\x87\xb9|\x8d\x83\xea\xcc\x94\xebZ\xae\xaf\x19\xa4\xb2\xc6\xe1\x926B\xb6\x89Z\xa9\xb5/\xbb\x9d&\xeeO\xb3\xb3\xd4\b`\xa9f\x84\xad\t\x1a\xc2\xd5\x88\xbfo\x80V\x93\x9fX\xd7\xff\x03\xb7J\xed\x183\xe3\x7f\xfaq,\xca\x06\xb0\xc9\x92\x93\xa5I\x89\xb7\x85\x90\xb7\x1b0\xce\xd7!\x8fD\x96\xe1 ^>\x9f\x04\x89<\xb7S\x7f\x1a\x88\xab$\xd3y\xc2\xe1\x99\xbch\xd3\x83\xcd\x7f\xc5n\xb1\xc1X \xe2\xbb\x1f\x01\x90\xb1O\x8d\x7f\xa8\xd4\xdbO\xef\x99\xf3\xd3M\x0f\t\x7f\n,\x84\x1f\xfa\xe2\xc8\x99\x97Oq\xae\x9b\x86h\xfa3\xb9\xfd\xbb\xd4^\xc0t\xa7]Y\xe9\x7f[\x11\xb1\xf3m\x17F\x9d\x18\xe2\xe1\x01\xb6f=-?\xbcI\xf2\xd9\xc4>-\xc0E\x9a\x82\xcc7S\xd4\xb6\'\xd2DY\xa5\x83,\xd1\xbc\xc7\xf6\xe0\x1f o\x06\xc2t\x14\xc2\xe0\x92\xc1\x8a\x85>@\xc9\xb0% \xc7\x13l\x8bJ\xe5\xec\x1dE\xf5\xc5\xe2\xe3\x10G7r#\xbc\x95&\x14\x1e\x97\xce\x83>Q@\xfb\xeb=\x1e\xb3\xd5H\x02\x86\xc6\xf3\xe1i\\\x1d\xf4\xc1\xacJC+\xc8}\x1b{\x86\x17\x00\n\"\xec\xa5x\xe6\xb1i\xeb\xb3\xb7I\x90\x9eai\xde\x01\xdc\xfeA\x05Sn\xe6\xe8^\xdf\x8c`\x17\xca\xbd\\QG\xb15\x82*=\xbd\xe9\xaf\x12<\xd7\xe1$\xa4\xdaU\xfb^\xd8!\xacxy\xd5X\xef\x03\xa7\x10\xa1C#S~\x0f\x17\t>X\\mv0\x9eZ\x89\xf4\xae\a\xc8\x16\xd2t\x16\xf3X%Q\xbd\xe9\x86V\xf2\x99^0\xe8xI(\xde-\x04s\x15\x06#2\xef\xef@\xa3t0d^^\xad\xf6\xad\xe0\x16\xf6\xa8\x99!\x0e\x9d+;D&\xebN\x94\x12\x04\x95o\xd6\x9fl\xcb\x16gc\xf5(\xaa_\xec\x9aiE\f\xd4\xc6\xf2\xae\x85n\x995\xcd\xa7\xbb\xf0pz\xaf\tC\x1cq\xaa\x92,Li\r\x95Z\x89\"\xaf]\x95\xb9b_\xe4\xba\xd4\x93\xab\xe1\xb9\xd8E[\xbb\xc9.M+\xbe\x81N\xd2\xae\xf4\x18\xd0\xe7\x98\x90,\xce\ft\xc4\xc7\x02\xaa\xc7\xeb1;\x86b\x8f\x12{k#c\x1d@\xc31\x00\xd2}f\x8cX\xce\xed\xa4\xe4\xca`<_}\'\xce\x81\xb3O\xae\xa1\xbfwcN,\xf2#\x16\xc4\xad\a&\xb1U\x83w\xd0K\xaa\xdf\x84\xe5\xe4\xdb\xa3G(\x7fv\x93\xb8m\x96\xd89Kb\xa9\x852\xb9\xcaG\x8b\x11\x16\x16\xeeI\x14\xcb\xe4\x9a\x1e\xb6^\xa3\xaa^\xdc\xcfo\xfb\xd6<\xa2\xc6\xbdj\xc4\xb1B\xf3S}\xfeI\xe2e\xec}o\xcfB\xa6\x877\'\x80\x82\t\xec\xc1&\xb8\xa9\x82&\xb8XQ8M@\xaa\x1f\vj\x9aW\xec\x92\x19\xdb^\x9d\x94\x87-&\x00/z\xa2\xd7\x01\\\t\xae~\xed\no\x1a\x9cKG^+\xc9\xe0v\xc0\x96\xc4\xcc\xb7\xdd\xdf\xf9\x01\x91\xe5\to[\x97\xbe\x110\x93\x14\xf8\x8a\x8d\xeb\t\xe7?/C\xaa\xd9\xc4\xc9\xbe\x12\xed\xb3*f\xd1J\x14\x80Iy4\xa9\xf88C\xe3', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) wait4(r1, 0x0, 0x0, &(0x7f0000000640)) 27.649615627s ago: executing program 0: socket(0x10, 0x0, 0x0) 27.476736579s ago: executing program 0: ptrace(0x10, 0x1) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000380)={0x0, 0x0}) ptrace$getenv(0x4204, r1, 0x0, 0x0) 2.430546642s ago: executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$ARCH_SET_GS(0x4207, r1, 0x0, 0x1001) r2 = memfd_create(&(0x7f0000000180)='\x00\xac=W[[\x87\x12\x04\xd5\xbc\x80K\x06\xcd]4(\xa2\xee2>\xa1\x9c\x86x\x1c\x9f\x97\x87\xd9c\xecR\xd6\xe8\xf3Y\x121p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00M\xc2N%\x93t[\xf3\xee\xa4\xb4\xfbf\x8dz7\\\x8e\xac\x18\x00\xfd\x89\xe1d\xfa\xcfb\xf3\xdc\xd4CY\x9a\xef\xa3\\\xa7\xa9^\xafL:[\x8e\x83U\xff\xfd\xb0\xfa\xdaL\xa99\x9b\xcfA\xe4n\xa0^\n\x1c\x84\x04\xc5a\xdf\xe5\xd4Hyn\xba:/\xa5\xf4\xaa\xfa\xcd\xc7T\x83\xf5N^\xf2n\xd0=\xb9\t\xdd-F\xacb\xac \xd3\xccj\x13\xa2\x9fLu\'\xed\x91\x867\xaa\xf5\xa0]\xb6\xaa\xea\xfd\xde\xa6\xec\b\x16\x86l:;\xf9\xdb\xcf\x88\"\xca\xe0E\xdb\xec\xf9\xb3\xed\a\x00\x00\x00\x00\x00\x00\x00\xd6.\xf7\x92\xc42\xdf\xefE\xce}\x1b\xda\xdd?\n6\xe1\xb1\xd8Y\x960\xd1\x00\x00\x00\x00\x00\x00MW\x8f\xc6\x82\xe4\x15\xf7\xe9\xd8\xc5b\x0e\x91\xc5\xc76$\x18\xa4\xbe\xe8V\x8d-\xe3\x8fC\xd5\xf5\xd6L\xe3\xce\xa1\x8dz\xce\xa7\xa5\xc8\xcbhM\x1b\xf8\x98\xc4\xfbD6\x88\xfd\xe5i\x8a\xd8\xcfm\x81Z\x19\xf0\xef\xc15\xe8\xcb\xf5\t\t\x00\x17\xfa\x1fqb\xe7\"\xcb4\xb8\xe5/\xd52\x17\x12\x1d\xd8\x87\xb9|\x8d\x83\xea\xcc\x94\xebZ\xae\xaf\x19\xa4\xb2\xc6\xe1\x926B\xb6\x89Z\xa9\xb5/\xbb\x9d&\xeeO\xb3\xb3\xd4\b`\xa9f\x84\xad\t\x1a\xc2\xd5\x88\xbfo\x80V\x93\x9fX\xd7\xff\x03\xb7J\xed\x183\xe3\x7f\xfaq,\xca\x06\xb0\xc9\x92\x93\xa5I\x89\xb7\x85\x90\xb7\x1b0\xce\xd7!\x8fD\x96\xe1 ^>\x9f\x04\x89<\xb7S\x7f\x1a\x88\xab$\xd3y\xc2\xe1\x99\xbch\xd3\x83\xcd\x7f\xc5n\xb1\xc1X \xe2\xbb\x1f\x01\x90\xb1O\x8d\x7f\xa8\xd4\xdbO\xef\x99\xf3\xd3M\x0f\t\x7f\n,\x84\x1f\xfa\xe2\xc8\x99\x97Oq\xae\x9b\x86h\xfa3\xb9\xfd\xbb\xd4^\xc0t\xa7]Y\xe9\x7f[\x11\xb1\xf3m\x17F\x9d\x18\xe2\xe1\x01\xb6f=-?\xbcI\xf2\xd9\xc4>-\xc0E\x9a\x82\xcc7S\xd4\xb6\'\xd2DY\xa5\x83,\xd1\xbc\xc7\xf6\xe0\x1f o\x06\xc2t\x14\xc2\xe0\x92\xc1\x8a\x85>@\xc9\xb0% \xc7\x13l\x8bJ\xe5\xec\x1dE\xf5\xc5\xe2\xe3\x10G7r#\xbc\x95&\x14\x1e\x97\xce\x83>Q@\xfb\xeb=\x1e\xb3\xd5H\x02\x86\xc6\xf3\xe1i\\\x1d\xf4\xc1\xacJC+\xc8}\x1b{\x86\x17\x00\n\"\xec\xa5x\xe6\xb1i\xeb\xb3\xb7I\x90\x9eai\xde\x01\xdc\xfeA\x05Sn\xe6\xe8^\xdf\x8c`\x17\xca\xbd\\QG\xb15\x82*=\xbd\xe9\xaf\x12<\xd7\xe1$\xa4\xdaU\xfb^\xd8!\xacxy\xd5X\xef\x03\xa7\x10\xa1C#S~\x0f\x17\t>X\\mv0\x9eZ\x89\xf4\xae\a\xc8\x16\xd2t\x16\xf3X%Q\xbd\xe9\x86V\xf2\x99^0\xe8xI(\xde-\x04s\x15\x06#2\xef\xef@\xa3t0d^^\xad\xf6\xad\xe0\x16\xf6\xa8\x99!\x0e\x9d+;D&\xebN\x94\x12\x04\x95o\xd6\x9fl\xcb\x16gc\xf5(\xaa_\xec\x9aiE\f\xd4\xc6\xf2\xae\x85n\x995\xcd\xa7\xbb\xf0pz\xaf\tC\x1cq\xaa\x92,Li\r\x95Z\x89\"\xaf]\x95\xb9b_\xe4\xba\xd4\x93\xab\xe1\xb9\xd8E[\xbb\xc9.M+\xbe\x81N\xd2\xae\xf4\x18\xd0\xe7\x98\x90,\xce\ft\xc4\xc7\x02\xaa\xc7\xeb1;\x86b\x8f\x12{k#c\x1d@\xc31\x00\xd2}f\x8cX\xce\xed\xa4\xe4\xca`<_}\'\xce\x81\xb3O\xae\xa1\xbfwcN,\xf2#\x16\xc4\xad\a&\xb1U\x83w\xd0K\xaa\xdf\x84\xe5\xe4\xdb\xa3G(\x7fv\x93\xb8m\x96\xd89Kb\xa9\x852\xb9\xcaG\x8b\x11\x16\x16\xeeI\x14\xcb\xe4\x9a\x1e\xb6^\xa3\xaa^\xdc\xcfo\xfb\xd6<\xa2\xc6\xbdj\xc4\xb1B\xf3S}\xfeI\xe2e\xec}o\xcfB\xa6\x877\'\x80\x82\t\xec\xc1&\xb8\xa9\x82&\xb8XQ8M@\xaa\x1f\vj\x9aW\xec\x92\x19\xdb^\x9d\x94\x87-&\x00/z\xa2\xd7\x01\\\t\xae~\xed\no\x1a\x9cKG^+\xc9\xe0v\xc0\x96\xc4\xcc\xb7\xdd\xdf\xf9\x01\x91\xe5\to[\x97\xbe\x110\x93\x14\xf8\x8a\x8d\xeb\t\xe7?/C\xaa\xd9\xc4\xc9\xbe\x12\xed\xb3*f\xd1J\x14\x80Iy4\xa9\xf88C\xe3', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) wait4(r1, 0x0, 0x0, &(0x7f0000000640)) 266.721471ms ago: executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$ARCH_SET_GS(0x4207, r1, 0x0, 0x1001) r2 = memfd_create(&(0x7f0000000180)='\x00\xac=W[[\x87\x12\x04\xd5\xbc\x80K\x06\xcd]4(\xa2\xee2>\xa1\x9c\x86x\x1c\x9f\x97\x87\xd9c\xecR\xd6\xe8\xf3Y\x121p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00M\xc2N%\x93t[\xf3\xee\xa4\xb4\xfbf\x8dz7\\\x8e\xac\x18\x00\xfd\x89\xe1d\xfa\xcfb\xf3\xdc\xd4CY\x9a\xef\xa3\\\xa7\xa9^\xafL:[\x8e\x83U\xff\xfd\xb0\xfa\xdaL\xa99\x9b\xcfA\xe4n\xa0^\n\x1c\x84\x04\xc5a\xdf\xe5\xd4Hyn\xba:/\xa5\xf4\xaa\xfa\xcd\xc7T\x83\xf5N^\xf2n\xd0=\xb9\t\xdd-F\xacb\xac \xd3\xccj\x13\xa2\x9fLu\'\xed\x91\x867\xaa\xf5\xa0]\xb6\xaa\xea\xfd\xde\xa6\xec\b\x16\x86l:;\xf9\xdb\xcf\x88\"\xca\xe0E\xdb\xec\xf9\xb3\xed\a\x00\x00\x00\x00\x00\x00\x00\xd6.\xf7\x92\xc42\xdf\xefE\xce}\x1b\xda\xdd?\n6\xe1\xb1\xd8Y\x960\xd1\x00\x00\x00\x00\x00\x00MW\x8f\xc6\x82\xe4\x15\xf7\xe9\xd8\xc5b\x0e\x91\xc5\xc76$\x18\xa4\xbe\xe8V\x8d-\xe3\x8fC\xd5\xf5\xd6L\xe3\xce\xa1\x8dz\xce\xa7\xa5\xc8\xcbhM\x1b\xf8\x98\xc4\xfbD6\x88\xfd\xe5i\x8a\xd8\xcfm\x81Z\x19\xf0\xef\xc15\xe8\xcb\xf5\t\t\x00\x17\xfa\x1fqb\xe7\"\xcb4\xb8\xe5/\xd52\x17\x12\x1d\xd8\x87\xb9|\x8d\x83\xea\xcc\x94\xebZ\xae\xaf\x19\xa4\xb2\xc6\xe1\x926B\xb6\x89Z\xa9\xb5/\xbb\x9d&\xeeO\xb3\xb3\xd4\b`\xa9f\x84\xad\t\x1a\xc2\xd5\x88\xbfo\x80V\x93\x9fX\xd7\xff\x03\xb7J\xed\x183\xe3\x7f\xfaq,\xca\x06\xb0\xc9\x92\x93\xa5I\x89\xb7\x85\x90\xb7\x1b0\xce\xd7!\x8fD\x96\xe1 ^>\x9f\x04\x89<\xb7S\x7f\x1a\x88\xab$\xd3y\xc2\xe1\x99\xbch\xd3\x83\xcd\x7f\xc5n\xb1\xc1X \xe2\xbb\x1f\x01\x90\xb1O\x8d\x7f\xa8\xd4\xdbO\xef\x99\xf3\xd3M\x0f\t\x7f\n,\x84\x1f\xfa\xe2\xc8\x99\x97Oq\xae\x9b\x86h\xfa3\xb9\xfd\xbb\xd4^\xc0t\xa7]Y\xe9\x7f[\x11\xb1\xf3m\x17F\x9d\x18\xe2\xe1\x01\xb6f=-?\xbcI\xf2\xd9\xc4>-\xc0E\x9a\x82\xcc7S\xd4\xb6\'\xd2DY\xa5\x83,\xd1\xbc\xc7\xf6\xe0\x1f o\x06\xc2t\x14\xc2\xe0\x92\xc1\x8a\x85>@\xc9\xb0% \xc7\x13l\x8bJ\xe5\xec\x1dE\xf5\xc5\xe2\xe3\x10G7r#\xbc\x95&\x14\x1e\x97\xce\x83>Q@\xfb\xeb=\x1e\xb3\xd5H\x02\x86\xc6\xf3\xe1i\\\x1d\xf4\xc1\xacJC+\xc8}\x1b{\x86\x17\x00\n\"\xec\xa5x\xe6\xb1i\xeb\xb3\xb7I\x90\x9eai\xde\x01\xdc\xfeA\x05Sn\xe6\xe8^\xdf\x8c`\x17\xca\xbd\\QG\xb15\x82*=\xbd\xe9\xaf\x12<\xd7\xe1$\xa4\xdaU\xfb^\xd8!\xacxy\xd5X\xef\x03\xa7\x10\xa1C#S~\x0f\x17\t>X\\mv0\x9eZ\x89\xf4\xae\a\xc8\x16\xd2t\x16\xf3X%Q\xbd\xe9\x86V\xf2\x99^0\xe8xI(\xde-\x04s\x15\x06#2\xef\xef@\xa3t0d^^\xad\xf6\xad\xe0\x16\xf6\xa8\x99!\x0e\x9d+;D&\xebN\x94\x12\x04\x95o\xd6\x9fl\xcb\x16gc\xf5(\xaa_\xec\x9aiE\f\xd4\xc6\xf2\xae\x85n\x995\xcd\xa7\xbb\xf0pz\xaf\tC\x1cq\xaa\x92,Li\r\x95Z\x89\"\xaf]\x95\xb9b_\xe4\xba\xd4\x93\xab\xe1\xb9\xd8E[\xbb\xc9.M+\xbe\x81N\xd2\xae\xf4\x18\xd0\xe7\x98\x90,\xce\ft\xc4\xc7\x02\xaa\xc7\xeb1;\x86b\x8f\x12{k#c\x1d@\xc31\x00\xd2}f\x8cX\xce\xed\xa4\xe4\xca`<_}\'\xce\x81\xb3O\xae\xa1\xbfwcN,\xf2#\x16\xc4\xad\a&\xb1U\x83w\xd0K\xaa\xdf\x84\xe5\xe4\xdb\xa3G(\x7fv\x93\xb8m\x96\xd89Kb\xa9\x852\xb9\xcaG\x8b\x11\x16\x16\xeeI\x14\xcb\xe4\x9a\x1e\xb6^\xa3\xaa^\xdc\xcfo\xfb\xd6<\xa2\xc6\xbdj\xc4\xb1B\xf3S}\xfeI\xe2e\xec}o\xcfB\xa6\x877\'\x80\x82\t\xec\xc1&\xb8\xa9\x82&\xb8XQ8M@\xaa\x1f\vj\x9aW\xec\x92\x19\xdb^\x9d\x94\x87-&\x00/z\xa2\xd7\x01\\\t\xae~\xed\no\x1a\x9cKG^+\xc9\xe0v\xc0\x96\xc4\xcc\xb7\xdd\xdf\xf9\x01\x91\xe5\to[\x97\xbe\x110\x93\x14\xf8\x8a\x8d\xeb\t\xe7?/C\xaa\xd9\xc4\xc9\xbe\x12\xed\xb3*f\xd1J\x14\x80Iy4\xa9\xf88C\xe3', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) wait4(r1, 0x0, 0x0, &(0x7f0000000640)) 0s ago: executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_bridge\x00', 0x10) sendto$inet6(r0, &(0x7f00000000c0)="5f76e5d75f2eb060", 0x8, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c) close(0x3) kernel console output (not intermixed with test programs): ap_amd64.go:223] [ 1386( 197): 1386( 197)] Apply the binary patch addr 557e4f76fb60 trap addr 67b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 123 6 0]) D0621 11:13:01.891511 43334 usertrap_amd64.go:210] [ 1386( 197): 1386( 197)] Found the pattern at ip 557e4f743820:sysno 266 D0621 11:13:01.891649 43334 usertrap_amd64.go:122] [ 1386( 197): 1386( 197)] Allocate a new trap: 0xc002c26e10 37 D0621 11:13:01.891882 43334 usertrap_amd64.go:223] [ 1386( 197): 1386( 197)] Apply the binary patch addr 557e4f743820 trap addr 67b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 123 6 0]) D0621 11:13:01.912459 43334 usertrap_amd64.go:210] [ 1386( 197): 1386( 197)] Found the pattern at ip 557e4f718f92:sysno 14 D0621 11:13:01.912569 43334 usertrap_amd64.go:122] [ 1386( 197): 1386( 197)] Allocate a new trap: 0xc002c26e10 38 D0621 11:13:01.912801 43334 usertrap_amd64.go:223] [ 1386( 197): 1386( 197)] Apply the binary patch addr 557e4f718f92 trap addr 67be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 123 6 0]) D0621 11:13:01.919849 43334 usertrap_amd64.go:210] [ 1386( 197): 1386( 197)] Found the pattern at ip 557e4f76fe92:sysno 435 D0621 11:13:01.920007 43334 usertrap_amd64.go:122] [ 1386( 197): 1386( 197)] Allocate a new trap: 0xc002c26e10 39 D0621 11:13:01.920242 43334 usertrap_amd64.go:223] [ 1386( 197): 1386( 197)] Apply the binary patch addr 557e4f76fe92 trap addr 67c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 124 6 0]) D0621 11:13:01.925541 43334 usertrap_amd64.go:210] [ 1386( 197): 1386( 197)] Found the pattern at ip 557e4f718f00:sysno 14 D0621 11:13:01.925649 43334 usertrap_amd64.go:122] [ 1386( 197): 1386( 197)] Allocate a new trap: 0xc002c26e10 40 D0621 11:13:01.925856 43334 usertrap_amd64.go:223] [ 1386( 197): 1386( 197)] Apply the binary patch addr 557e4f718f00 trap addr 67c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0621 11:13:01.926399 43334 usertrap_amd64.go:210] [ 1386( 197): 1387( 198)] Found the pattern at ip 557e4f718610:sysno 273 D0621 11:13:01.926514 43334 usertrap_amd64.go:122] [ 1386( 197): 1387( 198)] Allocate a new trap: 0xc002c26e10 41 D0621 11:13:01.926788 43334 usertrap_amd64.go:223] [ 1386( 197): 1387( 198)] Apply the binary patch addr 557e4f718610 trap addr 67cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0621 11:13:01.968943 43334 task_exit.go:204] [ 1386( 197): 1386( 197)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:01.971029 43334 task_exit.go:204] [ 1386( 197): 1386( 197)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:01.978116 43334 task_signals.go:204] [ 1386( 197): 1387( 198)] Signal 9, PID: 1386, TID: 1387, fault addr: 0x0: terminating thread group D0621 11:13:01.978495 43334 task_exit.go:204] [ 1386( 197): 1387( 198)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:02.006948 43334 task_exit.go:204] [ 1386( 197): 1387( 198)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:02.007088 43334 task_exit.go:204] [ 1386( 197): 1387( 198)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:02.007564 43334 task_signals.go:470] [ 1190( 1): 1190( 1)] Notified of signal 17 D0621 11:13:02.007986 43334 task_signals.go:176] [ 1190( 1): 1190( 1)] Not restarting syscall 230 after error interrupted by signal: interrupted by signal 17 D0621 11:13:02.008069 43334 task_signals.go:220] [ 1190( 1): 1190( 1)] Signal 17: delivering to handler D0621 11:13:02.010935 43334 task_exit.go:204] [ 1386( 197): 1386( 197)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:02.081775 43334 usertrap_amd64.go:210] [ 1388( 199): 1388( 199)] Found the pattern at ip 557e4f76fb60:sysno 109 D0621 11:13:02.081974 43334 usertrap_amd64.go:122] [ 1388( 199): 1388( 199)] Allocate a new trap: 0xc002c277a0 36 D0621 11:13:02.083398 43334 usertrap_amd64.go:223] [ 1388( 199): 1388( 199)] Apply the binary patch addr 557e4f76fb60 trap addr 67b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 123 6 0]) D0621 11:13:02.088190 43334 usertrap_amd64.go:210] [ 1388( 199): 1388( 199)] Found the pattern at ip 557e4f743820:sysno 266 D0621 11:13:02.088291 43334 usertrap_amd64.go:122] [ 1388( 199): 1388( 199)] Allocate a new trap: 0xc002c277a0 37 D0621 11:13:02.088473 43334 usertrap_amd64.go:223] [ 1388( 199): 1388( 199)] Apply the binary patch addr 557e4f743820 trap addr 67b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 123 6 0]) D0621 11:13:02.106842 43334 usertrap_amd64.go:210] [ 1388( 199): 1388( 199)] Found the pattern at ip 557e4f718f92:sysno 14 D0621 11:13:02.106990 43334 usertrap_amd64.go:122] [ 1388( 199): 1388( 199)] Allocate a new trap: 0xc002c277a0 38 D0621 11:13:02.107155 43334 usertrap_amd64.go:223] [ 1388( 199): 1388( 199)] Apply the binary patch addr 557e4f718f92 trap addr 67be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 123 6 0]) D0621 11:13:02.113405 43334 usertrap_amd64.go:210] [ 1388( 199): 1388( 199)] Found the pattern at ip 557e4f76fe92:sysno 435 D0621 11:13:02.113528 43334 usertrap_amd64.go:122] [ 1388( 199): 1388( 199)] Allocate a new trap: 0xc002c277a0 39 D0621 11:13:02.113696 43334 usertrap_amd64.go:223] [ 1388( 199): 1388( 199)] Apply the binary patch addr 557e4f76fe92 trap addr 67c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 124 6 0]) D0621 11:13:02.118515 43334 usertrap_amd64.go:210] [ 1388( 199): 1388( 199)] Found the pattern at ip 557e4f718f00:sysno 14 D0621 11:13:02.118612 43334 usertrap_amd64.go:122] [ 1388( 199): 1388( 199)] Allocate a new trap: 0xc002c277a0 40 D0621 11:13:02.118789 43334 usertrap_amd64.go:223] [ 1388( 199): 1388( 199)] Apply the binary patch addr 557e4f718f00 trap addr 67c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0621 11:13:02.119794 43334 usertrap_amd64.go:210] [ 1388( 199): 1389( 200)] Found the pattern at ip 557e4f718610:sysno 273 D0621 11:13:02.119867 43334 usertrap_amd64.go:122] [ 1388( 199): 1389( 200)] Allocate a new trap: 0xc002c277a0 41 D0621 11:13:02.120022 43334 usertrap_amd64.go:223] [ 1388( 199): 1389( 200)] Apply the binary patch addr 557e4f718610 trap addr 67cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0621 11:13:02.188087 43334 task_stop.go:118] [ 1190( 1): 1190( 1)] Entering internal stop &kernel.ptraceStop{frozen:false, listen:false} D0621 11:13:02.188369 43334 task_signals.go:470] [ 1388( 199): 1389( 200)] Notified of signal 17 D0621 11:13:02.193088 43334 task_signals.go:220] [ 1388( 199): 1389( 200)] Signal 17: delivering to handler D0621 11:13:02.216502 43334 task_exit.go:204] [ 1388( 199): 1388( 199)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:02.218655 43334 task_exit.go:204] [ 1388( 199): 1388( 199)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:02.223998 43334 task_signals.go:204] [ 1388( 199): 1389( 200)] Signal 9, PID: 1388, TID: 1389, fault addr: 0x0: terminating thread group D0621 11:13:02.224298 43334 task_exit.go:204] [ 1388( 199): 1389( 200)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:02.239445 43334 task_stop.go:138] [ 1190( 1): 1190( 1)] Leaving internal stop &kernel.ptraceStop{frozen:false, listen:false} D0621 11:13:02.239676 43334 task_exit.go:204] [ 1388( 199): 1389( 200)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:02.239779 43334 task_exit.go:204] [ 1388( 199): 1389( 200)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:02.240000 43334 task_signals.go:470] [ 1190( 1): 1190( 1)] Notified of signal 17 D0621 11:13:02.240249 43334 task_exit.go:204] [ 1388( 199): 1388( 199)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:02.240602 43334 task_signals.go:220] [ 1190( 1): 1190( 1)] Signal 17: delivering to handler D0621 11:13:02.248036 43334 task_signals.go:470] [ 8: 13] Notified of signal 23 D0621 11:13:02.248281 43334 task_signals.go:220] [ 8: 13] Signal 23: delivering to handler D0621 11:13:02.293094 43334 usertrap_amd64.go:210] [ 1390( 201): 1390( 201)] Found the pattern at ip 557e4f76fb60:sysno 109 D0621 11:13:02.293393 43334 usertrap_amd64.go:122] [ 1390( 201): 1390( 201)] Allocate a new trap: 0xc000bfacf0 36 D0621 11:13:02.295305 43334 usertrap_amd64.go:223] [ 1390( 201): 1390( 201)] Apply the binary patch addr 557e4f76fb60 trap addr 67b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 123 6 0]) D0621 11:13:02.304753 43334 usertrap_amd64.go:210] [ 1390( 201): 1390( 201)] Found the pattern at ip 557e4f743820:sysno 266 D0621 11:13:02.304867 43334 usertrap_amd64.go:122] [ 1390( 201): 1390( 201)] Allocate a new trap: 0xc000bfacf0 37 D0621 11:13:02.305078 43334 usertrap_amd64.go:223] [ 1390( 201): 1390( 201)] Apply the binary patch addr 557e4f743820 trap addr 67b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 123 6 0]) D0621 11:13:02.323395 43334 usertrap_amd64.go:210] [ 1390( 201): 1390( 201)] Found the pattern at ip 557e4f718f92:sysno 14 D0621 11:13:02.323497 43334 usertrap_amd64.go:122] [ 1390( 201): 1390( 201)] Allocate a new trap: 0xc000bfacf0 38 D0621 11:13:02.323746 43334 usertrap_amd64.go:223] [ 1390( 201): 1390( 201)] Apply the binary patch addr 557e4f718f92 trap addr 67be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 123 6 0]) D0621 11:13:02.329981 43334 usertrap_amd64.go:210] [ 1390( 201): 1390( 201)] Found the pattern at ip 557e4f76fe92:sysno 435 D0621 11:13:02.330059 43334 usertrap_amd64.go:122] [ 1390( 201): 1390( 201)] Allocate a new trap: 0xc000bfacf0 39 D0621 11:13:02.330303 43334 usertrap_amd64.go:223] [ 1390( 201): 1390( 201)] Apply the binary patch addr 557e4f76fe92 trap addr 67c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 124 6 0]) D0621 11:13:02.334703 43334 usertrap_amd64.go:210] [ 1390( 201): 1390( 201)] Found the pattern at ip 557e4f718f00:sysno 14 D0621 11:13:02.334885 43334 usertrap_amd64.go:122] [ 1390( 201): 1390( 201)] Allocate a new trap: 0xc000bfacf0 40 D0621 11:13:02.335134 43334 usertrap_amd64.go:223] [ 1390( 201): 1390( 201)] Apply the binary patch addr 557e4f718f00 trap addr 67c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0621 11:13:02.335672 43334 usertrap_amd64.go:210] [ 1390( 201): 1391( 202)] Found the pattern at ip 557e4f718610:sysno 273 D0621 11:13:02.335759 43334 usertrap_amd64.go:122] [ 1390( 201): 1391( 202)] Allocate a new trap: 0xc000bfacf0 41 D0621 11:13:02.335921 43334 usertrap_amd64.go:223] [ 1390( 201): 1391( 202)] Apply the binary patch addr 557e4f718610 trap addr 67cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0621 11:13:02.375155 43334 task_exit.go:204] [ 1390( 201): 1390( 201)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:02.377426 43334 task_exit.go:204] [ 1390( 201): 1390( 201)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:02.383375 43334 task_signals.go:204] [ 1390( 201): 1391( 202)] Signal 9, PID: 1390, TID: 1391, fault addr: 0x0: terminating thread group D0621 11:13:02.383652 43334 task_exit.go:204] [ 1390( 201): 1391( 202)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:02.408481 43334 task_exit.go:204] [ 1390( 201): 1391( 202)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:02.408693 43334 task_exit.go:204] [ 1390( 201): 1391( 202)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:02.409067 43334 task_signals.go:470] [ 1190( 1): 1190( 1)] Notified of signal 17 D0621 11:13:02.409789 43334 task_signals.go:176] [ 1190( 1): 1190( 1)] Not restarting syscall 230 after error interrupted by signal: interrupted by signal 17 D0621 11:13:02.409921 43334 task_signals.go:220] [ 1190( 1): 1190( 1)] Signal 17: delivering to handler D0621 11:13:02.412807 43334 task_exit.go:204] [ 1390( 201): 1390( 201)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:02.480467 43334 usertrap_amd64.go:210] [ 1392( 203): 1392( 203)] Found the pattern at ip 557e4f76fb60:sysno 109 D0621 11:13:02.480733 43334 usertrap_amd64.go:122] [ 1392( 203): 1392( 203)] Allocate a new trap: 0xc000ca7440 36 D0621 11:13:02.482420 43334 usertrap_amd64.go:223] [ 1392( 203): 1392( 203)] Apply the binary patch addr 557e4f76fb60 trap addr 67b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 123 6 0]) D0621 11:13:02.487856 43334 usertrap_amd64.go:210] [ 1392( 203): 1392( 203)] Found the pattern at ip 557e4f743820:sysno 266 D0621 11:13:02.487947 43334 usertrap_amd64.go:122] [ 1392( 203): 1392( 203)] Allocate a new trap: 0xc000ca7440 37 D0621 11:13:02.488172 43334 usertrap_amd64.go:223] [ 1392( 203): 1392( 203)] Apply the binary patch addr 557e4f743820 trap addr 67b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 123 6 0]) D0621 11:13:02.509723 43334 usertrap_amd64.go:210] [ 1392( 203): 1392( 203)] Found the pattern at ip 557e4f718f92:sysno 14 D0621 11:13:02.509850 43334 usertrap_amd64.go:122] [ 1392( 203): 1392( 203)] Allocate a new trap: 0xc000ca7440 38 D0621 11:13:02.510014 43334 usertrap_amd64.go:223] [ 1392( 203): 1392( 203)] Apply the binary patch addr 557e4f718f92 trap addr 67be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 123 6 0]) D0621 11:13:02.517460 43334 usertrap_amd64.go:210] [ 1392( 203): 1392( 203)] Found the pattern at ip 557e4f76fe92:sysno 435 D0621 11:13:02.517591 43334 usertrap_amd64.go:122] [ 1392( 203): 1392( 203)] Allocate a new trap: 0xc000ca7440 39 D0621 11:13:02.517960 43334 usertrap_amd64.go:223] [ 1392( 203): 1392( 203)] Apply the binary patch addr 557e4f76fe92 trap addr 67c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 124 6 0]) D0621 11:13:02.521818 43334 usertrap_amd64.go:210] [ 1392( 203): 1392( 203)] Found the pattern at ip 557e4f718f00:sysno 14 D0621 11:13:02.521898 43334 usertrap_amd64.go:122] [ 1392( 203): 1392( 203)] Allocate a new trap: 0xc000ca7440 40 D0621 11:13:02.522081 43334 usertrap_amd64.go:223] [ 1392( 203): 1392( 203)] Apply the binary patch addr 557e4f718f00 trap addr 67c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0621 11:13:02.522829 43334 usertrap_amd64.go:210] [ 1392( 203): 1393( 204)] Found the pattern at ip 557e4f718610:sysno 273 D0621 11:13:02.522922 43334 usertrap_amd64.go:122] [ 1392( 203): 1393( 204)] Allocate a new trap: 0xc000ca7440 41 D0621 11:13:02.523265 43334 usertrap_amd64.go:223] [ 1392( 203): 1393( 204)] Apply the binary patch addr 557e4f718610 trap addr 67cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0621 11:13:02.594452 43334 task_stop.go:118] [ 1190( 1): 1190( 1)] Entering internal stop &kernel.ptraceStop{frozen:false, listen:false} D0621 11:13:02.594874 43334 task_signals.go:470] [ 1392( 203): 1393( 204)] Notified of signal 17 D0621 11:13:02.602654 43334 task_signals.go:220] [ 1392( 203): 1393( 204)] Signal 17: delivering to handler D0621 11:13:02.667478 43334 task_exit.go:204] [ 1392( 203): 1392( 203)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:02.669640 43334 task_exit.go:204] [ 1392( 203): 1392( 203)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:02.669901 43334 task_signals.go:204] [ 1392( 203): 1393( 204)] Signal 9, PID: 1392, TID: 1393, fault addr: 0x0: terminating thread group D0621 11:13:02.670141 43334 task_exit.go:204] [ 1392( 203): 1393( 204)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:02.688012 43334 task_stop.go:138] [ 1190( 1): 1190( 1)] Leaving internal stop &kernel.ptraceStop{frozen:false, listen:false} D0621 11:13:02.688227 43334 task_exit.go:204] [ 1392( 203): 1393( 204)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:02.688305 43334 task_exit.go:204] [ 1392( 203): 1393( 204)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:02.688473 43334 task_run.go:183] [ 1190( 1): 1190( 1)] Restarting syscall 230 with restart block: not interrupted by handled signal D0621 11:13:02.688591 43334 task_signals.go:470] [ 1190( 1): 1190( 1)] Notified of signal 17 D0621 11:13:02.688854 43334 task_signals.go:220] [ 1190( 1): 1190( 1)] Signal 17: delivering to handler D0621 11:13:02.690338 43334 task_exit.go:204] [ 1392( 203): 1392( 203)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:02.770841 43334 usertrap_amd64.go:210] [ 1394( 205): 1394( 205)] Found the pattern at ip 557e4f76fb60:sysno 109 D0621 11:13:02.771006 43334 usertrap_amd64.go:122] [ 1394( 205): 1394( 205)] Allocate a new trap: 0xc004af0540 36 D0621 11:13:02.772238 43334 usertrap_amd64.go:223] [ 1394( 205): 1394( 205)] Apply the binary patch addr 557e4f76fb60 trap addr 67b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 123 6 0]) D0621 11:13:02.780012 43334 usertrap_amd64.go:210] [ 1394( 205): 1394( 205)] Found the pattern at ip 557e4f743820:sysno 266 D0621 11:13:02.780141 43334 usertrap_amd64.go:122] [ 1394( 205): 1394( 205)] Allocate a new trap: 0xc004af0540 37 D0621 11:13:02.780400 43334 usertrap_amd64.go:223] [ 1394( 205): 1394( 205)] Apply the binary patch addr 557e4f743820 trap addr 67b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 123 6 0]) D0621 11:13:02.805870 43334 usertrap_amd64.go:210] [ 1394( 205): 1394( 205)] Found the pattern at ip 557e4f718f92:sysno 14 D0621 11:13:02.806073 43334 usertrap_amd64.go:122] [ 1394( 205): 1394( 205)] Allocate a new trap: 0xc004af0540 38 D0621 11:13:02.806331 43334 usertrap_amd64.go:223] [ 1394( 205): 1394( 205)] Apply the binary patch addr 557e4f718f92 trap addr 67be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 123 6 0]) D0621 11:13:02.818169 43334 usertrap_amd64.go:210] [ 1394( 205): 1394( 205)] Found the pattern at ip 557e4f76fe92:sysno 435 D0621 11:13:02.818270 43334 usertrap_amd64.go:122] [ 1394( 205): 1394( 205)] Allocate a new trap: 0xc004af0540 39 D0621 11:13:02.818424 43334 usertrap_amd64.go:223] [ 1394( 205): 1394( 205)] Apply the binary patch addr 557e4f76fe92 trap addr 67c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 124 6 0]) D0621 11:13:02.822891 43334 usertrap_amd64.go:210] [ 1394( 205): 1394( 205)] Found the pattern at ip 557e4f718f00:sysno 14 D0621 11:13:02.822965 43334 usertrap_amd64.go:122] [ 1394( 205): 1394( 205)] Allocate a new trap: 0xc004af0540 40 D0621 11:13:02.823110 43334 usertrap_amd64.go:223] [ 1394( 205): 1394( 205)] Apply the binary patch addr 557e4f718f00 trap addr 67c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0621 11:13:02.825449 43334 usertrap_amd64.go:210] [ 1394( 205): 1395( 206)] Found the pattern at ip 557e4f718610:sysno 273 D0621 11:13:02.825576 43334 usertrap_amd64.go:122] [ 1394( 205): 1395( 206)] Allocate a new trap: 0xc004af0540 41 D0621 11:13:02.825839 43334 usertrap_amd64.go:223] [ 1394( 205): 1395( 206)] Apply the binary patch addr 557e4f718610 trap addr 67cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0621 11:13:02.897099 43334 task_stop.go:118] [ 1190( 1): 1190( 1)] Entering internal stop &kernel.ptraceStop{frozen:false, listen:false} D0621 11:13:02.897378 43334 task_signals.go:470] [ 1394( 205): 1395( 206)] Notified of signal 17 D0621 11:13:02.902965 43334 task_signals.go:220] [ 1394( 205): 1395( 206)] Signal 17: delivering to handler D0621 11:13:02.929516 43334 task_exit.go:204] [ 1394( 205): 1394( 205)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:02.931824 43334 task_exit.go:204] [ 1394( 205): 1394( 205)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:02.935889 43334 task_signals.go:204] [ 1394( 205): 1395( 206)] Signal 9, PID: 1394, TID: 1395, fault addr: 0x0: terminating thread group D0621 11:13:02.936200 43334 task_exit.go:204] [ 1394( 205): 1395( 206)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:02.953256 43334 task_stop.go:138] [ 1190( 1): 1190( 1)] Leaving internal stop &kernel.ptraceStop{frozen:false, listen:false} D0621 11:13:02.953521 43334 task_exit.go:204] [ 1394( 205): 1395( 206)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:02.953601 43334 task_exit.go:204] [ 1394( 205): 1395( 206)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:02.953830 43334 task_run.go:183] [ 1190( 1): 1190( 1)] Restarting syscall 230 with restart block: not interrupted by handled signal D0621 11:13:02.953912 43334 task_signals.go:470] [ 1190( 1): 1190( 1)] Notified of signal 17 D0621 11:13:02.954095 43334 task_signals.go:220] [ 1190( 1): 1190( 1)] Signal 17: delivering to handler D0621 11:13:02.956143 43334 task_exit.go:204] [ 1394( 205): 1394( 205)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:03.013039 43334 usertrap_amd64.go:210] [ 1396( 207): 1396( 207)] Found the pattern at ip 557e4f76fb60:sysno 109 D0621 11:13:03.013273 43334 usertrap_amd64.go:122] [ 1396( 207): 1396( 207)] Allocate a new trap: 0xc000ca7da0 36 D0621 11:13:03.014570 43334 usertrap_amd64.go:223] [ 1396( 207): 1396( 207)] Apply the binary patch addr 557e4f76fb60 trap addr 67b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 123 6 0]) D0621 11:13:03.018784 43334 usertrap_amd64.go:210] [ 1396( 207): 1396( 207)] Found the pattern at ip 557e4f743820:sysno 266 D0621 11:13:03.018888 43334 usertrap_amd64.go:122] [ 1396( 207): 1396( 207)] Allocate a new trap: 0xc000ca7da0 37 D0621 11:13:03.019072 43334 usertrap_amd64.go:223] [ 1396( 207): 1396( 207)] Apply the binary patch addr 557e4f743820 trap addr 67b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 123 6 0]) D0621 11:13:03.038060 43334 usertrap_amd64.go:210] [ 1396( 207): 1396( 207)] Found the pattern at ip 557e4f718f92:sysno 14 D0621 11:13:03.038218 43334 usertrap_amd64.go:122] [ 1396( 207): 1396( 207)] Allocate a new trap: 0xc000ca7da0 38 D0621 11:13:03.038410 43334 usertrap_amd64.go:223] [ 1396( 207): 1396( 207)] Apply the binary patch addr 557e4f718f92 trap addr 67be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 123 6 0]) D0621 11:13:03.055277 43334 usertrap_amd64.go:210] [ 1396( 207): 1396( 207)] Found the pattern at ip 557e4f76fe92:sysno 435 D0621 11:13:03.055378 43334 usertrap_amd64.go:122] [ 1396( 207): 1396( 207)] Allocate a new trap: 0xc000ca7da0 39 D0621 11:13:03.055581 43334 usertrap_amd64.go:223] [ 1396( 207): 1396( 207)] Apply the binary patch addr 557e4f76fe92 trap addr 67c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 124 6 0]) D0621 11:13:03.060251 43334 usertrap_amd64.go:210] [ 1396( 207): 1396( 207)] Found the pattern at ip 557e4f718f00:sysno 14 D0621 11:13:03.060483 43334 usertrap_amd64.go:122] [ 1396( 207): 1396( 207)] Allocate a new trap: 0xc000ca7da0 40 D0621 11:13:03.060720 43334 usertrap_amd64.go:223] [ 1396( 207): 1396( 207)] Apply the binary patch addr 557e4f718f00 trap addr 67c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0621 11:13:03.061270 43334 usertrap_amd64.go:210] [ 1396( 207): 1397( 208)] Found the pattern at ip 557e4f718610:sysno 273 D0621 11:13:03.061381 43334 usertrap_amd64.go:122] [ 1396( 207): 1397( 208)] Allocate a new trap: 0xc000ca7da0 41 D0621 11:13:03.061688 43334 usertrap_amd64.go:223] [ 1396( 207): 1397( 208)] Apply the binary patch addr 557e4f718610 trap addr 67cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0621 11:13:03.074481 43334 task_signals.go:470] [ 1190( 1): 1190( 1)] Notified of signal 19 D0621 11:13:03.075102 43334 ptrace.go:668] [ 1190( 1): 1190( 1)] Entering signal-delivery-stop for signal 19 D0621 11:13:03.075263 43334 task_stop.go:118] [ 1190( 1): 1190( 1)] Entering internal stop &kernel.ptraceStop{frozen:false, listen:false} D0621 11:13:03.075476 43334 task_signals.go:470] [ 1396( 207): 1397( 208)] Notified of signal 17 D0621 11:13:03.086232 43334 task_signals.go:220] [ 1396( 207): 1397( 208)] Signal 17: delivering to handler D0621 11:13:03.150168 43334 task_exit.go:204] [ 1396( 207): 1396( 207)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:03.152750 43334 task_exit.go:204] [ 1396( 207): 1396( 207)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:03.153165 43334 task_signals.go:204] [ 1396( 207): 1397( 208)] Signal 9, PID: 1396, TID: 1397, fault addr: 0x0: terminating thread group D0621 11:13:03.153572 43334 task_exit.go:204] [ 1396( 207): 1397( 208)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:03.172281 43334 task_stop.go:138] [ 1190( 1): 1190( 1)] Leaving internal stop &kernel.ptraceStop{frozen:false, listen:false} D0621 11:13:03.172671 43334 task_exit.go:204] [ 1396( 207): 1397( 208)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:03.172771 43334 task_exit.go:204] [ 1396( 207): 1397( 208)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:03.173024 43334 task_signals.go:481] [ 1190( 1): 1190( 1)] No task notified of signal 17 D0621 11:13:03.173460 43334 task_signals.go:808] [ 1190( 1): 1190( 1)] Signal 19: stopping 1 threads in thread group D0621 11:13:03.173584 43334 task_signals.go:885] [ 1190( 1): 1190( 1)] Completing group stop D0621 11:13:03.173851 43334 task_stop.go:118] [ 1190( 1): 1190( 1)] Entering internal stop (*kernel.groupStop)(nil) D0621 11:13:03.174060 43334 task_signals.go:470] [ 1189: 1189] Notified of signal 17 D0621 11:13:03.174554 43334 task_signals.go:176] [ 1189: 1189] Not restarting syscall 61 after error to be restarted if SA_RESTART is set: interrupted by signal 17 D0621 11:13:03.174630 43334 task_signals.go:220] [ 1189: 1189] Signal 17: delivering to handler D0621 11:13:27.965993 43334 task_signals.go:470] [ 1189: 1189] Notified of signal 9 D0621 11:13:27.966582 43334 task_signals.go:204] [ 1189: 1189] Signal 9, PID: 1189, TID: 1189, fault addr: 0x0: terminating thread group D0621 11:13:27.966883 43334 task_exit.go:204] [ 1189: 1189] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:27.985963 43334 task_stop.go:138] [ 1190( 1): 1190( 1)] Leaving internal stop (*kernel.groupStop)(nil) D0621 11:13:27.986178 43334 task_signals.go:481] [ 1190( 1): 1190( 1)] No task notified of signal 9 D0621 11:13:27.986339 43334 task_exit.go:204] [ 1189: 1189] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:27.986560 43334 task_signals.go:470] [ 8: 8] Notified of signal 17 D0621 11:13:27.987028 43334 task_signals.go:204] [ 1190( 1): 1190( 1)] Signal 9, PID: 1190, TID: 1190, fault addr: 0x0: terminating thread group D0621 11:13:27.987211 43334 task_exit.go:204] [ 1190( 1): 1190( 1)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:27.987978 43334 task_signals.go:179] [ 8: 8] Restarting syscall 202: interrupted by signal 17 D0621 11:13:27.988076 43334 task_signals.go:220] [ 8: 8] Signal 17: delivering to handler D0621 11:13:27.990762 43334 task_exit.go:204] [ 1189: 1189] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:28.021208 43334 task_signals.go:470] [ 8: 13] Notified of signal 13 D0621 11:13:28.021617 43334 task_signals.go:220] [ 8: 13] Signal 13: delivering to handler D0621 11:13:28.022933 43334 task_exit.go:361] [ 1190( 1): 1190( 1)] Init process terminating, killing namespace D0621 11:13:28.027812 43334 task_signals.go:481] [ 1396( 207): 1396( 207)] No task notified of signal 9 D0621 11:13:28.036274 43334 task_signals.go:458] [ 1396( 207): 1396( 207)] Discarding duplicate signal 9 D0621 11:13:28.036468 43334 task_exit.go:204] [ 1396( 207): 1396( 207)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:28.036985 43334 task_exit.go:204] [ 1190( 1): 1190( 1)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:28.037236 43334 task_signals.go:470] [ 1: 1] Notified of signal 17 D0621 11:13:28.038111 43334 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0621 11:13:28.038242 43334 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0621 11:13:28.039661 43334 task_signals.go:470] [ 8: 13] Notified of signal 23 D0621 11:13:28.040537 43334 task_signals.go:220] [ 8: 13] Signal 23: delivering to handler D0621 11:13:28.042895 43334 task_signals.go:470] [ 8: 13] Notified of signal 23 D0621 11:13:28.043578 43334 task_signals.go:220] [ 8: 13] Signal 23: delivering to handler D0621 11:13:28.077237 43334 task_signals.go:470] [ 8: 13] Notified of signal 23 D0621 11:13:28.077817 43334 task_signals.go:220] [ 8: 13] Signal 23: delivering to handler D0621 11:13:28.098073 43334 task_signals.go:470] [ 8: 13] Notified of signal 23 D0621 11:13:28.098504 43334 task_signals.go:220] [ 8: 13] Signal 23: delivering to handler D0621 11:13:28.111504 43334 task_stop.go:118] [ 8: 13] Entering internal stop (*kernel.vforkStop)(nil) D0621 11:13:28.112258 43334 task_signals.go:481] [ 8: 13] No task notified of signal 23 D0621 11:13:28.153693 43334 syscalls.go:262] [ 1398: 1398] Allocating stack with size of 8388608 bytes D0621 11:13:28.158247 43334 task_stop.go:138] [ 8: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0621 11:13:28.159424 43334 task_signals.go:220] [ 8: 13] Signal 23: delivering to handler D0621 11:13:28.168011 43334 usertrap_amd64.go:210] [ 1398: 1398] Found the pattern at ip 5632809ca7a3:sysno 218 D0621 11:13:28.168289 43334 usertrap_amd64.go:106] [ 1398: 1398] Map a usertrap vma at 60000 D0621 11:13:28.169416 43334 usertrap_amd64.go:122] [ 1398: 1398] Allocate a new trap: 0xc003c544e0 1 D0621 11:13:28.169893 43334 usertrap_amd64.go:223] [ 1398: 1398] Apply the binary patch addr 5632809ca7a3 trap addr 60050 ([184 218 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0621 11:13:28.172750 43334 usertrap_amd64.go:210] [ 1398: 1398] Found the pattern at ip 5632809ca836:sysno 334 D0621 11:13:28.172831 43334 usertrap_amd64.go:122] [ 1398: 1398] Allocate a new trap: 0xc003c544e0 2 D0621 11:13:28.173022 43334 usertrap_amd64.go:223] [ 1398: 1398] Apply the binary patch addr 5632809ca836 trap addr 600a0 ([184 78 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0621 11:13:28.180104 43334 usertrap_amd64.go:210] [ 1398: 1398] Found the pattern at ip 5632809daac9:sysno 318 D0621 11:13:28.180216 43334 usertrap_amd64.go:122] [ 1398: 1398] Allocate a new trap: 0xc003c544e0 3 D0621 11:13:28.180359 43334 usertrap_amd64.go:223] [ 1398: 1398] Apply the binary patch addr 5632809daac9 trap addr 600f0 ([184 62 1 0 0 15 5] -> [255 36 37 240 0 6 0]) D0621 11:13:28.183497 43334 usertrap_amd64.go:210] [ 1398: 1398] Found the pattern at ip 5632809c0d00:sysno 12 D0621 11:13:28.183565 43334 usertrap_amd64.go:122] [ 1398: 1398] Allocate a new trap: 0xc003c544e0 4 D0621 11:13:28.183787 43334 usertrap_amd64.go:223] [ 1398: 1398] Apply the binary patch addr 5632809c0d00 trap addr 60140 ([184 12 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0621 11:13:28.190444 43334 usertrap_amd64.go:210] [ 1398: 1398] Found the pattern at ip 5632809c1160:sysno 10 D0621 11:13:28.190581 43334 usertrap_amd64.go:122] [ 1398: 1398] Allocate a new trap: 0xc003c544e0 5 D0621 11:13:28.190860 43334 usertrap_amd64.go:223] [ 1398: 1398] Apply the binary patch addr 5632809c1160 trap addr 60190 ([184 10 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0621 11:13:28.199226 43334 usertrap_amd64.go:210] [ 1398: 1398] Found the pattern at ip 5632809c2446:sysno 157 D0621 11:13:28.199331 43334 usertrap_amd64.go:122] [ 1398: 1398] Allocate a new trap: 0xc003c544e0 6 D0621 11:13:28.199533 43334 usertrap_amd64.go:223] [ 1398: 1398] Apply the binary patch addr 5632809c2446 trap addr 601e0 ([184 157 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0621 11:13:28.202192 43334 usertrap_amd64.go:210] [ 1398: 1398] Found the pattern at ip 5632809c10dc:sysno 9 D0621 11:13:28.202316 43334 usertrap_amd64.go:122] [ 1398: 1398] Allocate a new trap: 0xc003c544e0 7 D0621 11:13:28.202614 43334 usertrap_amd64.go:223] [ 1398: 1398] Apply the binary patch addr 5632809c10dc trap addr 60230 ([184 9 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0621 11:13:28.203913 43334 usertrap_amd64.go:210] [ 1398: 1398] Found the pattern at ip 5632809845a8:sysno 13 D0621 11:13:28.204046 43334 usertrap_amd64.go:122] [ 1398: 1398] Allocate a new trap: 0xc003c544e0 8 D0621 11:13:28.204303 43334 usertrap_amd64.go:223] [ 1398: 1398] Apply the binary patch addr 5632809845a8 trap addr 60280 ([184 13 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0621 11:13:28.211986 43334 usertrap_amd64.go:210] [ 1398: 1398] Found the pattern at ip 5632809be820:sysno 39 D0621 11:13:28.212091 43334 usertrap_amd64.go:122] [ 1398: 1398] Allocate a new trap: 0xc003c544e0 9 D0621 11:13:28.212366 43334 usertrap_amd64.go:223] [ 1398: 1398] Apply the binary patch addr 5632809be820 trap addr 602d0 ([184 39 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0621 11:13:28.216700 43334 usertrap_amd64.go:210] [ 1398: 1398] Found the pattern at ip 5632809bff69:sysno 3 D0621 11:13:28.216805 43334 usertrap_amd64.go:122] [ 1398: 1398] Allocate a new trap: 0xc003c544e0 10 D0621 11:13:28.217014 43334 usertrap_amd64.go:223] [ 1398: 1398] Apply the binary patch addr 5632809bff69 trap addr 60320 ([184 3 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0621 11:13:28.220314 43334 usertrap_amd64.go:210] [ 1398: 1398] Found the pattern at ip 5632809ecc00:sysno 83 D0621 11:13:28.220430 43334 usertrap_amd64.go:122] [ 1398: 1398] Allocate a new trap: 0xc003c544e0 11 D0621 11:13:28.220683 43334 usertrap_amd64.go:223] [ 1398: 1398] Apply the binary patch addr 5632809ecc00 trap addr 60370 ([184 83 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0621 11:13:28.223640 43334 usertrap_amd64.go:210] [ 1398: 1398] Found the pattern at ip 5632809bfb70:sysno 90 D0621 11:13:28.223724 43334 usertrap_amd64.go:122] [ 1398: 1398] Allocate a new trap: 0xc003c544e0 12 D0621 11:13:28.223928 43334 usertrap_amd64.go:223] [ 1398: 1398] Apply the binary patch addr 5632809bfb70 trap addr 603c0 ([184 90 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0621 11:13:28.224740 43334 usertrap_amd64.go:210] [ 1398: 1398] Found the pattern at ip 5632809c0020:sysno 80 D0621 11:13:28.224839 43334 usertrap_amd64.go:122] [ 1398: 1398] Allocate a new trap: 0xc003c544e0 13 D0621 11:13:28.225030 43334 usertrap_amd64.go:223] [ 1398: 1398] Apply the binary patch addr 5632809c0020 trap addr 60410 ([184 80 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0621 11:13:28.233285 43334 usertrap_amd64.go:210] [ 1398: 1398] Found the pattern at ip 5632809bfff0:sysno 33 D0621 11:13:28.233363 43334 usertrap_amd64.go:122] [ 1398: 1398] Allocate a new trap: 0xc003c544e0 14 D0621 11:13:28.233591 43334 usertrap_amd64.go:223] [ 1398: 1398] Apply the binary patch addr 5632809bfff0 trap addr 60460 ([184 33 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0621 11:13:28.235511 43334 usertrap_amd64.go:210] [ 1398: 1398] Found the pattern at ip 5632809bfc1a:sysno 257 D0621 11:13:28.235678 43334 usertrap_amd64.go:122] [ 1398: 1398] Allocate a new trap: 0xc003c544e0 15 D0621 11:13:28.235909 43334 usertrap_amd64.go:223] [ 1398: 1398] Apply the binary patch addr 5632809bfc1a trap addr 604b0 ([184 1 1 0 0 15 5] -> [255 36 37 176 4 6 0]) D0621 11:13:28.240553 43334 usertrap_amd64.go:210] [ 1398: 1398] Found the pattern at ip 5632809c0e04:sysno 16 D0621 11:13:28.240645 43334 usertrap_amd64.go:122] [ 1398: 1398] Allocate a new trap: 0xc003c544e0 16 D0621 11:13:28.240868 43334 usertrap_amd64.go:223] [ 1398: 1398] Apply the binary patch addr 5632809c0e04 trap addr 60500 ([184 16 0 0 0 15 5] -> [255 36 37 0 5 6 0]) D0621 11:13:28.267864 43334 usertrap_amd64.go:210] [ 1398: 1398] Found the pattern at ip 5632809c2800:sysno 272 D0621 11:13:28.267973 43334 usertrap_amd64.go:122] [ 1398: 1398] Allocate a new trap: 0xc003c544e0 17 D0621 11:13:28.268150 43334 usertrap_amd64.go:223] [ 1398: 1398] Apply the binary patch addr 5632809c2800 trap addr 60550 ([184 16 1 0 0 15 5] -> [255 36 37 80 5 6 0]) D0621 11:13:28.270304 43334 usertrap_amd64.go:210] [ 1398: 1398] Found the pattern at ip 5632809be0cc:sysno 56 D0621 11:13:28.270536 43334 usertrap_amd64.go:122] [ 1398: 1398] Allocate a new trap: 0xc003c544e0 18 D0621 11:13:28.270843 43334 usertrap_amd64.go:223] [ 1398: 1398] Apply the binary patch addr 5632809be0cc trap addr 605a0 ([184 56 0 0 0 15 5] -> [255 36 37 160 5 6 0]) D0621 11:13:28.302599 43334 usertrap_amd64.go:210] [ 1399( 1): 1399( 1)] Found the pattern at ip 5632809be106:sysno 273 D0621 11:13:28.302880 43334 usertrap_amd64.go:122] [ 1399( 1): 1399( 1)] Allocate a new trap: 0xc0045c84b0 19 D0621 11:13:28.304811 43334 usertrap_amd64.go:223] [ 1399( 1): 1399( 1)] Apply the binary patch addr 5632809be106 trap addr 605f0 ([184 17 1 0 0 15 5] -> [255 36 37 240 5 6 0]) D0621 11:13:28.314517 43334 usertrap_amd64.go:210] [ 1398: 1398] Found the pattern at ip 5632809bda8c:sysno 61 D0621 11:13:28.314632 43334 usertrap_amd64.go:122] [ 1398: 1398] Allocate a new trap: 0xc003c544e0 19 D0621 11:13:28.318218 43334 usertrap_amd64.go:223] [ 1398: 1398] Apply the binary patch addr 5632809bda8c trap addr 605f0 ([184 61 0 0 0 15 5] -> [255 36 37 240 5 6 0]) D0621 11:13:28.327064 43334 usertrap_amd64.go:210] [ 1399( 1): 1399( 1)] Found the pattern at ip 5632809c27a3:sysno 165 D0621 11:13:28.327319 43334 usertrap_amd64.go:122] [ 1399( 1): 1399( 1)] Allocate a new trap: 0xc0045c84b0 20 D0621 11:13:28.327781 43334 usertrap_amd64.go:223] [ 1399( 1): 1399( 1)] Apply the binary patch addr 5632809c27a3 trap addr 60640 ([184 165 0 0 0 15 5] -> [255 36 37 64 6 6 0]) D0621 11:13:28.335406 43334 usertrap_amd64.go:210] [ 1399( 1): 1399( 1)] Found the pattern at ip 5632809be860:sysno 112 D0621 11:13:28.335530 43334 usertrap_amd64.go:122] [ 1399( 1): 1399( 1)] Allocate a new trap: 0xc0045c84b0 21 D0621 11:13:28.335984 43334 usertrap_amd64.go:223] [ 1399( 1): 1399( 1)] Apply the binary patch addr 5632809be860 trap addr 60690 ([184 112 0 0 0 15 5] -> [255 36 37 144 6 6 0]) D0621 11:13:28.355432 43334 usertrap_amd64.go:210] [ 1399( 1): 1399( 1)] Found the pattern at ip 5632809bfda9:sysno 1 D0621 11:13:28.355542 43334 usertrap_amd64.go:122] [ 1399( 1): 1399( 1)] Allocate a new trap: 0xc0045c84b0 22 D0621 11:13:28.355769 43334 usertrap_amd64.go:223] [ 1399( 1): 1399( 1)] Apply the binary patch addr 5632809bfda9 trap addr 606e0 ([184 1 0 0 0 15 5] -> [255 36 37 224 6 6 0]) D0621 11:13:28.366089 43334 usertrap_amd64.go:210] [ 1399( 1): 1399( 1)] Found the pattern at ip 5632809c2e20:sysno 41 D0621 11:13:28.366288 43334 usertrap_amd64.go:122] [ 1399( 1): 1399( 1)] Allocate a new trap: 0xc0045c84b0 23 D0621 11:13:28.366654 43334 usertrap_amd64.go:223] [ 1399( 1): 1399( 1)] Apply the binary patch addr 5632809c2e20 trap addr 60730 ([184 41 0 0 0 15 5] -> [255 36 37 48 7 6 0]) D0621 11:13:28.379007 43334 usertrap_amd64.go:210] [ 1399( 1): 1399( 1)] Found the pattern at ip 5632809c0960:sysno 3 D0621 11:13:28.379132 43334 usertrap_amd64.go:122] [ 1399( 1): 1399( 1)] Allocate a new trap: 0xc0045c84b0 24 D0621 11:13:28.379322 43334 usertrap_amd64.go:223] [ 1399( 1): 1399( 1)] Apply the binary patch addr 5632809c0960 trap addr 60780 ([184 3 0 0 0 15 5] -> [255 36 37 128 7 6 0]) D0621 11:13:28.382145 43334 usertrap_amd64.go:210] [ 1399( 1): 1399( 1)] Found the pattern at ip 5632809c2d3c:sysno 44 D0621 11:13:28.382249 43334 usertrap_amd64.go:122] [ 1399( 1): 1399( 1)] Allocate a new trap: 0xc0045c84b0 25 D0621 11:13:28.382410 43334 usertrap_amd64.go:223] [ 1399( 1): 1399( 1)] Apply the binary patch addr 5632809c2d3c trap addr 607d0 ([184 44 0 0 0 15 5] -> [255 36 37 208 7 6 0]) D0621 11:13:28.383366 43334 usertrap_amd64.go:210] [ 1399( 1): 1399( 1)] Found the pattern at ip 5632809c2c82:sysno 45 D0621 11:13:28.383445 43334 usertrap_amd64.go:122] [ 1399( 1): 1399( 1)] Allocate a new trap: 0xc0045c84b0 26 D0621 11:13:28.383649 43334 usertrap_amd64.go:223] [ 1399( 1): 1399( 1)] Apply the binary patch addr 5632809c2c82 trap addr 60820 ([184 45 0 0 0 15 5] -> [255 36 37 32 8 6 0]) W0621 11:13:28.387598 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:28.392715 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:28.421868 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:28.621556 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 5 W0621 11:13:28.639245 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 5 W0621 11:13:28.647857 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 5 W0621 11:13:28.655915 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 5 W0621 11:13:28.663263 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 5 W0621 11:13:28.670598 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 5 W0621 11:13:28.679818 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 5 W0621 11:13:28.693093 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 5 W0621 11:13:28.699522 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 5 W0621 11:13:28.731058 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:28.766313 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:28.831654 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:28.918955 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:28.938112 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:28.955201 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:28.972494 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:28.997675 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.016458 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.035161 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.054727 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.077527 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.100663 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.122787 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.146299 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.171833 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.195987 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.255509 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.345680 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.365539 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.388407 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.412784 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 D0621 11:13:29.417366 43334 task_signals.go:470] [ 8: 13] Notified of signal 23 D0621 11:13:29.417949 43334 task_signals.go:220] [ 8: 13] Signal 23: delivering to handler W0621 11:13:29.440298 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.465865 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.493513 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.517946 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.542694 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.564839 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.589334 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.627435 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.653369 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.679424 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.708042 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.733871 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.757813 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.785296 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.831273 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.861608 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.892218 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.919043 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.950445 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:29.979689 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 W0621 11:13:30.010438 43334 stack.go:140] [ 1399( 1): 1399( 1)] unexpected attribute: 1 D0621 11:13:30.104773 43334 usertrap_amd64.go:210] [ 1399( 1): 1399( 1)] Found the pattern at ip 5632809bfba0:sysno 258 D0621 11:13:30.104940 43334 usertrap_amd64.go:122] [ 1399( 1): 1399( 1)] Allocate a new trap: 0xc0045c84b0 27 D0621 11:13:30.105142 43334 usertrap_amd64.go:223] [ 1399( 1): 1399( 1)] Apply the binary patch addr 5632809bfba0 trap addr 60870 ([184 2 1 0 0 15 5] -> [255 36 37 112 8 6 0]) D0621 11:13:30.110060 43334 usertrap_amd64.go:210] [ 1399( 1): 1399( 1)] Found the pattern at ip 5632809c2c43:sysno 55 D0621 11:13:30.110141 43334 usertrap_amd64.go:122] [ 1399( 1): 1399( 1)] Allocate a new trap: 0xc0045c84b0 28 D0621 11:13:30.110326 43334 usertrap_amd64.go:223] [ 1399( 1): 1399( 1)] Apply the binary patch addr 5632809c2c43 trap addr 608c0 ([184 55 0 0 0 15 5] -> [255 36 37 192 8 6 0]) D0621 11:13:30.177266 43334 usertrap_amd64.go:210] [ 1399( 1): 1399( 1)] Found the pattern at ip 5632809ec46c:sysno 230 D0621 11:13:30.177476 43334 usertrap_amd64.go:122] [ 1399( 1): 1399( 1)] Allocate a new trap: 0xc0045c84b0 29 D0621 11:13:30.180083 43334 usertrap_amd64.go:223] [ 1399( 1): 1399( 1)] Apply the binary patch addr 5632809ec46c trap addr 60910 ([184 230 0 0 0 15 5] -> [255 36 37 16 9 6 0]) D0621 11:13:30.187124 43334 usertrap_amd64.go:210] [ 1400( 2): 1400( 2)] Found the pattern at ip 5632809ecb60:sysno 109 D0621 11:13:30.187304 43334 usertrap_amd64.go:122] [ 1400( 2): 1400( 2)] Allocate a new trap: 0xc0080ea090 29 D0621 11:13:30.188103 43334 usertrap_amd64.go:223] [ 1400( 2): 1400( 2)] Apply the binary patch addr 5632809ecb60 trap addr 60910 ([184 109 0 0 0 15 5] -> [255 36 37 16 9 6 0]) D0621 11:13:30.194343 43334 usertrap_amd64.go:210] [ 1400( 2): 1400( 2)] Found the pattern at ip 5632809c0820:sysno 266 D0621 11:13:30.194414 43334 usertrap_amd64.go:210] [ 1399( 1): 1399( 1)] Found the pattern at ip 5632809bda8c:sysno 61 D0621 11:13:30.194442 43334 usertrap_amd64.go:122] [ 1400( 2): 1400( 2)] Allocate a new trap: 0xc0080ea090 30 D0621 11:13:30.194485 43334 usertrap_amd64.go:122] [ 1399( 1): 1399( 1)] Allocate a new trap: 0xc0045c84b0 30 D0621 11:13:30.194746 43334 usertrap_amd64.go:223] [ 1399( 1): 1399( 1)] Apply the binary patch addr 5632809bda8c trap addr 60960 ([184 61 0 0 0 15 5] -> [255 36 37 96 9 6 0]) D0621 11:13:30.194769 43334 usertrap_amd64.go:223] [ 1400( 2): 1400( 2)] Apply the binary patch addr 5632809c0820 trap addr 60960 ([184 10 1 0 0 15 5] -> [255 36 37 96 9 6 0]) D0621 11:13:30.213144 43334 usertrap_amd64.go:210] [ 1400( 2): 1400( 2)] Found the pattern at ip 563280995f92:sysno 14 D0621 11:13:30.213235 43334 usertrap_amd64.go:122] [ 1400( 2): 1400( 2)] Allocate a new trap: 0xc0080ea090 31 D0621 11:13:30.213356 43334 usertrap_amd64.go:223] [ 1400( 2): 1400( 2)] Apply the binary patch addr 563280995f92 trap addr 609b0 ([184 14 0 0 0 15 5] -> [255 36 37 176 9 6 0]) D0621 11:13:30.219277 43334 usertrap_amd64.go:210] [ 1400( 2): 1400( 2)] Found the pattern at ip 5632809ece92:sysno 435 D0621 11:13:30.219362 43334 usertrap_amd64.go:122] [ 1400( 2): 1400( 2)] Allocate a new trap: 0xc0080ea090 32 D0621 11:13:30.219593 43334 usertrap_amd64.go:223] [ 1400( 2): 1400( 2)] Apply the binary patch addr 5632809ece92 trap addr 60a00 ([184 179 1 0 0 15 5] -> [255 36 37 0 10 6 0]) D0621 11:13:30.223829 43334 usertrap_amd64.go:210] [ 1400( 2): 1400( 2)] Found the pattern at ip 563280995f00:sysno 14 D0621 11:13:30.223888 43334 usertrap_amd64.go:122] [ 1400( 2): 1400( 2)] Allocate a new trap: 0xc0080ea090 33 D0621 11:13:30.224031 43334 usertrap_amd64.go:223] [ 1400( 2): 1400( 2)] Apply the binary patch addr 563280995f00 trap addr 60a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 10 6 0]) D0621 11:13:30.224652 43334 usertrap_amd64.go:210] [ 1400( 2): 1401( 3)] Found the pattern at ip 563280995610:sysno 273 D0621 11:13:30.224755 43334 usertrap_amd64.go:122] [ 1400( 2): 1401( 3)] Allocate a new trap: 0xc0080ea090 34 D0621 11:13:30.224930 43334 usertrap_amd64.go:223] [ 1400( 2): 1401( 3)] Apply the binary patch addr 563280995610 trap addr 60aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 10 6 0]) D0621 11:13:30.303366 43334 task_stop.go:118] [ 1399( 1): 1399( 1)] Entering internal stop &kernel.ptraceStop{frozen:false, listen:false} D0621 11:13:30.303782 43334 task_signals.go:470] [ 1400( 2): 1401( 3)] Notified of signal 17 D0621 11:13:30.310342 43334 task_signals.go:220] [ 1400( 2): 1401( 3)] Signal 17: delivering to handler D0621 11:13:30.365764 43334 task_exit.go:204] [ 1400( 2): 1400( 2)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:30.367310 43334 task_exit.go:204] [ 1400( 2): 1400( 2)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:30.372654 43334 task_signals.go:204] [ 1400( 2): 1401( 3)] Signal 9, PID: 1400, TID: 1401, fault addr: 0x0: terminating thread group D0621 11:13:30.372854 43334 task_exit.go:204] [ 1400( 2): 1401( 3)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:30.387155 43334 task_stop.go:138] [ 1399( 1): 1399( 1)] Leaving internal stop &kernel.ptraceStop{frozen:false, listen:false} D0621 11:13:30.387341 43334 task_exit.go:204] [ 1400( 2): 1401( 3)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:30.387415 43334 task_exit.go:204] [ 1400( 2): 1401( 3)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:30.387434 43334 task_run.go:183] [ 1399( 1): 1399( 1)] Restarting syscall 230 with restart block: not interrupted by handled signal D0621 11:13:30.387678 43334 task_signals.go:470] [ 1399( 1): 1399( 1)] Notified of signal 17 D0621 11:13:30.388044 43334 task_signals.go:220] [ 1399( 1): 1399( 1)] Signal 17: delivering to handler D0621 11:13:30.390225 43334 task_exit.go:204] [ 1400( 2): 1400( 2)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:30.391066 43334 usertrap_amd64.go:210] [ 1399( 1): 1399( 1)] Found the pattern at ip 5632809c23d0:sysno 166 D0621 11:13:30.391171 43334 usertrap_amd64.go:122] [ 1399( 1): 1399( 1)] Allocate a new trap: 0xc0045c84b0 31 D0621 11:13:30.391392 43334 usertrap_amd64.go:223] [ 1399( 1): 1399( 1)] Apply the binary patch addr 5632809c23d0 trap addr 609b0 ([184 166 0 0 0 15 5] -> [255 36 37 176 9 6 0]) D0621 11:13:30.394367 43334 usertrap_amd64.go:210] [ 1399( 1): 1399( 1)] Found the pattern at ip 5632809bfb43:sysno 262 D0621 11:13:30.394430 43334 usertrap_amd64.go:122] [ 1399( 1): 1399( 1)] Allocate a new trap: 0xc0045c84b0 32 D0621 11:13:30.394562 43334 usertrap_amd64.go:223] [ 1399( 1): 1399( 1)] Apply the binary patch addr 5632809bfb43 trap addr 60a00 ([184 6 1 0 0 15 5] -> [255 36 37 0 10 6 0]) D0621 11:13:30.400913 43334 usertrap_amd64.go:210] [ 1399( 1): 1399( 1)] Found the pattern at ip 5632809ec59c:sysno 217 D0621 11:13:30.400980 43334 usertrap_amd64.go:122] [ 1399( 1): 1399( 1)] Allocate a new trap: 0xc0045c84b0 33 D0621 11:13:30.401088 43334 usertrap_amd64.go:223] [ 1399( 1): 1399( 1)] Apply the binary patch addr 5632809ec59c trap addr 60a50 ([184 217 0 0 0 15 5] -> [255 36 37 80 10 6 0]) D0621 11:13:30.402419 43334 usertrap_amd64.go:210] [ 1399( 1): 1399( 1)] Found the pattern at ip 5632809c0850:sysno 87 D0621 11:13:30.402489 43334 usertrap_amd64.go:122] [ 1399( 1): 1399( 1)] Allocate a new trap: 0xc0045c84b0 34 D0621 11:13:30.402588 43334 usertrap_amd64.go:223] [ 1399( 1): 1399( 1)] Apply the binary patch addr 5632809c0850 trap addr 60aa0 ([184 87 0 0 0 15 5] -> [255 36 37 160 10 6 0]) D0621 11:13:30.406642 43334 usertrap_amd64.go:210] [ 1399( 1): 1399( 1)] Found the pattern at ip 5632809c0880:sysno 263 D0621 11:13:30.406711 43334 usertrap_amd64.go:122] [ 1399( 1): 1399( 1)] Allocate a new trap: 0xc0045c84b0 35 D0621 11:13:30.406858 43334 usertrap_amd64.go:223] [ 1399( 1): 1399( 1)] Apply the binary patch addr 5632809c0880 trap addr 60af0 ([184 7 1 0 0 15 5] -> [255 36 37 240 10 6 0]) D0621 11:13:30.443424 43334 usertrap_amd64.go:210] [ 1402( 4): 1402( 4)] Found the pattern at ip 5632809ecb60:sysno 109 D0621 11:13:30.443581 43334 usertrap_amd64.go:122] [ 1402( 4): 1402( 4)] Allocate a new trap: 0xc00003e930 36 D0621 11:13:30.444977 43334 usertrap_amd64.go:223] [ 1402( 4): 1402( 4)] Apply the binary patch addr 5632809ecb60 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0621 11:13:30.450854 43334 usertrap_amd64.go:210] [ 1402( 4): 1402( 4)] Found the pattern at ip 5632809c0820:sysno 266 D0621 11:13:30.451042 43334 usertrap_amd64.go:122] [ 1402( 4): 1402( 4)] Allocate a new trap: 0xc00003e930 37 D0621 11:13:30.451285 43334 usertrap_amd64.go:223] [ 1402( 4): 1402( 4)] Apply the binary patch addr 5632809c0820 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0621 11:13:30.469072 43334 usertrap_amd64.go:210] [ 1402( 4): 1402( 4)] Found the pattern at ip 563280995f92:sysno 14 D0621 11:13:30.469169 43334 usertrap_amd64.go:122] [ 1402( 4): 1402( 4)] Allocate a new trap: 0xc00003e930 38 D0621 11:13:30.469312 43334 usertrap_amd64.go:223] [ 1402( 4): 1402( 4)] Apply the binary patch addr 563280995f92 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0621 11:13:30.475257 43334 usertrap_amd64.go:210] [ 1402( 4): 1402( 4)] Found the pattern at ip 5632809ece92:sysno 435 D0621 11:13:30.475341 43334 usertrap_amd64.go:122] [ 1402( 4): 1402( 4)] Allocate a new trap: 0xc00003e930 39 D0621 11:13:30.475502 43334 usertrap_amd64.go:223] [ 1402( 4): 1402( 4)] Apply the binary patch addr 5632809ece92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0621 11:13:30.479192 43334 usertrap_amd64.go:210] [ 1402( 4): 1402( 4)] Found the pattern at ip 563280995f00:sysno 14 D0621 11:13:30.479266 43334 usertrap_amd64.go:122] [ 1402( 4): 1402( 4)] Allocate a new trap: 0xc00003e930 40 D0621 11:13:30.479418 43334 usertrap_amd64.go:223] [ 1402( 4): 1402( 4)] Apply the binary patch addr 563280995f00 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0621 11:13:30.480700 43334 usertrap_amd64.go:210] [ 1402( 4): 1403( 5)] Found the pattern at ip 563280995610:sysno 273 D0621 11:13:30.480784 43334 usertrap_amd64.go:122] [ 1402( 4): 1403( 5)] Allocate a new trap: 0xc00003e930 41 D0621 11:13:30.480920 43334 usertrap_amd64.go:223] [ 1402( 4): 1403( 5)] Apply the binary patch addr 563280995610 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0621 11:13:30.548272 43334 task_stop.go:118] [ 1399( 1): 1399( 1)] Entering internal stop &kernel.ptraceStop{frozen:false, listen:false} D0621 11:13:30.548593 43334 task_signals.go:470] [ 1402( 4): 1403( 5)] Notified of signal 17 D0621 11:13:30.553425 43334 task_signals.go:220] [ 1402( 4): 1403( 5)] Signal 17: delivering to handler D0621 11:13:30.578232 43334 task_exit.go:204] [ 1402( 4): 1402( 4)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:30.580695 43334 task_exit.go:204] [ 1402( 4): 1402( 4)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:30.584068 43334 task_signals.go:204] [ 1402( 4): 1403( 5)] Signal 9, PID: 1402, TID: 1403, fault addr: 0x0: terminating thread group D0621 11:13:30.584325 43334 task_exit.go:204] [ 1402( 4): 1403( 5)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:30.605163 43334 task_stop.go:138] [ 1399( 1): 1399( 1)] Leaving internal stop &kernel.ptraceStop{frozen:false, listen:false} D0621 11:13:30.605371 43334 task_exit.go:204] [ 1402( 4): 1403( 5)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:30.605453 43334 task_exit.go:204] [ 1402( 4): 1403( 5)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:30.605710 43334 task_signals.go:481] [ 1399( 1): 1399( 1)] No task notified of signal 17 D0621 11:13:30.606184 43334 task_signals.go:220] [ 1399( 1): 1399( 1)] Signal 17: delivering to handler D0621 11:13:30.608864 43334 task_exit.go:204] [ 1402( 4): 1402( 4)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:30.663766 43334 usertrap_amd64.go:210] [ 1404( 6): 1404( 6)] Found the pattern at ip 5632809ecb60:sysno 109 D0621 11:13:30.664059 43334 usertrap_amd64.go:122] [ 1404( 6): 1404( 6)] Allocate a new trap: 0xc0080ea330 36 D0621 11:13:30.665886 43334 usertrap_amd64.go:223] [ 1404( 6): 1404( 6)] Apply the binary patch addr 5632809ecb60 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0621 11:13:30.673688 43334 usertrap_amd64.go:210] [ 1404( 6): 1404( 6)] Found the pattern at ip 5632809c0820:sysno 266 D0621 11:13:30.673806 43334 usertrap_amd64.go:122] [ 1404( 6): 1404( 6)] Allocate a new trap: 0xc0080ea330 37 D0621 11:13:30.674009 43334 usertrap_amd64.go:223] [ 1404( 6): 1404( 6)] Apply the binary patch addr 5632809c0820 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0621 11:13:30.696907 43334 usertrap_amd64.go:210] [ 1404( 6): 1404( 6)] Found the pattern at ip 563280995f92:sysno 14 D0621 11:13:30.697020 43334 usertrap_amd64.go:122] [ 1404( 6): 1404( 6)] Allocate a new trap: 0xc0080ea330 38 D0621 11:13:30.697193 43334 usertrap_amd64.go:223] [ 1404( 6): 1404( 6)] Apply the binary patch addr 563280995f92 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0621 11:13:30.704324 43334 usertrap_amd64.go:210] [ 1404( 6): 1404( 6)] Found the pattern at ip 5632809ece92:sysno 435 D0621 11:13:30.704435 43334 usertrap_amd64.go:122] [ 1404( 6): 1404( 6)] Allocate a new trap: 0xc0080ea330 39 D0621 11:13:30.704685 43334 usertrap_amd64.go:223] [ 1404( 6): 1404( 6)] Apply the binary patch addr 5632809ece92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0621 11:13:30.709195 43334 usertrap_amd64.go:210] [ 1404( 6): 1404( 6)] Found the pattern at ip 563280995f00:sysno 14 D0621 11:13:30.709320 43334 usertrap_amd64.go:122] [ 1404( 6): 1404( 6)] Allocate a new trap: 0xc0080ea330 40 D0621 11:13:30.709819 43334 usertrap_amd64.go:223] [ 1404( 6): 1404( 6)] Apply the binary patch addr 563280995f00 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0621 11:13:30.710639 43334 usertrap_amd64.go:210] [ 1404( 6): 1405( 7)] Found the pattern at ip 563280995610:sysno 273 D0621 11:13:30.711200 43334 usertrap_amd64.go:122] [ 1404( 6): 1405( 7)] Allocate a new trap: 0xc0080ea330 41 D0621 11:13:30.711404 43334 usertrap_amd64.go:223] [ 1404( 6): 1405( 7)] Apply the binary patch addr 563280995610 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0621 11:13:30.722343 43334 task_signals.go:470] [ 1399( 1): 1399( 1)] Notified of signal 19 D0621 11:13:30.722733 43334 ptrace.go:668] [ 1399( 1): 1399( 1)] Entering signal-delivery-stop for signal 19 D0621 11:13:30.722866 43334 task_stop.go:118] [ 1399( 1): 1399( 1)] Entering internal stop &kernel.ptraceStop{frozen:false, listen:false} D0621 11:13:30.723067 43334 task_signals.go:470] [ 1404( 6): 1405( 7)] Notified of signal 17 D0621 11:13:30.729812 43334 task_signals.go:220] [ 1404( 6): 1405( 7)] Signal 17: delivering to handler D0621 11:13:30.787395 43334 task_exit.go:204] [ 1404( 6): 1404( 6)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:30.789385 43334 task_exit.go:204] [ 1404( 6): 1404( 6)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:30.796043 43334 task_signals.go:204] [ 1404( 6): 1405( 7)] Signal 9, PID: 1404, TID: 1405, fault addr: 0x0: terminating thread group D0621 11:13:30.796264 43334 task_exit.go:204] [ 1404( 6): 1405( 7)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:30.812077 43334 task_stop.go:138] [ 1399( 1): 1399( 1)] Leaving internal stop &kernel.ptraceStop{frozen:false, listen:false} D0621 11:13:30.812400 43334 task_exit.go:204] [ 1404( 6): 1405( 7)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:30.812520 43334 task_exit.go:204] [ 1404( 6): 1405( 7)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:30.812776 43334 task_signals.go:481] [ 1399( 1): 1399( 1)] No task notified of signal 17 D0621 11:13:30.813143 43334 task_signals.go:808] [ 1399( 1): 1399( 1)] Signal 19: stopping 1 threads in thread group D0621 11:13:30.813298 43334 task_signals.go:885] [ 1399( 1): 1399( 1)] Completing group stop D0621 11:13:30.813408 43334 task_stop.go:118] [ 1399( 1): 1399( 1)] Entering internal stop (*kernel.groupStop)(nil) D0621 11:13:30.813587 43334 task_signals.go:470] [ 1398: 1398] Notified of signal 17 D0621 11:13:30.813955 43334 task_signals.go:176] [ 1398: 1398] Not restarting syscall 61 after error to be restarted if SA_RESTART is set: interrupted by signal 17 D0621 11:13:30.814029 43334 task_signals.go:220] [ 1398: 1398] Signal 17: delivering to handler I0621 11:13:38.160851 43334 watchdog.go:295] Watchdog starting loop, tasks: 45, discount: 0s D0621 11:13:43.438207 43334 task_signals.go:470] [ 8: 13] Notified of signal 23 D0621 11:13:43.439007 43334 task_signals.go:220] [ 8: 13] Signal 23: delivering to handler D0621 11:13:45.601488 43334 task_signals.go:470] [ 1: 4] Notified of signal 23 D0621 11:13:45.601824 43334 task_signals.go:220] [ 1: 4] Signal 23: delivering to handler D0621 11:13:55.618933 43334 task_signals.go:470] [ 1398: 1398] Notified of signal 9 D0621 11:13:55.619506 43334 task_signals.go:204] [ 1398: 1398] Signal 9, PID: 1398, TID: 1398, fault addr: 0x0: terminating thread group D0621 11:13:55.619925 43334 task_exit.go:204] [ 1398: 1398] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:55.645843 43334 task_stop.go:138] [ 1399( 1): 1399( 1)] Leaving internal stop (*kernel.groupStop)(nil) D0621 11:13:55.646226 43334 task_signals.go:481] [ 1399( 1): 1399( 1)] No task notified of signal 9 D0621 11:13:55.646465 43334 task_exit.go:204] [ 1398: 1398] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:55.646819 43334 task_signals.go:470] [ 8: 8] Notified of signal 17 D0621 11:13:55.648013 43334 task_signals.go:179] [ 8: 8] Restarting syscall 202: interrupted by signal 17 D0621 11:13:55.648223 43334 task_signals.go:220] [ 8: 8] Signal 17: delivering to handler D0621 11:13:55.648815 43334 task_signals.go:204] [ 1399( 1): 1399( 1)] Signal 9, PID: 1399, TID: 1399, fault addr: 0x0: terminating thread group D0621 11:13:55.649154 43334 task_exit.go:204] [ 1399( 1): 1399( 1)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:55.649732 43334 task_exit.go:204] [ 1398: 1398] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:55.693732 43334 task_signals.go:470] [ 8: 13] Notified of signal 13 D0621 11:13:55.694347 43334 task_signals.go:220] [ 8: 13] Signal 13: delivering to handler D0621 11:13:55.695228 43334 task_exit.go:361] [ 1399( 1): 1399( 1)] Init process terminating, killing namespace D0621 11:13:55.696260 43334 task_signals.go:481] [ 1404( 6): 1404( 6)] No task notified of signal 9 D0621 11:13:55.697329 43334 task_signals.go:458] [ 1404( 6): 1404( 6)] Discarding duplicate signal 9 D0621 11:13:55.697577 43334 task_exit.go:204] [ 1404( 6): 1404( 6)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:55.698432 43334 task_exit.go:204] [ 1399( 1): 1399( 1)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:55.699186 43334 task_signals.go:470] [ 1: 1] Notified of signal 17 D0621 11:13:55.700654 43334 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0621 11:13:55.700856 43334 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0621 11:13:55.706912 43334 task_signals.go:470] [ 8: 13] Notified of signal 23 D0621 11:13:55.707384 43334 task_signals.go:220] [ 8: 13] Signal 23: delivering to handler D0621 11:13:55.729556 43334 task_signals.go:470] [ 8: 13] Notified of signal 23 D0621 11:13:55.730944 43334 task_signals.go:220] [ 8: 13] Signal 23: delivering to handler D0621 11:13:55.760118 43334 task_signals.go:470] [ 8: 13] Notified of signal 23 D0621 11:13:55.760979 43334 task_signals.go:220] [ 8: 13] Signal 23: delivering to handler D0621 11:13:55.774126 43334 task_signals.go:470] [ 8: 13] Notified of signal 23 D0621 11:13:55.774533 43334 task_signals.go:220] [ 8: 13] Signal 23: delivering to handler D0621 11:13:55.795029 43334 task_stop.go:118] [ 8: 13] Entering internal stop (*kernel.vforkStop)(nil) D0621 11:13:55.796149 43334 task_signals.go:481] [ 8: 13] No task notified of signal 23 D0621 11:13:55.829642 43334 syscalls.go:262] [ 1406: 1406] Allocating stack with size of 8388608 bytes D0621 11:13:55.833167 43334 task_stop.go:138] [ 8: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0621 11:13:55.834242 43334 task_signals.go:220] [ 8: 13] Signal 23: delivering to handler D0621 11:13:55.839287 43334 usertrap_amd64.go:210] [ 1406: 1406] Found the pattern at ip 55b6fb6317a3:sysno 218 D0621 11:13:55.839644 43334 usertrap_amd64.go:106] [ 1406: 1406] Map a usertrap vma at 62000 D0621 11:13:55.840507 43334 usertrap_amd64.go:122] [ 1406: 1406] Allocate a new trap: 0xc004886300 1 D0621 11:13:55.840868 43334 usertrap_amd64.go:223] [ 1406: 1406] Apply the binary patch addr 55b6fb6317a3 trap addr 62050 ([184 218 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0621 11:13:55.842711 43334 usertrap_amd64.go:210] [ 1406: 1406] Found the pattern at ip 55b6fb631836:sysno 334 D0621 11:13:55.842774 43334 usertrap_amd64.go:122] [ 1406: 1406] Allocate a new trap: 0xc004886300 2 D0621 11:13:55.842902 43334 usertrap_amd64.go:223] [ 1406: 1406] Apply the binary patch addr 55b6fb631836 trap addr 620a0 ([184 78 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0621 11:13:55.847088 43334 usertrap_amd64.go:210] [ 1406: 1406] Found the pattern at ip 55b6fb641ac9:sysno 318 D0621 11:13:55.847185 43334 usertrap_amd64.go:122] [ 1406: 1406] Allocate a new trap: 0xc004886300 3 D0621 11:13:55.847345 43334 usertrap_amd64.go:223] [ 1406: 1406] Apply the binary patch addr 55b6fb641ac9 trap addr 620f0 ([184 62 1 0 0 15 5] -> [255 36 37 240 32 6 0]) D0621 11:13:55.849583 43334 usertrap_amd64.go:210] [ 1406: 1406] Found the pattern at ip 55b6fb627d00:sysno 12 D0621 11:13:55.849680 43334 usertrap_amd64.go:122] [ 1406: 1406] Allocate a new trap: 0xc004886300 4 D0621 11:13:55.849852 43334 usertrap_amd64.go:223] [ 1406: 1406] Apply the binary patch addr 55b6fb627d00 trap addr 62140 ([184 12 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0621 11:13:55.854341 43334 usertrap_amd64.go:210] [ 1406: 1406] Found the pattern at ip 55b6fb628160:sysno 10 D0621 11:13:55.854408 43334 usertrap_amd64.go:122] [ 1406: 1406] Allocate a new trap: 0xc004886300 5 D0621 11:13:55.854551 43334 usertrap_amd64.go:223] [ 1406: 1406] Apply the binary patch addr 55b6fb628160 trap addr 62190 ([184 10 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0621 11:13:55.858384 43334 usertrap_amd64.go:210] [ 1406: 1406] Found the pattern at ip 55b6fb629446:sysno 157 D0621 11:13:55.858485 43334 usertrap_amd64.go:122] [ 1406: 1406] Allocate a new trap: 0xc004886300 6 D0621 11:13:55.858641 43334 usertrap_amd64.go:223] [ 1406: 1406] Apply the binary patch addr 55b6fb629446 trap addr 621e0 ([184 157 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0621 11:13:55.860876 43334 usertrap_amd64.go:210] [ 1406: 1406] Found the pattern at ip 55b6fb6280dc:sysno 9 D0621 11:13:55.860965 43334 usertrap_amd64.go:122] [ 1406: 1406] Allocate a new trap: 0xc004886300 7 D0621 11:13:55.861151 43334 usertrap_amd64.go:223] [ 1406: 1406] Apply the binary patch addr 55b6fb6280dc trap addr 62230 ([184 9 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0621 11:13:55.862412 43334 usertrap_amd64.go:210] [ 1406: 1406] Found the pattern at ip 55b6fb5eb5a8:sysno 13 D0621 11:13:55.862533 43334 usertrap_amd64.go:122] [ 1406: 1406] Allocate a new trap: 0xc004886300 8 D0621 11:13:55.862680 43334 usertrap_amd64.go:223] [ 1406: 1406] Apply the binary patch addr 55b6fb5eb5a8 trap addr 62280 ([184 13 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0621 11:13:55.865378 43334 usertrap_amd64.go:210] [ 1406: 1406] Found the pattern at ip 55b6fb625820:sysno 39 D0621 11:13:55.865456 43334 usertrap_amd64.go:122] [ 1406: 1406] Allocate a new trap: 0xc004886300 9 D0621 11:13:55.865652 43334 usertrap_amd64.go:223] [ 1406: 1406] Apply the binary patch addr 55b6fb625820 trap addr 622d0 ([184 39 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0621 11:13:55.868369 43334 usertrap_amd64.go:210] [ 1406: 1406] Found the pattern at ip 55b6fb626f69:sysno 3 D0621 11:13:55.868456 43334 usertrap_amd64.go:122] [ 1406: 1406] Allocate a new trap: 0xc004886300 10 D0621 11:13:55.868599 43334 usertrap_amd64.go:223] [ 1406: 1406] Apply the binary patch addr 55b6fb626f69 trap addr 62320 ([184 3 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0621 11:13:55.870985 43334 usertrap_amd64.go:210] [ 1406: 1406] Found the pattern at ip 55b6fb653c00:sysno 83 D0621 11:13:55.871163 43334 usertrap_amd64.go:122] [ 1406: 1406] Allocate a new trap: 0xc004886300 11 D0621 11:13:55.871439 43334 usertrap_amd64.go:223] [ 1406: 1406] Apply the binary patch addr 55b6fb653c00 trap addr 62370 ([184 83 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0621 11:13:55.875544 43334 usertrap_amd64.go:210] [ 1406: 1406] Found the pattern at ip 55b6fb626b70:sysno 90 D0621 11:13:55.875649 43334 usertrap_amd64.go:122] [ 1406: 1406] Allocate a new trap: 0xc004886300 12 D0621 11:13:55.875844 43334 usertrap_amd64.go:223] [ 1406: 1406] Apply the binary patch addr 55b6fb626b70 trap addr 623c0 ([184 90 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0621 11:13:55.876750 43334 usertrap_amd64.go:210] [ 1406: 1406] Found the pattern at ip 55b6fb627020:sysno 80 D0621 11:13:55.876816 43334 usertrap_amd64.go:122] [ 1406: 1406] Allocate a new trap: 0xc004886300 13 D0621 11:13:55.876968 43334 usertrap_amd64.go:223] [ 1406: 1406] Apply the binary patch addr 55b6fb627020 trap addr 62410 ([184 80 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0621 11:13:55.878923 43334 usertrap_amd64.go:210] [ 1406: 1406] Found the pattern at ip 55b6fb626ff0:sysno 33 D0621 11:13:55.879026 43334 usertrap_amd64.go:122] [ 1406: 1406] Allocate a new trap: 0xc004886300 14 D0621 11:13:55.879211 43334 usertrap_amd64.go:223] [ 1406: 1406] Apply the binary patch addr 55b6fb626ff0 trap addr 62460 ([184 33 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0621 11:13:55.881413 43334 usertrap_amd64.go:210] [ 1406: 1406] Found the pattern at ip 55b6fb626c1a:sysno 257 D0621 11:13:55.881538 43334 usertrap_amd64.go:122] [ 1406: 1406] Allocate a new trap: 0xc004886300 15 D0621 11:13:55.881772 43334 usertrap_amd64.go:223] [ 1406: 1406] Apply the binary patch addr 55b6fb626c1a trap addr 624b0 ([184 1 1 0 0 15 5] -> [255 36 37 176 36 6 0]) D0621 11:13:55.884060 43334 usertrap_amd64.go:210] [ 1406: 1406] Found the pattern at ip 55b6fb627e04:sysno 16 D0621 11:13:55.884130 43334 usertrap_amd64.go:122] [ 1406: 1406] Allocate a new trap: 0xc004886300 16 D0621 11:13:55.884402 43334 usertrap_amd64.go:223] [ 1406: 1406] Apply the binary patch addr 55b6fb627e04 trap addr 62500 ([184 16 0 0 0 15 5] -> [255 36 37 0 37 6 0]) D0621 11:13:55.903966 43334 usertrap_amd64.go:210] [ 1406: 1406] Found the pattern at ip 55b6fb629800:sysno 272 D0621 11:13:55.904068 43334 usertrap_amd64.go:122] [ 1406: 1406] Allocate a new trap: 0xc004886300 17 D0621 11:13:55.904234 43334 usertrap_amd64.go:223] [ 1406: 1406] Apply the binary patch addr 55b6fb629800 trap addr 62550 ([184 16 1 0 0 15 5] -> [255 36 37 80 37 6 0]) D0621 11:13:55.905073 43334 usertrap_amd64.go:210] [ 1406: 1406] Found the pattern at ip 55b6fb6250cc:sysno 56 D0621 11:13:55.905143 43334 usertrap_amd64.go:122] [ 1406: 1406] Allocate a new trap: 0xc004886300 18 D0621 11:13:55.905290 43334 usertrap_amd64.go:223] [ 1406: 1406] Apply the binary patch addr 55b6fb6250cc trap addr 625a0 ([184 56 0 0 0 15 5] -> [255 36 37 160 37 6 0]) D0621 11:13:55.929910 43334 usertrap_amd64.go:210] [ 1407( 1): 1407( 1)] Found the pattern at ip 55b6fb625106:sysno 273 D0621 11:13:55.930357 43334 usertrap_amd64.go:122] [ 1407( 1): 1407( 1)] Allocate a new trap: 0xc003e041e0 19 D0621 11:13:55.932520 43334 usertrap_amd64.go:210] [ 1406: 1406] Found the pattern at ip 55b6fb624a8c:sysno 61 D0621 11:13:55.932677 43334 usertrap_amd64.go:122] [ 1406: 1406] Allocate a new trap: 0xc004886300 19 D0621 11:13:55.934587 43334 usertrap_amd64.go:223] [ 1407( 1): 1407( 1)] Apply the binary patch addr 55b6fb625106 trap addr 625f0 ([184 17 1 0 0 15 5] -> [255 36 37 240 37 6 0]) D0621 11:13:55.936410 43334 usertrap_amd64.go:223] [ 1406: 1406] Apply the binary patch addr 55b6fb624a8c trap addr 625f0 ([184 61 0 0 0 15 5] -> [255 36 37 240 37 6 0]) D0621 11:13:55.955291 43334 usertrap_amd64.go:210] [ 1407( 1): 1407( 1)] Found the pattern at ip 55b6fb6297a3:sysno 165 D0621 11:13:55.955442 43334 usertrap_amd64.go:122] [ 1407( 1): 1407( 1)] Allocate a new trap: 0xc003e041e0 20 D0621 11:13:55.955719 43334 usertrap_amd64.go:223] [ 1407( 1): 1407( 1)] Apply the binary patch addr 55b6fb6297a3 trap addr 62640 ([184 165 0 0 0 15 5] -> [255 36 37 64 38 6 0]) D0621 11:13:55.959522 43334 usertrap_amd64.go:210] [ 1407( 1): 1407( 1)] Found the pattern at ip 55b6fb625860:sysno 112 D0621 11:13:55.959841 43334 usertrap_amd64.go:122] [ 1407( 1): 1407( 1)] Allocate a new trap: 0xc003e041e0 21 D0621 11:13:55.960124 43334 usertrap_amd64.go:223] [ 1407( 1): 1407( 1)] Apply the binary patch addr 55b6fb625860 trap addr 62690 ([184 112 0 0 0 15 5] -> [255 36 37 144 38 6 0]) D0621 11:13:55.976272 43334 usertrap_amd64.go:210] [ 1407( 1): 1407( 1)] Found the pattern at ip 55b6fb626da9:sysno 1 D0621 11:13:55.976433 43334 usertrap_amd64.go:122] [ 1407( 1): 1407( 1)] Allocate a new trap: 0xc003e041e0 22 D0621 11:13:55.976633 43334 usertrap_amd64.go:223] [ 1407( 1): 1407( 1)] Apply the binary patch addr 55b6fb626da9 trap addr 626e0 ([184 1 0 0 0 15 5] -> [255 36 37 224 38 6 0]) D0621 11:13:55.988937 43334 usertrap_amd64.go:210] [ 1407( 1): 1407( 1)] Found the pattern at ip 55b6fb629e20:sysno 41 D0621 11:13:55.989048 43334 usertrap_amd64.go:122] [ 1407( 1): 1407( 1)] Allocate a new trap: 0xc003e041e0 23 D0621 11:13:55.989227 43334 usertrap_amd64.go:223] [ 1407( 1): 1407( 1)] Apply the binary patch addr 55b6fb629e20 trap addr 62730 ([184 41 0 0 0 15 5] -> [255 36 37 48 39 6 0]) D0621 11:13:55.994757 43334 usertrap_amd64.go:210] [ 1407( 1): 1407( 1)] Found the pattern at ip 55b6fb627960:sysno 3 D0621 11:13:55.994943 43334 usertrap_amd64.go:122] [ 1407( 1): 1407( 1)] Allocate a new trap: 0xc003e041e0 24 D0621 11:13:55.995227 43334 usertrap_amd64.go:223] [ 1407( 1): 1407( 1)] Apply the binary patch addr 55b6fb627960 trap addr 62780 ([184 3 0 0 0 15 5] -> [255 36 37 128 39 6 0]) D0621 11:13:55.999660 43334 usertrap_amd64.go:210] [ 1407( 1): 1407( 1)] Found the pattern at ip 55b6fb629d3c:sysno 44 D0621 11:13:55.999775 43334 usertrap_amd64.go:122] [ 1407( 1): 1407( 1)] Allocate a new trap: 0xc003e041e0 25 D0621 11:13:55.999998 43334 usertrap_amd64.go:223] [ 1407( 1): 1407( 1)] Apply the binary patch addr 55b6fb629d3c trap addr 627d0 ([184 44 0 0 0 15 5] -> [255 36 37 208 39 6 0]) D0621 11:13:56.001491 43334 usertrap_amd64.go:210] [ 1407( 1): 1407( 1)] Found the pattern at ip 55b6fb629c82:sysno 45 D0621 11:13:56.001576 43334 usertrap_amd64.go:122] [ 1407( 1): 1407( 1)] Allocate a new trap: 0xc003e041e0 26 D0621 11:13:56.001730 43334 usertrap_amd64.go:223] [ 1407( 1): 1407( 1)] Apply the binary patch addr 55b6fb629c82 trap addr 62820 ([184 45 0 0 0 15 5] -> [255 36 37 32 40 6 0]) W0621 11:13:56.005167 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:56.010497 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:56.047993 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:56.253516 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 5 W0621 11:13:56.268031 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 5 W0621 11:13:56.276309 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 5 W0621 11:13:56.285004 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 5 W0621 11:13:56.293952 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 5 W0621 11:13:56.301302 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 5 W0621 11:13:56.308716 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 5 W0621 11:13:56.324578 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 5 W0621 11:13:56.329878 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 5 W0621 11:13:56.358783 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:56.393018 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:56.467432 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:56.561996 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:56.581043 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:56.603878 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:56.623891 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:56.642364 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:56.661556 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:56.681870 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:56.701689 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:56.722698 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:56.750057 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:56.775662 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:56.801927 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:56.825039 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:56.849668 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:56.897753 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.014525 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.038045 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.064840 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.089214 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.112358 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.138575 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.161930 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.191322 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.218065 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.243503 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.274991 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.304418 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.334466 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.362781 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.390139 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.418306 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.447383 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.476380 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.503760 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.530187 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.558728 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.586275 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.617845 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.646455 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 W0621 11:13:57.680128 43334 stack.go:140] [ 1407( 1): 1407( 1)] unexpected attribute: 1 D0621 11:13:57.774358 43334 usertrap_amd64.go:210] [ 1407( 1): 1407( 1)] Found the pattern at ip 55b6fb626ba0:sysno 258 D0621 11:13:57.774488 43334 usertrap_amd64.go:122] [ 1407( 1): 1407( 1)] Allocate a new trap: 0xc003e041e0 27 D0621 11:13:57.774682 43334 usertrap_amd64.go:223] [ 1407( 1): 1407( 1)] Apply the binary patch addr 55b6fb626ba0 trap addr 62870 ([184 2 1 0 0 15 5] -> [255 36 37 112 40 6 0]) D0621 11:13:57.778388 43334 usertrap_amd64.go:210] [ 1407( 1): 1407( 1)] Found the pattern at ip 55b6fb629c43:sysno 55 D0621 11:13:57.778483 43334 usertrap_amd64.go:122] [ 1407( 1): 1407( 1)] Allocate a new trap: 0xc003e041e0 28 D0621 11:13:57.778662 43334 usertrap_amd64.go:223] [ 1407( 1): 1407( 1)] Apply the binary patch addr 55b6fb629c43 trap addr 628c0 ([184 55 0 0 0 15 5] -> [255 36 37 192 40 6 0]) D0621 11:13:57.828235 43334 usertrap_amd64.go:210] [ 1407( 1): 1407( 1)] Found the pattern at ip 55b6fb65346c:sysno 230 D0621 11:13:57.828416 43334 usertrap_amd64.go:122] [ 1407( 1): 1407( 1)] Allocate a new trap: 0xc003e041e0 29 D0621 11:13:57.831307 43334 usertrap_amd64.go:223] [ 1407( 1): 1407( 1)] Apply the binary patch addr 55b6fb65346c trap addr 62910 ([184 230 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0621 11:13:57.836315 43334 usertrap_amd64.go:210] [ 1408( 2): 1408( 2)] Found the pattern at ip 55b6fb653b60:sysno 109 D0621 11:13:57.836585 43334 usertrap_amd64.go:122] [ 1408( 2): 1408( 2)] Allocate a new trap: 0xc004533080 29 D0621 11:13:57.837185 43334 usertrap_amd64.go:223] [ 1408( 2): 1408( 2)] Apply the binary patch addr 55b6fb653b60 trap addr 62910 ([184 109 0 0 0 15 5] -> [255 36 37 16 41 6 0]) D0621 11:13:57.841729 43334 usertrap_amd64.go:210] [ 1408( 2): 1408( 2)] Found the pattern at ip 55b6fb627820:sysno 266 D0621 11:13:57.841870 43334 usertrap_amd64.go:122] [ 1408( 2): 1408( 2)] Allocate a new trap: 0xc004533080 30 D0621 11:13:57.842175 43334 usertrap_amd64.go:223] [ 1408( 2): 1408( 2)] Apply the binary patch addr 55b6fb627820 trap addr 62960 ([184 10 1 0 0 15 5] -> [255 36 37 96 41 6 0]) D0621 11:13:57.846424 43334 usertrap_amd64.go:210] [ 1407( 1): 1407( 1)] Found the pattern at ip 55b6fb624a8c:sysno 61 D0621 11:13:57.846578 43334 usertrap_amd64.go:122] [ 1407( 1): 1407( 1)] Allocate a new trap: 0xc003e041e0 30 D0621 11:13:57.846875 43334 usertrap_amd64.go:223] [ 1407( 1): 1407( 1)] Apply the binary patch addr 55b6fb624a8c trap addr 62960 ([184 61 0 0 0 15 5] -> [255 36 37 96 41 6 0]) D0621 11:13:57.864583 43334 usertrap_amd64.go:210] [ 1408( 2): 1408( 2)] Found the pattern at ip 55b6fb5fcf92:sysno 14 D0621 11:13:57.864716 43334 usertrap_amd64.go:122] [ 1408( 2): 1408( 2)] Allocate a new trap: 0xc004533080 31 D0621 11:13:57.864908 43334 usertrap_amd64.go:223] [ 1408( 2): 1408( 2)] Apply the binary patch addr 55b6fb5fcf92 trap addr 629b0 ([184 14 0 0 0 15 5] -> [255 36 37 176 41 6 0]) D0621 11:13:57.881122 43334 usertrap_amd64.go:210] [ 1408( 2): 1408( 2)] Found the pattern at ip 55b6fb653e92:sysno 435 D0621 11:13:57.881335 43334 usertrap_amd64.go:122] [ 1408( 2): 1408( 2)] Allocate a new trap: 0xc004533080 32 D0621 11:13:57.881507 43334 usertrap_amd64.go:223] [ 1408( 2): 1408( 2)] Apply the binary patch addr 55b6fb653e92 trap addr 62a00 ([184 179 1 0 0 15 5] -> [255 36 37 0 42 6 0]) D0621 11:13:57.886636 43334 usertrap_amd64.go:210] [ 1408( 2): 1408( 2)] Found the pattern at ip 55b6fb5fcf00:sysno 14 D0621 11:13:57.886716 43334 usertrap_amd64.go:122] [ 1408( 2): 1408( 2)] Allocate a new trap: 0xc004533080 33 D0621 11:13:57.886926 43334 usertrap_amd64.go:223] [ 1408( 2): 1408( 2)] Apply the binary patch addr 55b6fb5fcf00 trap addr 62a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0621 11:13:57.888051 43334 usertrap_amd64.go:210] [ 1408( 2): 1409( 3)] Found the pattern at ip 55b6fb5fc610:sysno 273 D0621 11:13:57.888228 43334 usertrap_amd64.go:122] [ 1408( 2): 1409( 3)] Allocate a new trap: 0xc004533080 34 D0621 11:13:57.888736 43334 usertrap_amd64.go:223] [ 1408( 2): 1409( 3)] Apply the binary patch addr 55b6fb5fc610 trap addr 62aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 42 6 0]) D0621 11:13:57.967974 43334 task_stop.go:118] [ 1407( 1): 1407( 1)] Entering internal stop &kernel.ptraceStop{frozen:false, listen:false} D0621 11:13:57.968279 43334 task_signals.go:470] [ 1408( 2): 1409( 3)] Notified of signal 17 D0621 11:13:57.973369 43334 task_signals.go:220] [ 1408( 2): 1409( 3)] Signal 17: delivering to handler D0621 11:13:58.031391 43334 task_exit.go:204] [ 1408( 2): 1408( 2)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:58.033679 43334 task_exit.go:204] [ 1408( 2): 1408( 2)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:58.037394 43334 task_signals.go:204] [ 1408( 2): 1409( 3)] Signal 9, PID: 1408, TID: 1409, fault addr: 0x0: terminating thread group D0621 11:13:58.037839 43334 task_exit.go:204] [ 1408( 2): 1409( 3)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:58.054004 43334 task_stop.go:138] [ 1407( 1): 1407( 1)] Leaving internal stop &kernel.ptraceStop{frozen:false, listen:false} D0621 11:13:58.054283 43334 task_exit.go:204] [ 1408( 2): 1409( 3)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:58.054363 43334 task_exit.go:204] [ 1408( 2): 1409( 3)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:58.054659 43334 task_signals.go:470] [ 1407( 1): 1407( 1)] Notified of signal 17 D0621 11:13:58.054988 43334 task_exit.go:204] [ 1408( 2): 1408( 2)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:58.055555 43334 task_signals.go:220] [ 1407( 1): 1407( 1)] Signal 17: delivering to handler D0621 11:13:58.057985 43334 usertrap_amd64.go:210] [ 1407( 1): 1407( 1)] Found the pattern at ip 55b6fb6293d0:sysno 166 D0621 11:13:58.058119 43334 usertrap_amd64.go:122] [ 1407( 1): 1407( 1)] Allocate a new trap: 0xc003e041e0 31 D0621 11:13:58.058382 43334 usertrap_amd64.go:223] [ 1407( 1): 1407( 1)] Apply the binary patch addr 55b6fb6293d0 trap addr 629b0 ([184 166 0 0 0 15 5] -> [255 36 37 176 41 6 0]) D0621 11:13:58.062910 43334 usertrap_amd64.go:210] [ 1407( 1): 1407( 1)] Found the pattern at ip 55b6fb626b43:sysno 262 D0621 11:13:58.062986 43334 usertrap_amd64.go:122] [ 1407( 1): 1407( 1)] Allocate a new trap: 0xc003e041e0 32 D0621 11:13:58.063180 43334 usertrap_amd64.go:223] [ 1407( 1): 1407( 1)] Apply the binary patch addr 55b6fb626b43 trap addr 62a00 ([184 6 1 0 0 15 5] -> [255 36 37 0 42 6 0]) D0621 11:13:58.070390 43334 usertrap_amd64.go:210] [ 1407( 1): 1407( 1)] Found the pattern at ip 55b6fb65359c:sysno 217 D0621 11:13:58.070487 43334 usertrap_amd64.go:122] [ 1407( 1): 1407( 1)] Allocate a new trap: 0xc003e041e0 33 D0621 11:13:58.070672 43334 usertrap_amd64.go:223] [ 1407( 1): 1407( 1)] Apply the binary patch addr 55b6fb65359c trap addr 62a50 ([184 217 0 0 0 15 5] -> [255 36 37 80 42 6 0]) D0621 11:13:58.074858 43334 usertrap_amd64.go:210] [ 1407( 1): 1407( 1)] Found the pattern at ip 55b6fb627850:sysno 87 D0621 11:13:58.074969 43334 usertrap_amd64.go:122] [ 1407( 1): 1407( 1)] Allocate a new trap: 0xc003e041e0 34 D0621 11:13:58.075145 43334 usertrap_amd64.go:223] [ 1407( 1): 1407( 1)] Apply the binary patch addr 55b6fb627850 trap addr 62aa0 ([184 87 0 0 0 15 5] -> [255 36 37 160 42 6 0]) D0621 11:13:58.079051 43334 usertrap_amd64.go:210] [ 1407( 1): 1407( 1)] Found the pattern at ip 55b6fb627880:sysno 263 D0621 11:13:58.079217 43334 usertrap_amd64.go:122] [ 1407( 1): 1407( 1)] Allocate a new trap: 0xc003e041e0 35 D0621 11:13:58.079478 43334 usertrap_amd64.go:223] [ 1407( 1): 1407( 1)] Apply the binary patch addr 55b6fb627880 trap addr 62af0 ([184 7 1 0 0 15 5] -> [255 36 37 240 42 6 0]) D0621 11:13:58.130671 43334 usertrap_amd64.go:210] [ 1410( 4): 1410( 4)] Found the pattern at ip 55b6fb653b60:sysno 109 D0621 11:13:58.130898 43334 usertrap_amd64.go:122] [ 1410( 4): 1410( 4)] Allocate a new trap: 0xc00197c060 36 D0621 11:13:58.132417 43334 usertrap_amd64.go:223] [ 1410( 4): 1410( 4)] Apply the binary patch addr 55b6fb653b60 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0621 11:13:58.139223 43334 usertrap_amd64.go:210] [ 1410( 4): 1410( 4)] Found the pattern at ip 55b6fb627820:sysno 266 D0621 11:13:58.139341 43334 usertrap_amd64.go:122] [ 1410( 4): 1410( 4)] Allocate a new trap: 0xc00197c060 37 D0621 11:13:58.139521 43334 usertrap_amd64.go:223] [ 1410( 4): 1410( 4)] Apply the binary patch addr 55b6fb627820 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0621 11:13:58.160297 43334 usertrap_amd64.go:210] [ 1410( 4): 1410( 4)] Found the pattern at ip 55b6fb5fcf92:sysno 14 D0621 11:13:58.160452 43334 usertrap_amd64.go:122] [ 1410( 4): 1410( 4)] Allocate a new trap: 0xc00197c060 38 D0621 11:13:58.160677 43334 usertrap_amd64.go:223] [ 1410( 4): 1410( 4)] Apply the binary patch addr 55b6fb5fcf92 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0621 11:13:58.169604 43334 usertrap_amd64.go:210] [ 1410( 4): 1410( 4)] Found the pattern at ip 55b6fb653e92:sysno 435 D0621 11:13:58.169712 43334 usertrap_amd64.go:122] [ 1410( 4): 1410( 4)] Allocate a new trap: 0xc00197c060 39 D0621 11:13:58.169962 43334 usertrap_amd64.go:223] [ 1410( 4): 1410( 4)] Apply the binary patch addr 55b6fb653e92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0621 11:13:58.176043 43334 usertrap_amd64.go:210] [ 1410( 4): 1410( 4)] Found the pattern at ip 55b6fb5fcf00:sysno 14 D0621 11:13:58.176186 43334 usertrap_amd64.go:122] [ 1410( 4): 1410( 4)] Allocate a new trap: 0xc00197c060 40 D0621 11:13:58.176813 43334 usertrap_amd64.go:223] [ 1410( 4): 1410( 4)] Apply the binary patch addr 55b6fb5fcf00 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0621 11:13:58.177569 43334 usertrap_amd64.go:210] [ 1410( 4): 1411( 5)] Found the pattern at ip 55b6fb5fc610:sysno 273 D0621 11:13:58.177688 43334 usertrap_amd64.go:122] [ 1410( 4): 1411( 5)] Allocate a new trap: 0xc00197c060 41 D0621 11:13:58.177883 43334 usertrap_amd64.go:223] [ 1410( 4): 1411( 5)] Apply the binary patch addr 55b6fb5fc610 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0621 11:13:58.208257 43334 task_exit.go:204] [ 1410( 4): 1410( 4)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:58.210468 43334 task_exit.go:204] [ 1410( 4): 1410( 4)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:58.211365 43334 task_signals.go:204] [ 1410( 4): 1411( 5)] Signal 9, PID: 1410, TID: 1411, fault addr: 0x0: terminating thread group D0621 11:13:58.211571 43334 task_exit.go:204] [ 1410( 4): 1411( 5)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:58.228241 43334 task_exit.go:204] [ 1410( 4): 1411( 5)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:58.228358 43334 task_exit.go:204] [ 1410( 4): 1411( 5)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:58.228596 43334 task_signals.go:470] [ 1407( 1): 1407( 1)] Notified of signal 17 D0621 11:13:58.228992 43334 task_signals.go:176] [ 1407( 1): 1407( 1)] Not restarting syscall 230 after error interrupted by signal: interrupted by signal 17 D0621 11:13:58.229126 43334 task_signals.go:220] [ 1407( 1): 1407( 1)] Signal 17: delivering to handler D0621 11:13:58.231824 43334 task_exit.go:204] [ 1410( 4): 1410( 4)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:58.297118 43334 usertrap_amd64.go:210] [ 1412( 6): 1412( 6)] Found the pattern at ip 55b6fb653b60:sysno 109 D0621 11:13:58.297524 43334 usertrap_amd64.go:122] [ 1412( 6): 1412( 6)] Allocate a new trap: 0xc001762a20 36 D0621 11:13:58.299241 43334 usertrap_amd64.go:223] [ 1412( 6): 1412( 6)] Apply the binary patch addr 55b6fb653b60 trap addr 62b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 43 6 0]) D0621 11:13:58.309052 43334 usertrap_amd64.go:210] [ 1412( 6): 1412( 6)] Found the pattern at ip 55b6fb627820:sysno 266 D0621 11:13:58.309154 43334 usertrap_amd64.go:122] [ 1412( 6): 1412( 6)] Allocate a new trap: 0xc001762a20 37 D0621 11:13:58.309344 43334 usertrap_amd64.go:223] [ 1412( 6): 1412( 6)] Apply the binary patch addr 55b6fb627820 trap addr 62b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 43 6 0]) D0621 11:13:58.330571 43334 usertrap_amd64.go:210] [ 1412( 6): 1412( 6)] Found the pattern at ip 55b6fb5fcf92:sysno 14 D0621 11:13:58.330666 43334 usertrap_amd64.go:122] [ 1412( 6): 1412( 6)] Allocate a new trap: 0xc001762a20 38 D0621 11:13:58.330876 43334 usertrap_amd64.go:223] [ 1412( 6): 1412( 6)] Apply the binary patch addr 55b6fb5fcf92 trap addr 62be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 43 6 0]) D0621 11:13:58.339043 43334 usertrap_amd64.go:210] [ 1412( 6): 1412( 6)] Found the pattern at ip 55b6fb653e92:sysno 435 D0621 11:13:58.339163 43334 usertrap_amd64.go:122] [ 1412( 6): 1412( 6)] Allocate a new trap: 0xc001762a20 39 D0621 11:13:58.339357 43334 usertrap_amd64.go:223] [ 1412( 6): 1412( 6)] Apply the binary patch addr 55b6fb653e92 trap addr 62c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 44 6 0]) D0621 11:13:58.344598 43334 usertrap_amd64.go:210] [ 1412( 6): 1412( 6)] Found the pattern at ip 55b6fb5fcf00:sysno 14 D0621 11:13:58.344677 43334 usertrap_amd64.go:122] [ 1412( 6): 1412( 6)] Allocate a new trap: 0xc001762a20 40 D0621 11:13:58.344992 43334 usertrap_amd64.go:223] [ 1412( 6): 1412( 6)] Apply the binary patch addr 55b6fb5fcf00 trap addr 62c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0621 11:13:58.345471 43334 usertrap_amd64.go:210] [ 1412( 6): 1413( 7)] Found the pattern at ip 55b6fb5fc610:sysno 273 D0621 11:13:58.345566 43334 usertrap_amd64.go:122] [ 1412( 6): 1413( 7)] Allocate a new trap: 0xc001762a20 41 D0621 11:13:58.345734 43334 usertrap_amd64.go:223] [ 1412( 6): 1413( 7)] Apply the binary patch addr 55b6fb5fc610 trap addr 62cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0621 11:13:58.357647 43334 task_signals.go:470] [ 1407( 1): 1407( 1)] Notified of signal 19 D0621 11:13:58.358125 43334 ptrace.go:668] [ 1407( 1): 1407( 1)] Entering signal-delivery-stop for signal 19 D0621 11:13:58.358248 43334 task_stop.go:118] [ 1407( 1): 1407( 1)] Entering internal stop &kernel.ptraceStop{frozen:false, listen:false} D0621 11:13:58.358416 43334 task_signals.go:470] [ 1412( 6): 1413( 7)] Notified of signal 17 D0621 11:13:58.365052 43334 task_signals.go:220] [ 1412( 6): 1413( 7)] Signal 17: delivering to handler D0621 11:13:58.437636 43334 task_exit.go:204] [ 1412( 6): 1412( 6)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:58.438036 43334 task_signals.go:470] [ 8: 13] Notified of signal 23 D0621 11:13:58.438814 43334 task_signals.go:220] [ 8: 13] Signal 23: delivering to handler D0621 11:13:58.440594 43334 task_exit.go:204] [ 1412( 6): 1412( 6)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:58.451898 43334 task_signals.go:204] [ 1412( 6): 1413( 7)] Signal 9, PID: 1412, TID: 1413, fault addr: 0x0: terminating thread group D0621 11:13:58.452163 43334 task_exit.go:204] [ 1412( 6): 1413( 7)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:13:58.469988 43334 task_stop.go:138] [ 1407( 1): 1407( 1)] Leaving internal stop &kernel.ptraceStop{frozen:false, listen:false} D0621 11:13:58.470245 43334 task_exit.go:204] [ 1412( 6): 1413( 7)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:13:58.470349 43334 task_exit.go:204] [ 1412( 6): 1413( 7)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:13:58.470641 43334 task_signals.go:481] [ 1407( 1): 1407( 1)] No task notified of signal 17 D0621 11:13:58.470980 43334 task_signals.go:808] [ 1407( 1): 1407( 1)] Signal 19: stopping 1 threads in thread group D0621 11:13:58.471085 43334 task_signals.go:885] [ 1407( 1): 1407( 1)] Completing group stop D0621 11:13:58.471197 43334 task_stop.go:118] [ 1407( 1): 1407( 1)] Entering internal stop (*kernel.groupStop)(nil) D0621 11:13:58.471350 43334 task_signals.go:470] [ 1406: 1406] Notified of signal 17 D0621 11:13:58.471846 43334 task_signals.go:176] [ 1406: 1406] Not restarting syscall 61 after error to be restarted if SA_RESTART is set: interrupted by signal 17 D0621 11:13:58.471930 43334 task_signals.go:220] [ 1406: 1406] Signal 17: delivering to handler D0621 11:14:05.437389 43334 task_signals.go:470] [ 8: 13] Notified of signal 23 D0621 11:14:05.437811 43334 task_signals.go:179] [ 8: 13] Restarting syscall 202: interrupted by signal 23 D0621 11:14:05.437900 43334 task_signals.go:220] [ 8: 13] Signal 23: delivering to handler I0621 11:14:23.161891 43334 watchdog.go:295] Watchdog starting loop, tasks: 46, discount: 0s D0621 11:14:23.238107 43334 task_signals.go:470] [ 1406: 1406] Notified of signal 9 D0621 11:14:23.238667 43334 task_signals.go:470] [ 8: 13] Notified of signal 23 D0621 11:14:23.238671 43334 task_signals.go:204] [ 1406: 1406] Signal 9, PID: 1406, TID: 1406, fault addr: 0x0: terminating thread group D0621 11:14:23.238989 43334 task_exit.go:204] [ 1406: 1406] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:14:23.239186 43334 task_signals.go:179] [ 8: 13] Restarting syscall 202: interrupted by signal 23 D0621 11:14:23.239306 43334 task_signals.go:220] [ 8: 13] Signal 23: delivering to handler D0621 11:14:23.255225 43334 task_stop.go:138] [ 1407( 1): 1407( 1)] Leaving internal stop (*kernel.groupStop)(nil) D0621 11:14:23.255435 43334 task_signals.go:481] [ 1407( 1): 1407( 1)] No task notified of signal 9 D0621 11:14:23.255573 43334 task_exit.go:204] [ 1406: 1406] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:14:23.255769 43334 task_signals.go:470] [ 8: 8] Notified of signal 17 D0621 11:14:23.256305 43334 task_signals.go:179] [ 8: 8] Restarting syscall 202: interrupted by signal 17 D0621 11:14:23.256417 43334 task_signals.go:220] [ 8: 8] Signal 17: delivering to handler D0621 11:14:23.256895 43334 task_exit.go:204] [ 1406: 1406] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:14:23.257349 43334 task_signals.go:204] [ 1407( 1): 1407( 1)] Signal 9, PID: 1407, TID: 1407, fault addr: 0x0: terminating thread group D0621 11:14:23.257592 43334 task_exit.go:204] [ 1407( 1): 1407( 1)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:14:23.281304 43334 task_exit.go:361] [ 1407( 1): 1407( 1)] Init process terminating, killing namespace D0621 11:14:23.281829 43334 task_signals.go:481] [ 1412( 6): 1412( 6)] No task notified of signal 9 D0621 11:14:23.282162 43334 task_signals.go:458] [ 1412( 6): 1412( 6)] Discarding duplicate signal 9 D0621 11:14:23.282287 43334 task_exit.go:204] [ 1412( 6): 1412( 6)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:14:23.282647 43334 task_exit.go:204] [ 1407( 1): 1407( 1)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:14:23.282927 43334 task_signals.go:470] [ 1: 1] Notified of signal 17 D0621 11:14:23.283361 43334 task_signals.go:470] [ 8: 24] Notified of signal 13 D0621 11:14:23.283628 43334 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0621 11:14:23.283633 43334 task_signals.go:220] [ 8: 24] Signal 13: delivering to handler D0621 11:14:23.283691 43334 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0621 11:14:23.290657 43334 task_signals.go:470] [ 8: 24] Notified of signal 23 D0621 11:14:23.291081 43334 task_signals.go:220] [ 8: 24] Signal 23: delivering to handler D0621 11:14:23.311094 43334 task_signals.go:470] [ 8: 24] Notified of signal 23 D0621 11:14:23.312512 43334 task_signals.go:220] [ 8: 24] Signal 23: delivering to handler D0621 11:14:23.333553 43334 task_stop.go:118] [ 8: 24] Entering internal stop (*kernel.vforkStop)(nil) D0621 11:14:23.333982 43334 task_signals.go:481] [ 8: 24] No task notified of signal 23 D0621 11:14:23.371592 43334 syscalls.go:262] [ 1414: 1414] Allocating stack with size of 8388608 bytes D0621 11:14:23.376001 43334 task_stop.go:138] [ 8: 24] Leaving internal stop (*kernel.vforkStop)(nil) D0621 11:14:23.377154 43334 task_signals.go:220] [ 8: 24] Signal 23: delivering to handler D0621 11:14:23.382154 43334 usertrap_amd64.go:210] [ 1414: 1414] Found the pattern at ip 558f3c2327a3:sysno 218 D0621 11:14:23.382530 43334 usertrap_amd64.go:106] [ 1414: 1414] Map a usertrap vma at 64000 D0621 11:14:23.383924 43334 usertrap_amd64.go:122] [ 1414: 1414] Allocate a new trap: 0xc007546c90 1 D0621 11:14:23.384783 43334 usertrap_amd64.go:223] [ 1414: 1414] Apply the binary patch addr 558f3c2327a3 trap addr 64050 ([184 218 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0621 11:14:23.389034 43334 usertrap_amd64.go:210] [ 1414: 1414] Found the pattern at ip 558f3c232836:sysno 334 D0621 11:14:23.389191 43334 usertrap_amd64.go:122] [ 1414: 1414] Allocate a new trap: 0xc007546c90 2 D0621 11:14:23.389427 43334 usertrap_amd64.go:223] [ 1414: 1414] Apply the binary patch addr 558f3c232836 trap addr 640a0 ([184 78 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0621 11:14:23.393883 43334 usertrap_amd64.go:210] [ 1414: 1414] Found the pattern at ip 558f3c242ac9:sysno 318 D0621 11:14:23.394018 43334 usertrap_amd64.go:122] [ 1414: 1414] Allocate a new trap: 0xc007546c90 3 D0621 11:14:23.394278 43334 usertrap_amd64.go:223] [ 1414: 1414] Apply the binary patch addr 558f3c242ac9 trap addr 640f0 ([184 62 1 0 0 15 5] -> [255 36 37 240 64 6 0]) D0621 11:14:23.398136 43334 usertrap_amd64.go:210] [ 1414: 1414] Found the pattern at ip 558f3c228d00:sysno 12 D0621 11:14:23.398255 43334 usertrap_amd64.go:122] [ 1414: 1414] Allocate a new trap: 0xc007546c90 4 D0621 11:14:23.398530 43334 usertrap_amd64.go:223] [ 1414: 1414] Apply the binary patch addr 558f3c228d00 trap addr 64140 ([184 12 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0621 11:14:23.404558 43334 usertrap_amd64.go:210] [ 1414: 1414] Found the pattern at ip 558f3c229160:sysno 10 D0621 11:14:23.404662 43334 usertrap_amd64.go:122] [ 1414: 1414] Allocate a new trap: 0xc007546c90 5 D0621 11:14:23.404963 43334 usertrap_amd64.go:223] [ 1414: 1414] Apply the binary patch addr 558f3c229160 trap addr 64190 ([184 10 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0621 11:14:23.413135 43334 usertrap_amd64.go:210] [ 1414: 1414] Found the pattern at ip 558f3c22a446:sysno 157 D0621 11:14:23.413268 43334 usertrap_amd64.go:122] [ 1414: 1414] Allocate a new trap: 0xc007546c90 6 D0621 11:14:23.413483 43334 usertrap_amd64.go:223] [ 1414: 1414] Apply the binary patch addr 558f3c22a446 trap addr 641e0 ([184 157 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0621 11:14:23.416759 43334 usertrap_amd64.go:210] [ 1414: 1414] Found the pattern at ip 558f3c2290dc:sysno 9 D0621 11:14:23.416851 43334 usertrap_amd64.go:122] [ 1414: 1414] Allocate a new trap: 0xc007546c90 7 D0621 11:14:23.417100 43334 usertrap_amd64.go:223] [ 1414: 1414] Apply the binary patch addr 558f3c2290dc trap addr 64230 ([184 9 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0621 11:14:23.418550 43334 usertrap_amd64.go:210] [ 1414: 1414] Found the pattern at ip 558f3c1ec5a8:sysno 13 D0621 11:14:23.418633 43334 usertrap_amd64.go:122] [ 1414: 1414] Allocate a new trap: 0xc007546c90 8 D0621 11:14:23.418772 43334 usertrap_amd64.go:223] [ 1414: 1414] Apply the binary patch addr 558f3c1ec5a8 trap addr 64280 ([184 13 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0621 11:14:23.423313 43334 usertrap_amd64.go:210] [ 1414: 1414] Found the pattern at ip 558f3c226820:sysno 39 D0621 11:14:23.423380 43334 usertrap_amd64.go:122] [ 1414: 1414] Allocate a new trap: 0xc007546c90 9 D0621 11:14:23.423571 43334 usertrap_amd64.go:223] [ 1414: 1414] Apply the binary patch addr 558f3c226820 trap addr 642d0 ([184 39 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0621 11:14:23.426270 43334 usertrap_amd64.go:210] [ 1414: 1414] Found the pattern at ip 558f3c227f69:sysno 3 D0621 11:14:23.426334 43334 usertrap_amd64.go:122] [ 1414: 1414] Allocate a new trap: 0xc007546c90 10 D0621 11:14:23.426515 43334 usertrap_amd64.go:223] [ 1414: 1414] Apply the binary patch addr 558f3c227f69 trap addr 64320 ([184 3 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0621 11:14:23.428664 43334 usertrap_amd64.go:210] [ 1414: 1414] Found the pattern at ip 558f3c254c00:sysno 83 D0621 11:14:23.428757 43334 usertrap_amd64.go:122] [ 1414: 1414] Allocate a new trap: 0xc007546c90 11 D0621 11:14:23.428933 43334 usertrap_amd64.go:223] [ 1414: 1414] Apply the binary patch addr 558f3c254c00 trap addr 64370 ([184 83 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0621 11:14:23.431807 43334 usertrap_amd64.go:210] [ 1414: 1414] Found the pattern at ip 558f3c227b70:sysno 90 D0621 11:14:23.431920 43334 usertrap_amd64.go:122] [ 1414: 1414] Allocate a new trap: 0xc007546c90 12 D0621 11:14:23.432202 43334 usertrap_amd64.go:223] [ 1414: 1414] Apply the binary patch addr 558f3c227b70 trap addr 643c0 ([184 90 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0621 11:14:23.432972 43334 usertrap_amd64.go:210] [ 1414: 1414] Found the pattern at ip 558f3c228020:sysno 80 D0621 11:14:23.433033 43334 usertrap_amd64.go:122] [ 1414: 1414] Allocate a new trap: 0xc007546c90 13 D0621 11:14:23.433210 43334 usertrap_amd64.go:223] [ 1414: 1414] Apply the binary patch addr 558f3c228020 trap addr 64410 ([184 80 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0621 11:14:23.434576 43334 usertrap_amd64.go:210] [ 1414: 1414] Found the pattern at ip 558f3c227ff0:sysno 33 D0621 11:14:23.434654 43334 usertrap_amd64.go:122] [ 1414: 1414] Allocate a new trap: 0xc007546c90 14 D0621 11:14:23.434811 43334 usertrap_amd64.go:223] [ 1414: 1414] Apply the binary patch addr 558f3c227ff0 trap addr 64460 ([184 33 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0621 11:14:23.436519 43334 usertrap_amd64.go:210] [ 1414: 1414] Found the pattern at ip 558f3c227c1a:sysno 257 D0621 11:14:23.436629 43334 usertrap_amd64.go:122] [ 1414: 1414] Allocate a new trap: 0xc007546c90 15 D0621 11:14:23.436787 43334 usertrap_amd64.go:223] [ 1414: 1414] Apply the binary patch addr 558f3c227c1a trap addr 644b0 ([184 1 1 0 0 15 5] -> [255 36 37 176 68 6 0]) D0621 11:14:23.438562 43334 usertrap_amd64.go:210] [ 1414: 1414] Found the pattern at ip 558f3c228e04:sysno 16 D0621 11:14:23.438633 43334 usertrap_amd64.go:122] [ 1414: 1414] Allocate a new trap: 0xc007546c90 16 D0621 11:14:23.438795 43334 usertrap_amd64.go:223] [ 1414: 1414] Apply the binary patch addr 558f3c228e04 trap addr 64500 ([184 16 0 0 0 15 5] -> [255 36 37 0 69 6 0]) D0621 11:14:23.460509 43334 usertrap_amd64.go:210] [ 1414: 1414] Found the pattern at ip 558f3c22a800:sysno 272 D0621 11:14:23.460601 43334 usertrap_amd64.go:122] [ 1414: 1414] Allocate a new trap: 0xc007546c90 17 D0621 11:14:23.460730 43334 usertrap_amd64.go:223] [ 1414: 1414] Apply the binary patch addr 558f3c22a800 trap addr 64550 ([184 16 1 0 0 15 5] -> [255 36 37 80 69 6 0]) D0621 11:14:23.461180 43334 usertrap_amd64.go:210] [ 1414: 1414] Found the pattern at ip 558f3c2260cc:sysno 56 D0621 11:14:23.461329 43334 usertrap_amd64.go:122] [ 1414: 1414] Allocate a new trap: 0xc007546c90 18 D0621 11:14:23.461502 43334 usertrap_amd64.go:223] [ 1414: 1414] Apply the binary patch addr 558f3c2260cc trap addr 645a0 ([184 56 0 0 0 15 5] -> [255 36 37 160 69 6 0]) D0621 11:14:23.481345 43334 usertrap_amd64.go:210] [ 1415( 1): 1415( 1)] Found the pattern at ip 558f3c226106:sysno 273 D0621 11:14:23.481723 43334 usertrap_amd64.go:122] [ 1415( 1): 1415( 1)] Allocate a new trap: 0xc007546de0 19 D0621 11:14:23.484605 43334 usertrap_amd64.go:210] [ 1414: 1414] Found the pattern at ip 558f3c225a8c:sysno 61 D0621 11:14:23.484926 43334 usertrap_amd64.go:122] [ 1414: 1414] Allocate a new trap: 0xc007546c90 19 D0621 11:14:23.484643 43334 usertrap_amd64.go:223] [ 1415( 1): 1415( 1)] Apply the binary patch addr 558f3c226106 trap addr 645f0 ([184 17 1 0 0 15 5] -> [255 36 37 240 69 6 0]) D0621 11:14:23.487901 43334 usertrap_amd64.go:223] [ 1414: 1414] Apply the binary patch addr 558f3c225a8c trap addr 645f0 ([184 61 0 0 0 15 5] -> [255 36 37 240 69 6 0]) D0621 11:14:23.499584 43334 usertrap_amd64.go:210] [ 1415( 1): 1415( 1)] Found the pattern at ip 558f3c22a7a3:sysno 165 D0621 11:14:23.499829 43334 usertrap_amd64.go:122] [ 1415( 1): 1415( 1)] Allocate a new trap: 0xc007546de0 20 D0621 11:14:23.500081 43334 usertrap_amd64.go:223] [ 1415( 1): 1415( 1)] Apply the binary patch addr 558f3c22a7a3 trap addr 64640 ([184 165 0 0 0 15 5] -> [255 36 37 64 70 6 0]) D0621 11:14:23.503843 43334 usertrap_amd64.go:210] [ 1415( 1): 1415( 1)] Found the pattern at ip 558f3c226860:sysno 112 D0621 11:14:23.503985 43334 usertrap_amd64.go:122] [ 1415( 1): 1415( 1)] Allocate a new trap: 0xc007546de0 21 D0621 11:14:23.504188 43334 usertrap_amd64.go:223] [ 1415( 1): 1415( 1)] Apply the binary patch addr 558f3c226860 trap addr 64690 ([184 112 0 0 0 15 5] -> [255 36 37 144 70 6 0]) D0621 11:14:23.512724 43334 usertrap_amd64.go:210] [ 1415( 1): 1415( 1)] Found the pattern at ip 558f3c227da9:sysno 1 D0621 11:14:23.512825 43334 usertrap_amd64.go:122] [ 1415( 1): 1415( 1)] Allocate a new trap: 0xc007546de0 22 D0621 11:14:23.512998 43334 usertrap_amd64.go:223] [ 1415( 1): 1415( 1)] Apply the binary patch addr 558f3c227da9 trap addr 646e0 ([184 1 0 0 0 15 5] -> [255 36 37 224 70 6 0]) D0621 11:14:23.528918 43334 usertrap_amd64.go:210] [ 1415( 1): 1415( 1)] Found the pattern at ip 558f3c22ae20:sysno 41 D0621 11:14:23.529050 43334 usertrap_amd64.go:122] [ 1415( 1): 1415( 1)] Allocate a new trap: 0xc007546de0 23 D0621 11:14:23.529241 43334 usertrap_amd64.go:223] [ 1415( 1): 1415( 1)] Apply the binary patch addr 558f3c22ae20 trap addr 64730 ([184 41 0 0 0 15 5] -> [255 36 37 48 71 6 0]) D0621 11:14:23.533589 43334 usertrap_amd64.go:210] [ 1415( 1): 1415( 1)] Found the pattern at ip 558f3c228960:sysno 3 D0621 11:14:23.533818 43334 usertrap_amd64.go:122] [ 1415( 1): 1415( 1)] Allocate a new trap: 0xc007546de0 24 D0621 11:14:23.534104 43334 usertrap_amd64.go:223] [ 1415( 1): 1415( 1)] Apply the binary patch addr 558f3c228960 trap addr 64780 ([184 3 0 0 0 15 5] -> [255 36 37 128 71 6 0]) D0621 11:14:23.537502 43334 usertrap_amd64.go:210] [ 1415( 1): 1415( 1)] Found the pattern at ip 558f3c22ad3c:sysno 44 D0621 11:14:23.537591 43334 usertrap_amd64.go:122] [ 1415( 1): 1415( 1)] Allocate a new trap: 0xc007546de0 25 D0621 11:14:23.537744 43334 usertrap_amd64.go:223] [ 1415( 1): 1415( 1)] Apply the binary patch addr 558f3c22ad3c trap addr 647d0 ([184 44 0 0 0 15 5] -> [255 36 37 208 71 6 0]) D0621 11:14:23.538586 43334 usertrap_amd64.go:210] [ 1415( 1): 1415( 1)] Found the pattern at ip 558f3c22ac82:sysno 45 D0621 11:14:23.538646 43334 usertrap_amd64.go:122] [ 1415( 1): 1415( 1)] Allocate a new trap: 0xc007546de0 26 D0621 11:14:23.538789 43334 usertrap_amd64.go:223] [ 1415( 1): 1415( 1)] Apply the binary patch addr 558f3c22ac82 trap addr 64820 ([184 45 0 0 0 15 5] -> [255 36 37 32 72 6 0]) W0621 11:14:23.541302 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:23.546680 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:23.583025 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:23.803869 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 5 W0621 11:14:23.820547 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 5 W0621 11:14:23.830894 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 5 W0621 11:14:23.839045 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 5 W0621 11:14:23.844092 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 5 W0621 11:14:23.851987 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 5 W0621 11:14:23.859398 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 5 W0621 11:14:23.876134 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 5 W0621 11:14:23.884590 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 5 W0621 11:14:23.909640 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:23.943284 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.021912 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.137127 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.154952 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.175460 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.196309 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.216197 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.236809 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.259862 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.282031 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.303511 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.325525 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.345573 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.368965 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.395236 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.422259 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.472726 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.598038 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.628312 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.656153 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.682118 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.714598 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.742255 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.768026 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.797594 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.826069 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.851378 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.878550 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.908831 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.938233 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.965780 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:24.995681 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:25.029222 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:25.060385 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:25.091997 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:25.123682 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:25.153343 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:25.185795 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:25.218845 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:25.255199 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:25.288690 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 W0621 11:14:25.317794 43334 stack.go:140] [ 1415( 1): 1415( 1)] unexpected attribute: 1 D0621 11:14:25.425944 43334 usertrap_amd64.go:210] [ 1415( 1): 1415( 1)] Found the pattern at ip 558f3c227ba0:sysno 258 D0621 11:14:25.426112 43334 usertrap_amd64.go:122] [ 1415( 1): 1415( 1)] Allocate a new trap: 0xc007546de0 27 D0621 11:14:25.426326 43334 usertrap_amd64.go:223] [ 1415( 1): 1415( 1)] Apply the binary patch addr 558f3c227ba0 trap addr 64870 ([184 2 1 0 0 15 5] -> [255 36 37 112 72 6 0]) D0621 11:14:25.433111 43334 usertrap_amd64.go:210] [ 1415( 1): 1415( 1)] Found the pattern at ip 558f3c22ac43:sysno 55 D0621 11:14:25.433586 43334 usertrap_amd64.go:122] [ 1415( 1): 1415( 1)] Allocate a new trap: 0xc007546de0 28 D0621 11:14:25.434058 43334 usertrap_amd64.go:223] [ 1415( 1): 1415( 1)] Apply the binary patch addr 558f3c22ac43 trap addr 648c0 ([184 55 0 0 0 15 5] -> [255 36 37 192 72 6 0]) D0621 11:14:25.492244 43334 usertrap_amd64.go:210] [ 1415( 1): 1415( 1)] Found the pattern at ip 558f3c25446c:sysno 230 D0621 11:14:25.492385 43334 usertrap_amd64.go:122] [ 1415( 1): 1415( 1)] Allocate a new trap: 0xc007546de0 29 D0621 11:14:25.495020 43334 usertrap_amd64.go:223] [ 1415( 1): 1415( 1)] Apply the binary patch addr 558f3c25446c trap addr 64910 ([184 230 0 0 0 15 5] -> [255 36 37 16 73 6 0]) D0621 11:14:25.506105 43334 usertrap_amd64.go:210] [ 1416( 2): 1416( 2)] Found the pattern at ip 558f3c254b60:sysno 109 D0621 11:14:25.506308 43334 usertrap_amd64.go:122] [ 1416( 2): 1416( 2)] Allocate a new trap: 0xc000663f50 29 D0621 11:14:25.506959 43334 usertrap_amd64.go:223] [ 1416( 2): 1416( 2)] Apply the binary patch addr 558f3c254b60 trap addr 64910 ([184 109 0 0 0 15 5] -> [255 36 37 16 73 6 0]) D0621 11:14:25.511239 43334 usertrap_amd64.go:210] [ 1416( 2): 1416( 2)] Found the pattern at ip 558f3c228820:sysno 266 D0621 11:14:25.511319 43334 usertrap_amd64.go:122] [ 1416( 2): 1416( 2)] Allocate a new trap: 0xc000663f50 30 D0621 11:14:25.511507 43334 usertrap_amd64.go:223] [ 1416( 2): 1416( 2)] Apply the binary patch addr 558f3c228820 trap addr 64960 ([184 10 1 0 0 15 5] -> [255 36 37 96 73 6 0]) D0621 11:14:25.512525 43334 usertrap_amd64.go:210] [ 1415( 1): 1415( 1)] Found the pattern at ip 558f3c225a8c:sysno 61 D0621 11:14:25.512642 43334 usertrap_amd64.go:122] [ 1415( 1): 1415( 1)] Allocate a new trap: 0xc007546de0 30 D0621 11:14:25.512850 43334 usertrap_amd64.go:223] [ 1415( 1): 1415( 1)] Apply the binary patch addr 558f3c225a8c trap addr 64960 ([184 61 0 0 0 15 5] -> [255 36 37 96 73 6 0]) D0621 11:14:25.537082 43334 usertrap_amd64.go:210] [ 1416( 2): 1416( 2)] Found the pattern at ip 558f3c1fdf92:sysno 14 D0621 11:14:25.537235 43334 usertrap_amd64.go:122] [ 1416( 2): 1416( 2)] Allocate a new trap: 0xc000663f50 31 D0621 11:14:25.537399 43334 usertrap_amd64.go:223] [ 1416( 2): 1416( 2)] Apply the binary patch addr 558f3c1fdf92 trap addr 649b0 ([184 14 0 0 0 15 5] -> [255 36 37 176 73 6 0]) D0621 11:14:25.542696 43334 usertrap_amd64.go:210] [ 1416( 2): 1416( 2)] Found the pattern at ip 558f3c254e92:sysno 435 D0621 11:14:25.542766 43334 usertrap_amd64.go:122] [ 1416( 2): 1416( 2)] Allocate a new trap: 0xc000663f50 32 D0621 11:14:25.542910 43334 usertrap_amd64.go:223] [ 1416( 2): 1416( 2)] Apply the binary patch addr 558f3c254e92 trap addr 64a00 ([184 179 1 0 0 15 5] -> [255 36 37 0 74 6 0]) D0621 11:14:25.547008 43334 usertrap_amd64.go:210] [ 1416( 2): 1416( 2)] Found the pattern at ip 558f3c1fdf00:sysno 14 D0621 11:14:25.547093 43334 usertrap_amd64.go:122] [ 1416( 2): 1416( 2)] Allocate a new trap: 0xc000663f50 33 D0621 11:14:25.547236 43334 usertrap_amd64.go:223] [ 1416( 2): 1416( 2)] Apply the binary patch addr 558f3c1fdf00 trap addr 64a50 ([184 14 0 0 0 15 5] -> [255 36 37 80 74 6 0]) D0621 11:14:25.547881 43334 usertrap_amd64.go:210] [ 1416( 2): 1417( 3)] Found the pattern at ip 558f3c1fd610:sysno 273 D0621 11:14:25.547991 43334 usertrap_amd64.go:122] [ 1416( 2): 1417( 3)] Allocate a new trap: 0xc000663f50 34 D0621 11:14:25.548196 43334 usertrap_amd64.go:223] [ 1416( 2): 1417( 3)] Apply the binary patch addr 558f3c1fd610 trap addr 64aa0 ([184 17 1 0 0 15 5] -> [255 36 37 160 74 6 0]) D0621 11:14:25.622453 43334 task_stop.go:118] [ 1415( 1): 1415( 1)] Entering internal stop &kernel.ptraceStop{frozen:false, listen:false} D0621 11:14:25.622675 43334 task_signals.go:470] [ 1416( 2): 1417( 3)] Notified of signal 17 D0621 11:14:25.627937 43334 task_signals.go:220] [ 1416( 2): 1417( 3)] Signal 17: delivering to handler D0621 11:14:25.680919 43334 task_exit.go:204] [ 1416( 2): 1416( 2)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:14:25.683107 43334 task_exit.go:204] [ 1416( 2): 1416( 2)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:14:25.688447 43334 task_signals.go:204] [ 1416( 2): 1417( 3)] Signal 9, PID: 1416, TID: 1417, fault addr: 0x0: terminating thread group D0621 11:14:25.688671 43334 task_exit.go:204] [ 1416( 2): 1417( 3)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0621 11:14:25.705573 43334 task_stop.go:138] [ 1415( 1): 1415( 1)] Leaving internal stop &kernel.ptraceStop{frozen:false, listen:false} D0621 11:14:25.705791 43334 task_exit.go:204] [ 1416( 2): 1417( 3)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0621 11:14:25.705872 43334 task_exit.go:204] [ 1416( 2): 1417( 3)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:14:25.706133 43334 task_signals.go:481] [ 1415( 1): 1415( 1)] No task notified of signal 17 D0621 11:14:25.706495 43334 task_signals.go:176] [ 1415( 1): 1415( 1)] Not restarting syscall 230 after error interrupted by signal: interrupted by signal 17 D0621 11:14:25.706583 43334 task_signals.go:220] [ 1415( 1): 1415( 1)] Signal 17: delivering to handler D0621 11:14:25.709463 43334 task_exit.go:204] [ 1416( 2): 1416( 2)] Transitioning from exit state TaskExitZombie to TaskExitDead D0621 11:14:25.710196 43334 usertrap_amd64.go:210] [ 1415( 1): 1415( 1)] Found the pattern at ip 558f3c22a3d0:sysno 166 D0621 11:14:25.710272 43334 usertrap_amd64.go:122] [ 1415( 1): 1415( 1)] Allocate a new trap: 0xc007546de0 31 D0621 11:14:25.710448 43334 usertrap_amd64.go:223] [ 1415( 1): 1415( 1)] Apply the binary patch addr 558f3c22a3d0 trap addr 649b0 ([184 166 0 0 0 15 5] -> [255 36 37 176 73 6 0]) D0621 11:14:25.712150 43334 usertrap_amd64.go:210] [ 1415( 1): 1415( 1)] Found the pattern at ip 558f3c227b43:sysno 262 D0621 11:14:25.712221 43334 usertrap_amd64.go:122] [ 1415( 1): 1415( 1)] Allocate a new trap: 0xc007546de0 32 D0621 11:14:25.712432 43334 usertrap_amd64.go:223] [ 1415( 1): 1415( 1)] Apply the binary patch addr 558f3c227b43 trap addr 64a00 ([184 6 1 0 0 15 5] -> [255 36 37 0 74 6 0]) D0621 11:14:25.720642 43334 usertrap_amd64.go:210] [ 1415( 1): 1415( 1)] Found the pattern at ip 558f3c25459c:sysno 217 D0621 11:14:25.720737 43334 usertrap_amd64.go:122] [ 1415( 1): 1415( 1)] Allocate a new trap: 0xc007546de0 33 D0621 11:14:25.720894 43334 usertrap_amd64.go:223] [ 1415( 1): 1415( 1)] Apply the binary patch addr 558f3c25459c trap addr 64a50 ([184 217 0 0 0 15 5] -> [255 36 37 80 74 6 0]) D0621 11:14:25.729689 43334 usertrap_amd64.go:210] [ 1415( 1): 1415( 1)] Found the pattern at ip 558f3c228850:sysno 87 D0621 11:14:25.729774 43334 usertrap_amd64.go:122] [ 1415( 1): 1415( 1)] Allocate a new trap: 0xc007546de0 34 D0621 11:14:25.729958 43334 usertrap_amd64.go:223] [ 1415( 1): 1415( 1)] Apply the binary patch addr 558f3c228850 trap addr 64aa0 ([184 87 0 0 0 15 5] -> [255 36 37 160 74 6 0]) D0621 11:14:25.734141 43334 usertrap_amd64.go:210] [ 1415( 1): 1415( 1)] Found the pattern at ip 558f3c228880:sysno 263 D0621 11:14:25.734306 43334 usertrap_amd64.go:122] [ 1415( 1): 1415( 1)] Allocate a new trap: 0xc007546de0 35 D0621 11:14:25.734642 43334 usertrap_amd64.go:223] [ 1415( 1): 1415( 1)] Apply the binary patch addr 558f3c228880 trap addr 64af0 ([184 7 1 0 0 15 5] -> [255 36 37 240 74 6 0]) D0621 11:14:25.776097 43334 usertrap_amd64.go:210] [ 1418( 4): 1418( 4)] Found the pattern at ip 558f3c254b60:sysno 109 D0621 11:14:25.776357 43334 usertrap_amd64.go:122] [ 1418( 4): 1418( 4)] Allocate a new trap: 0xc006889ec0 36 D0621 11:14:25.777975 43334 usertrap_amd64.go:223] [ 1418( 4): 1418( 4)] Apply the binary patch addr 558f3c254b60 trap addr 64b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 75 6 0]) D0621 11:14:25.782553 43334 usertrap_amd64.go:210] [ 1418( 4): 1418( 4)] Found the pattern at ip 558f3c228820:sysno 266 D0621 11:14:25.782625 43334 usertrap_amd64.go:122] [ 1418( 4): 1418( 4)] Allocate a new trap: 0xc006889ec0 37 D0621 11:14:25.782771 43334 usertrap_amd64.go:223] [ 1418( 4): 1418( 4)] Apply the binary patch addr 558f3c228820 trap addr 64b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 75 6 0]) D0621 11:14:25.797715 43334 usertrap_amd64.go:210] [ 1418( 4): 1418( 4)] Found the pattern at ip 558f3c1fdf92:sysno 14 D0621 11:14:25.797849 43334 usertrap_amd64.go:122] [ 1418( 4): 1418( 4)] Allocate a new trap: 0xc006889ec0 38 D0621 11:14:25.798056 43334 usertrap_amd64.go:223] [ 1418( 4): 1418( 4)] Apply the binary patch addr 558f3c1fdf92 trap addr 64be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 75 6 0]) D0621 11:14:25.804955 43334 usertrap_amd64.go:210] [ 1418( 4): 1418( 4)] Found the pattern at ip 558f3c254e92:sysno 435 D0621 11:14:25.805044 43334 usertrap_amd64.go:122] [ 1418( 4): 1418( 4)] Allocate a new trap: 0xc006889ec0 39 D0621 11:14:25.805218 43334 usertrap_amd64.go:223] [ 1418( 4): 1418( 4)] Apply the binary patch addr 558f3c254e92 trap addr 64c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 76 6 0]) D0621 11:14:25.809570 43334 usertrap_amd64.go:210] [ 1418( 4): 1418( 4)] Found the pattern at ip 558f3c1fdf00:sysno 14 D0621 11:14:25.809676 43334 usertrap_amd64.go:122] [ 1418( 4): 1418( 4)] Allocate a new trap: 0xc006889ec0 40 D0621 11:14:25.809938 43334 usertrap_amd64.go:223] [ 1418( 4): 1418( 4)] Apply the binary patch addr 558f3c1fdf00 trap addr 64c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0621 11:14:25.810477 43334 usertrap_amd64.go:210] [ 1418( 4): 1419( 5)] Found the pattern at ip 558f3c1fd610:sysno 273 D0621 11:14:25.810569 43334 usertrap_amd64.go:122] [ 1418( 4): 1419( 5)] Allocate a new trap: 0xc006889ec0 41 D0621 11:14:25.810807 43334 usertrap_amd64.go:223] [ 1418( 4): 1419( 5)] Apply the binary patch addr 558f3c1fd610 trap addr 64cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 76 6 0]) panic: WARNING: circular locking detected: stack.bridgeRWMutex -> stack.stackRWMutex: goroutine 9521 [running]: gvisor.dev/gvisor/pkg/tcpip/stack.(*stackRWMutex).RLock(0xc004c2a5c0) bazel-out/k8-fastbuild/bin/pkg/tcpip/stack/stack_mutex.go:59 +0x4d gvisor.dev/gvisor/pkg/tcpip/stack.(*Stack).FindNICNameFromID(0xc004c2a008, 0x102a) pkg/tcpip/stack/stack.go:2187 +0x6e gvisor.dev/gvisor/pkg/tcpip/network/ipv6.(*endpoint).HandlePacket(0xc003f9ea88, 0xc00670e140) pkg/tcpip/network/ipv6/ipv6.go:1131 +0xb68 gvisor.dev/gvisor/pkg/tcpip/stack.(*nic).DeliverNetworkPacket(0xc0084a6908, 0x86dd, 0xc00670e140) pkg/tcpip/stack/nic.go:757 +0x1eb gvisor.dev/gvisor/pkg/tcpip/stack.(*BridgeEndpoint).injectInboundLocked(0xc006e2a320, 0x86dd, 0xc00670e140) pkg/tcpip/stack/bridge.go:156 +0x97 gvisor.dev/gvisor/pkg/tcpip/stack.(*bridgePort).DeliverNetworkPacket(0xc00498f040, 0x86dd, 0xc00670e140) pkg/tcpip/stack/bridge.go:58 +0x328 gvisor.dev/gvisor/pkg/tcpip/link/nested.(*Endpoint).DeliverNetworkPacket(0xc006e2a730, 0x86dd, 0xc00670e140) pkg/tcpip/link/nested/nested.go:61 +0xc2 gvisor.dev/gvisor/pkg/tcpip/link/packetsocket.(*endpoint).DeliverNetworkPacket(0xc006e2a730, 0x86dd, 0xc00670e140) pkg/tcpip/link/packetsocket/packetsocket.go:47 +0x5f gvisor.dev/gvisor/pkg/tcpip/link/nested.(*Endpoint).DeliverNetworkPacket(0xc006e2a6e0, 0x86dd, 0xc00670e140) pkg/tcpip/link/nested/nested.go:61 +0xc2 gvisor.dev/gvisor/pkg/tcpip/link/ethernet.(*Endpoint).DeliverNetworkPacket(0xc006e2a6e0, 0x0?, 0xc00670e140) pkg/tcpip/link/ethernet/ethernet.go:82 +0x32a gvisor.dev/gvisor/pkg/tcpip/link/veth.(*Endpoint).InjectInbound(0xc001984f00, 0x86dd, 0xc00670e140) pkg/tcpip/link/veth/veth.go:122 +0xc2 gvisor.dev/gvisor/pkg/tcpip/link/veth.NewPair.func1() pkg/tcpip/link/veth/veth.go:77 +0xc8 created by gvisor.dev/gvisor/pkg/tcpip/link/veth.NewPair in goroutine 9285 pkg/tcpip/link/veth/veth.go:75 +0x39d known lock chain: stack.stackRWMutex -> stack.bridgeRWMutex ====== stack.stackRWMutex -> stack.bridgeRWMutex ===== goroutine 266 [running]: gvisor.dev/gvisor/pkg/tcpip/stack.(*bridgeRWMutex).Lock(0xc000c025a0) bazel-out/k8-fastbuild/bin/pkg/tcpip/stack/bridge_mutex.go:31 +0x4d gvisor.dev/gvisor/pkg/tcpip/stack.(*BridgeEndpoint).Attach(0xc000c025a0, {0x2029080, 0xc00054cb48}) pkg/tcpip/stack/bridge.go:194 +0x5f gvisor.dev/gvisor/pkg/tcpip/stack.newNIC(0xc0007a7008, 0x4, {0x203bc00, 0xc000c025a0}, {{0xc000790e39, 0x7}, 0x0, {0x0, 0x0}, {0x0, ...}, ...}) pkg/tcpip/stack/nic.go:219 +0xce8 gvisor.dev/gvisor/pkg/tcpip/stack.(*Stack).CreateNICWithOptions(0xc0007a7008, 0x4, {0x203bc00, 0xc000c025a0}, {{0xc000790e39, 0x7}, 0x0, {0x0, 0x0}, {0x0, ...}, ...}) pkg/tcpip/stack/stack.go:884 +0x4dc gvisor.dev/gvisor/pkg/sentry/socket/netstack.(*Stack).newBridge(0xc0009e8cb8, {0xc000c6d500?, 0xc000b307de?}, 0xc000c6d320, 0x0?) pkg/sentry/socket/netstack/stack.go:285 +0x1cf gvisor.dev/gvisor/pkg/sentry/socket/netstack.(*Stack).newInterface(0xc0009e8cb8, {0x203f238, 0xc000ac3508}, 0xc000c6d290?, 0xc000c6d320) pkg/sentry/socket/netstack/stack.go:326 +0x27f gvisor.dev/gvisor/pkg/sentry/socket/netstack.(*Stack).SetInterface(0xc0009e8cb8, {0x203f238, 0xc000ac3508}, 0xc000c6d2c0) pkg/sentry/socket/netstack/stack.go:147 +0x645 gvisor.dev/gvisor/pkg/sentry/socket/netlink/route.(*Protocol).newLink(0xc0009404e0?, {0x203f238, 0xc000ac3508}, 0xc000b7eb60, 0xc000c6d2c0, 0x0?) pkg/sentry/socket/netlink/route/protocol.go:172 +0x94 gvisor.dev/gvisor/pkg/sentry/socket/netlink/route.(*Protocol).ProcessMessage(0x3cfcfe0, {0x203f238, 0xc000ac3508}, 0xc000b7eb60, 0xc000c6d2c0, 0xc000c6d2f0) pkg/sentry/socket/netlink/route/protocol.go:592 +0x457 gvisor.dev/gvisor/pkg/sentry/socket/netlink.(*Socket).processMessages(0xc000b7eb60, {0x203f238, 0xc000ac3508}, {0xc000a32b80, 0x3c, 0x3c}) pkg/sentry/socket/netlink/socket.go:758 +0x2c5 gvisor.dev/gvisor/pkg/sentry/socket/netlink.(*Socket).sendMsg(0xc000b7eb60, {0x203f238, _}, {{0x2037538, 0xc000de4008}, {0x0, 0x1, 0x555c45e87670, 0x3c}, {0x0, ...}}, ...) pkg/sentry/socket/netlink/socket.go:818 +0x53c gvisor.dev/gvisor/pkg/sentry/socket/netlink.(*Socket).SendMsg(0xc000b7eb60, 0xc000ac3508, {{0x2037538, 0xc000de4008}, {0x0, 0x1, 0x555c45e87670, 0x3c}, {0x0, 0x1}}, ...) pkg/sentry/socket/netlink/socket.go:827 +0x17a gvisor.dev/gvisor/pkg/sentry/syscalls/linux.sendTo(0xc000ac3508, 0x3, 0x555c45e87670, 0x3c, 0x0, 0x7ed06d8ddeb4, 0xc) pkg/sentry/syscalls/linux/sys_socket.go:1173 +0x885 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.SendTo(0xc000ac3508, 0x10?, {{0x3}, {0x555c45e87670}, {0x3c}, {0x0}, {0x7ed06d8ddeb4}, {0xc}}) pkg/sentry/syscalls/linux/sys_socket.go:1186 +0x11c gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc000ac3508, 0x2c, {{0x3}, {0x555c45e87670}, {0x3c}, {0x0}, {0x7ed06d8ddeb4}, {0xc}}) pkg/sentry/kernel/task_syscall.go:143 +0xb9f gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc000ac3508, 0x2c, {{0x3}, {0x555c45e87670}, {0x3c}, {0x0}, {0x7ed06d8ddeb4}, {0xc}}) pkg/sentry/kernel/task_syscall.go:323 +0x85 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc000ac3508, 0x2c, {{0x3}, {0x555c45e87670}, {0x3c}, {0x0}, {0x7ed06d8ddeb4}, {0xc}}) pkg/sentry/kernel/task_syscall.go:283 +0xc7 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc000ac3508) pkg/sentry/kernel/task_syscall.go:258 +0x54a gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc000ac3508?, 0xc000ac3508) pkg/sentry/kernel/task_run.go:263 +0x22f5 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000ac3508, 0x1a) pkg/sentry/kernel/task_run.go:98 +0x39b created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start in goroutine 355 pkg/sentry/kernel/task_start.go:393 +0x1ce goroutine 9521 gp=0xc005610e00 m=0 mp=0x2d5eae0 [running]: panic({0x1b62420?, 0xc005fd6570?}) GOROOT/src/runtime/panic.go:779 +0x158 fp=0xc0009cd350 sp=0xc0009cd2a0 pc=0x43ed58 gvisor.dev/gvisor/pkg/sync/locking.checkLock(0xc000394cf0, 0xc000394360, {0x0, 0x0, 0x0}) pkg/sync/locking/lockdep.go:110 +0x8d4 fp=0xc0009cd4b0 sp=0xc0009cd350 pc=0xa4af54 gvisor.dev/gvisor/pkg/sync/locking.AddGLock(0xc000394cf0, 0xffffffffffffffff) pkg/sync/locking/lockdep.go:144 +0x3a6 fp=0xc0009cd5f0 sp=0xc0009cd4b0 pc=0xa4b5e6 gvisor.dev/gvisor/pkg/tcpip/stack.(*stackRWMutex).RLock(0xc004c2a5c0) bazel-out/k8-fastbuild/bin/pkg/tcpip/stack/stack_mutex.go:59 +0x4d fp=0xc0009cd610 sp=0xc0009cd5f0 pc=0xe526ed gvisor.dev/gvisor/pkg/tcpip/stack.(*Stack).FindNICNameFromID(0xc004c2a008, 0x102a) pkg/tcpip/stack/stack.go:2187 +0x6e fp=0xc0009cd6b8 sp=0xc0009cd610 pc=0xe5174e gvisor.dev/gvisor/pkg/tcpip/network/ipv6.(*endpoint).HandlePacket(0xc003f9ea88, 0xc00670e140) pkg/tcpip/network/ipv6/ipv6.go:1131 +0xb68 fp=0xc0009cdc10 sp=0xc0009cd6b8 pc=0x10f3908 gvisor.dev/gvisor/pkg/tcpip/stack.(*nic).DeliverNetworkPacket(0xc0084a6908, 0x86dd, 0xc00670e140) pkg/tcpip/stack/nic.go:757 +0x1eb fp=0xc0009cdc68 sp=0xc0009cdc10 pc=0xe273eb gvisor.dev/gvisor/pkg/tcpip/stack.(*BridgeEndpoint).injectInboundLocked(0xc006e2a320, 0x86dd, 0xc00670e140) pkg/tcpip/stack/bridge.go:156 +0x97 fp=0xc0009cdca0 sp=0xc0009cdc68 pc=0xdff597 gvisor.dev/gvisor/pkg/tcpip/stack.(*bridgePort).DeliverNetworkPacket(0xc00498f040, 0x86dd, 0xc00670e140) pkg/tcpip/stack/bridge.go:58 +0x328 fp=0xc0009cdde8 sp=0xc0009cdca0 pc=0xdfe628 gvisor.dev/gvisor/pkg/tcpip/link/nested.(*Endpoint).DeliverNetworkPacket(0xc006e2a730, 0x86dd, 0xc00670e140) pkg/tcpip/link/nested/nested.go:61 +0xc2 fp=0xc0009cde30 sp=0xc0009cdde8 pc=0x11302e2 gvisor.dev/gvisor/pkg/tcpip/link/packetsocket.(*endpoint).DeliverNetworkPacket(0xc006e2a730, 0x86dd, 0xc00670e140) pkg/tcpip/link/packetsocket/packetsocket.go:47 +0x5f fp=0xc0009cde58 sp=0xc0009cde30 pc=0x1132e9f gvisor.dev/gvisor/pkg/tcpip/link/nested.(*Endpoint).DeliverNetworkPacket(0xc006e2a6e0, 0x86dd, 0xc00670e140) pkg/tcpip/link/nested/nested.go:61 +0xc2 fp=0xc0009cdea0 sp=0xc0009cde58 pc=0x11302e2 gvisor.dev/gvisor/pkg/tcpip/link/ethernet.(*Endpoint).DeliverNetworkPacket(0xc006e2a6e0, 0x0?, 0xc00670e140) pkg/tcpip/link/ethernet/ethernet.go:82 +0x32a fp=0xc0009cdf30 sp=0xc0009cdea0 pc=0x1131daa gvisor.dev/gvisor/pkg/tcpip/link/veth.(*Endpoint).InjectInbound(0xc001984f00, 0x86dd, 0xc00670e140) pkg/tcpip/link/veth/veth.go:122 +0xc2 fp=0xc0009cdf78 sp=0xc0009cdf30 pc=0x1134742 gvisor.dev/gvisor/pkg/tcpip/link/veth.NewPair.func1() pkg/tcpip/link/veth/veth.go:77 +0xc8 fp=0xc0009cdfe0 sp=0xc0009cdf78 pc=0x1134248 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0009cdfe8 sp=0xc0009cdfe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/tcpip/link/veth.NewPair in goroutine 9285 pkg/tcpip/link/veth/veth.go:75 +0x39d goroutine 1 gp=0xc0000061c0 m=nil [semacquire, 12 minutes]: runtime.gopark(0x4?, 0xc0005470f8?, 0x0?, 0x80?, 0xc000a2c180?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000e07078 sp=0xc000e07058 pc=0x44288e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 runtime.semacquire1(0xc00037a270, 0x0, 0x1, 0x0, 0x12) GOROOT/src/runtime/sema.go:160 +0x225 fp=0xc000e070e0 sp=0xc000e07078 pc=0x457125 sync.runtime_Semacquire(0xc00037a270?) GOROOT/src/runtime/sema.go:62 +0x25 fp=0xc000e07118 sp=0xc000e070e0 pc=0x478b05 sync.(*WaitGroup).Wait(0xc00037a268) GOROOT/src/sync/waitgroup.go:116 +0xa5 fp=0xc000e07148 sp=0xc000e07118 pc=0x4915e5 gvisor.dev/gvisor/pkg/sentry/kernel.(*Kernel).WaitExited(0xc00067e008) pkg/sentry/kernel/kernel.go:1346 +0x59 fp=0xc000e07168 sp=0xc000e07148 pc=0xee83d9 gvisor.dev/gvisor/runsc/boot.(*Loader).WaitExit(0xc00023b408) runsc/boot/loader.go:1379 +0x36 fp=0xc000e07188 sp=0xc000e07168 pc=0x17a3cf6 gvisor.dev/gvisor/runsc/cmd.(*Boot).Execute(0xc00027e9c0, {0xc000040300?, 0x10?}, 0xc0003dcb60, {0xc00015cd20, 0x2, 0x19f5980?}) runsc/cmd/boot.go:516 +0x2a09 fp=0xc000e07bf0 sp=0xc000e07188 pc=0x196e1c9 github.com/google/subcommands.(*Commander).Execute(0xc000234000, {0x202fd30, 0x3cfcfe0}, {0xc00015cd20, 0x2, 0x2}) external/com_github_google_subcommands/subcommands.go:200 +0x684 fp=0xc000e07ce0 sp=0xc000e07bf0 pc=0x58c324 github.com/google/subcommands.Execute(...) external/com_github_google_subcommands/subcommands.go:481 gvisor.dev/gvisor/runsc/cli.Main() runsc/cli/main.go:213 +0x1fef fp=0xc000e07f38 sp=0xc000e07ce0 pc=0x19c2ecf main.main() runsc/main.go:31 +0x1d fp=0xc000e07f50 sp=0xc000e07f38 pc=0x19c421d runtime.main() GOROOT/src/runtime/proc.go:271 +0x29d fp=0xc000e07fe0 sp=0xc000e07f50 pc=0x44241d runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000e07fe8 sp=0xc000e07fe0 pc=0x47d301 goroutine 2 gp=0xc000006c40 m=nil [force gc (idle), 12 minutes]: runtime.gopark(0x2bef2b0?, 0x2d5eae0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00013c7a8 sp=0xc00013c788 pc=0x44288e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 runtime.forcegchelper() GOROOT/src/runtime/proc.go:326 +0xb3 fp=0xc00013c7e0 sp=0xc00013c7a8 pc=0x4426f3 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00013c7e8 sp=0xc00013c7e0 pc=0x47d301 created by runtime.init.6 in goroutine 1 GOROOT/src/runtime/proc.go:314 +0x1a goroutine 3 gp=0xc000007180 m=nil [GC sweep wait]: runtime.gopark(0x1?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00014cf80 sp=0xc00014cf60 pc=0x44288e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 runtime.bgsweep(0xc000166000) GOROOT/src/runtime/mgcsweep.go:318 +0xdf fp=0xc00014cfc8 sp=0xc00014cf80 pc=0x42c15f runtime.gcenable.gowrap1() GOROOT/src/runtime/mgc.go:203 +0x25 fp=0xc00014cfe0 sp=0xc00014cfc8 pc=0x420a85 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00014cfe8 sp=0xc00014cfe0 pc=0x47d301 created by runtime.gcenable in goroutine 1 GOROOT/src/runtime/mgc.go:203 +0x66 goroutine 4 gp=0xc000007340 m=nil [GC scavenge wait]: runtime.gopark(0x10000?, 0x3b9aca00?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000152f78 sp=0xc000152f58 pc=0x44288e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 runtime.(*scavengerState).park(0x2d5ca60) GOROOT/src/runtime/mgcscavenge.go:425 +0x49 fp=0xc000152fa8 sp=0xc000152f78 pc=0x429b29 runtime.bgscavenge(0xc000166000) GOROOT/src/runtime/mgcscavenge.go:658 +0x59 fp=0xc000152fc8 sp=0xc000152fa8 pc=0x42a0b9 runtime.gcenable.gowrap2() GOROOT/src/runtime/mgc.go:204 +0x25 fp=0xc000152fe0 sp=0xc000152fc8 pc=0x420a25 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000152fe8 sp=0xc000152fe0 pc=0x47d301 created by runtime.gcenable in goroutine 1 GOROOT/src/runtime/mgc.go:204 +0xa5 goroutine 5 gp=0xc000007c00 m=nil [finalizer wait, 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00014de20 sp=0xc00014de00 pc=0x44288e runtime.runfinq() GOROOT/src/runtime/mfinal.go:194 +0x145 fp=0xc00014dfe0 sp=0xc00014de20 pc=0x41fa45 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00014dfe8 sp=0xc00014dfe0 pc=0x47d301 created by runtime.createfing in goroutine 1 GOROOT/src/runtime/mfinal.go:164 +0x3d goroutine 18 gp=0xc000182380 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x413a45?, 0x48?, 0xa0?, 0x3f?, 0x1?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001bdf50 sp=0xc0001bdf30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001bdfe0 sp=0xc0001bdf50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001bdfe8 sp=0xc0001bdfe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 19 gp=0xc000182540 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0xc000166000?, 0x2014070?, 0x1?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001bcf50 sp=0xc0001bcf30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001bcfe0 sp=0xc0001bcf50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001bcfe8 sp=0xc0001bcfe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 34 gp=0xc0004ae000 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001bbf50 sp=0xc0001bbf30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001bbfe0 sp=0xc0001bbf50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001bbfe8 sp=0xc0001bbfe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 35 gp=0xc0004ae1c0 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001baf50 sp=0xc0001baf30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001bafe0 sp=0xc0001baf50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001bafe8 sp=0xc0001bafe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 6 gp=0xc000354000 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001b9f50 sp=0xc0001b9f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001b9fe0 sp=0xc0001b9f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001b9fe8 sp=0xc0001b9fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 36 gp=0xc0004ae380 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001b8f50 sp=0xc0001b8f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001b8fe0 sp=0xc0001b8f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001b8fe8 sp=0xc0001b8fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 20 gp=0xc000182700 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001b7f50 sp=0xc0001b7f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001b7fe0 sp=0xc0001b7f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001b7fe8 sp=0xc0001b7fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 21 gp=0xc0001828c0 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001b6f50 sp=0xc0001b6f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001b6fe0 sp=0xc0001b6f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001b6fe8 sp=0xc0001b6fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 7 gp=0xc000354540 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001c7f50 sp=0xc0001c7f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001c7fe0 sp=0xc0001c7f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001c7fe8 sp=0xc0001c7fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 50 gp=0xc000502000 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001c6f50 sp=0xc0001c6f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001c6fe0 sp=0xc0001c6f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001c6fe8 sp=0xc0001c6fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 51 gp=0xc0005021c0 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001c5f50 sp=0xc0001c5f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001c5fe0 sp=0xc0001c5f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001c5fe8 sp=0xc0001c5fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 37 gp=0xc0004ae540 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001c4f50 sp=0xc0001c4f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001c4fe0 sp=0xc0001c4f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001c4fe8 sp=0xc0001c4fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 38 gp=0xc0004ae700 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001c3f50 sp=0xc0001c3f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001c3fe0 sp=0xc0001c3f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001c3fe8 sp=0xc0001c3fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 8 gp=0xc000354700 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001c2f50 sp=0xc0001c2f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001c2fe0 sp=0xc0001c2f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001c2fe8 sp=0xc0001c2fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 52 gp=0xc000502380 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001c1f50 sp=0xc0001c1f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001c1fe0 sp=0xc0001c1f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001c1fe8 sp=0xc0001c1fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 9 gp=0xc0003548c0 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001c0f50 sp=0xc0001c0f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001c0fe0 sp=0xc0001c0f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001c0fe8 sp=0xc0001c0fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 39 gp=0xc0004ae8c0 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000515f50 sp=0xc000515f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000515fe0 sp=0xc000515f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000515fe8 sp=0xc000515fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 53 gp=0xc000502540 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000514f50 sp=0xc000514f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000514fe0 sp=0xc000514f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000514fe8 sp=0xc000514fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 40 gp=0xc0004aea80 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x413a45?, 0x48?, 0xa0?, 0x3f?, 0x1?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000513f50 sp=0xc000513f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000513fe0 sp=0xc000513f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000513fe8 sp=0xc000513fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 10 gp=0xc000354a80 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000512f50 sp=0xc000512f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000512fe0 sp=0xc000512f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000512fe8 sp=0xc000512fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 54 gp=0xc000502700 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000511f50 sp=0xc000511f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000511fe0 sp=0xc000511f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000511fe8 sp=0xc000511fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 55 gp=0xc0005028c0 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000510f50 sp=0xc000510f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000510fe0 sp=0xc000510f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000510fe8 sp=0xc000510fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 56 gp=0xc000502a80 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00050ff50 sp=0xc00050ff30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00050ffe0 sp=0xc00050ff50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00050ffe8 sp=0xc00050ffe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 41 gp=0xc0004aec40 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0xc000166000?, 0x2014070?, 0x1?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00050ef50 sp=0xc00050ef30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00050efe0 sp=0xc00050ef50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00050efe8 sp=0xc00050efe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 57 gp=0xc000502c40 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00051df50 sp=0xc00051df30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00051dfe0 sp=0xc00051df50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00051dfe8 sp=0xc00051dfe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 42 gp=0xc0004aee00 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00051cf50 sp=0xc00051cf30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00051cfe0 sp=0xc00051cf50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00051cfe8 sp=0xc00051cfe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 43 gp=0xc0004aefc0 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00051bf50 sp=0xc00051bf30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00051bfe0 sp=0xc00051bf50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00051bfe8 sp=0xc00051bfe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 44 gp=0xc0004af180 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00051af50 sp=0xc00051af30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00051afe0 sp=0xc00051af50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00051afe8 sp=0xc00051afe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 58 gp=0xc000502e00 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000519f50 sp=0xc000519f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000519fe0 sp=0xc000519f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000519fe8 sp=0xc000519fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 59 gp=0xc000502fc0 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000518f50 sp=0xc000518f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000518fe0 sp=0xc000518f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000518fe8 sp=0xc000518fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 45 gp=0xc0004af340 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000517f50 sp=0xc000517f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000517fe0 sp=0xc000517f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000517fe8 sp=0xc000517fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 22 gp=0xc000182a80 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000516f50 sp=0xc000516f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000516fe0 sp=0xc000516f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000516fe8 sp=0xc000516fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 46 gp=0xc0004af500 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x413a45?, 0x48?, 0xa0?, 0x3f?, 0x1?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004b7f50 sp=0xc0004b7f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004b7fe0 sp=0xc0004b7f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004b7fe8 sp=0xc0004b7fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 47 gp=0xc0004af6c0 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004b6f50 sp=0xc0004b6f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004b6fe0 sp=0xc0004b6f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004b6fe8 sp=0xc0004b6fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 48 gp=0xc0004af880 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0xc000166000?, 0x2014070?, 0x1?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004b5f50 sp=0xc0004b5f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004b5fe0 sp=0xc0004b5f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004b5fe8 sp=0xc0004b5fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 49 gp=0xc0004afa40 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004b4f50 sp=0xc0004b4f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004b4fe0 sp=0xc0004b4f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004b4fe8 sp=0xc0004b4fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 66 gp=0xc0004afc00 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004b3f50 sp=0xc0004b3f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004b3fe0 sp=0xc0004b3f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004b3fe8 sp=0xc0004b3fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 67 gp=0xc0004afdc0 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004b2f50 sp=0xc0004b2f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004b2fe0 sp=0xc0004b2f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004b2fe8 sp=0xc0004b2fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 68 gp=0xc0004b8000 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004b1f50 sp=0xc0004b1f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004b1fe0 sp=0xc0004b1f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004b1fe8 sp=0xc0004b1fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 69 gp=0xc0004b81c0 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004b0f50 sp=0xc0004b0f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004b0fe0 sp=0xc0004b0f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004b0fe8 sp=0xc0004b0fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 60 gp=0xc000503180 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00052df50 sp=0xc00052df30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00052dfe0 sp=0xc00052df50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00052dfe8 sp=0xc00052dfe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 61 gp=0xc000503340 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00052cf50 sp=0xc00052cf30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00052cfe0 sp=0xc00052cf50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00052cfe8 sp=0xc00052cfe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 23 gp=0xc000182c40 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00052bf50 sp=0xc00052bf30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00052bfe0 sp=0xc00052bf50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00052bfe8 sp=0xc00052bfe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 62 gp=0xc000503500 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00052af50 sp=0xc00052af30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00052afe0 sp=0xc00052af50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00052afe8 sp=0xc00052afe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 70 gp=0xc0004b8380 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x413a45?, 0x48?, 0xa0?, 0x3f?, 0x1?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000529f50 sp=0xc000529f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000529fe0 sp=0xc000529f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000529fe8 sp=0xc000529fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 71 gp=0xc0004b8540 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000528f50 sp=0xc000528f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000528fe0 sp=0xc000528f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000528fe8 sp=0xc000528fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 63 gp=0xc0005036c0 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000527f50 sp=0xc000527f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000527fe0 sp=0xc000527f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000527fe8 sp=0xc000527fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 72 gp=0xc0004b8700 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0xc000166000?, 0x2014070?, 0x1?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000526f50 sp=0xc000526f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000526fe0 sp=0xc000526f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000526fe8 sp=0xc000526fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 11 gp=0xc000354c40 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000535f50 sp=0xc000535f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000535fe0 sp=0xc000535f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000535fe8 sp=0xc000535fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 64 gp=0xc000503880 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000534f50 sp=0xc000534f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000534fe0 sp=0xc000534f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000534fe8 sp=0xc000534fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 12 gp=0xc000354e00 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000533f50 sp=0xc000533f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000533fe0 sp=0xc000533f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000533fe8 sp=0xc000533fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 13 gp=0xc000354fc0 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000532f50 sp=0xc000532f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000532fe0 sp=0xc000532f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000532fe8 sp=0xc000532fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 24 gp=0xc000182e00 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000531f50 sp=0xc000531f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000531fe0 sp=0xc000531f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000531fe8 sp=0xc000531fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 14 gp=0xc000355180 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000530f50 sp=0xc000530f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000530fe0 sp=0xc000530f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000530fe8 sp=0xc000530fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 25 gp=0xc000182fc0 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00052ff50 sp=0xc00052ff30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00052ffe0 sp=0xc00052ff50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00052ffe8 sp=0xc00052ffe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 15 gp=0xc000355340 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x413a45?, 0x48?, 0xa0?, 0x3f?, 0x1?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00052ef50 sp=0xc00052ef30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00052efe0 sp=0xc00052ef50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00052efe8 sp=0xc00052efe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 16 gp=0xc000355500 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001cff50 sp=0xc0001cff30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001cffe0 sp=0xc0001cff50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001cffe8 sp=0xc0001cffe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 26 gp=0xc000183180 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001cef50 sp=0xc0001cef30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001cefe0 sp=0xc0001cef50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001cefe8 sp=0xc0001cefe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 27 gp=0xc000183340 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001cdf50 sp=0xc0001cdf30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001cdfe0 sp=0xc0001cdf50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001cdfe8 sp=0xc0001cdfe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 28 gp=0xc000183500 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001ccf50 sp=0xc0001ccf30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001ccfe0 sp=0xc0001ccf50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001ccfe8 sp=0xc0001ccfe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 82 gp=0xc0003556c0 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001cbf50 sp=0xc0001cbf30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001cbfe0 sp=0xc0001cbf50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001cbfe8 sp=0xc0001cbfe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 65 gp=0xc000503a40 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001caf50 sp=0xc0001caf30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001cafe0 sp=0xc0001caf50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001cafe8 sp=0xc0001cafe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 98 gp=0xc000503c00 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001c9f50 sp=0xc0001c9f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001c9fe0 sp=0xc0001c9f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001c9fe8 sp=0xc0001c9fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 83 gp=0xc000355880 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0xc000166000?, 0x2014070?, 0x1?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001c8f50 sp=0xc0001c8f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001c8fe0 sp=0xc0001c8f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001c8fe8 sp=0xc0001c8fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 29 gp=0xc0001836c0 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001d9f50 sp=0xc0001d9f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001d9fe0 sp=0xc0001d9f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001d9fe8 sp=0xc0001d9fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 30 gp=0xc000183880 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001d8f50 sp=0xc0001d8f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001d8fe0 sp=0xc0001d8f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001d8fe8 sp=0xc0001d8fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 84 gp=0xc000355a40 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001d7f50 sp=0xc0001d7f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001d7fe0 sp=0xc0001d7f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001d7fe8 sp=0xc0001d7fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 31 gp=0xc000183a40 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001d6f50 sp=0xc0001d6f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001d6fe0 sp=0xc0001d6f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001d6fe8 sp=0xc0001d6fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 99 gp=0xc000503dc0 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001d5f50 sp=0xc0001d5f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001d5fe0 sp=0xc0001d5f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001d5fe8 sp=0xc0001d5fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 85 gp=0xc000355c00 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001d4f50 sp=0xc0001d4f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001d4fe0 sp=0xc0001d4f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001d4fe8 sp=0xc0001d4fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 100 gp=0xc00053e000 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001d3f50 sp=0xc0001d3f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001d3fe0 sp=0xc0001d3f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001d3fe8 sp=0xc0001d3fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 86 gp=0xc000355dc0 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001d2f50 sp=0xc0001d2f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001d2fe0 sp=0xc0001d2f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001d2fe8 sp=0xc0001d2fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 101 gp=0xc00053e1c0 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004c1f50 sp=0xc0004c1f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004c1fe0 sp=0xc0004c1f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004c1fe8 sp=0xc0004c1fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 73 gp=0xc0004b88c0 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004c0f50 sp=0xc0004c0f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004c0fe0 sp=0xc0004c0f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004c0fe8 sp=0xc0004c0fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 74 gp=0xc0004b8a80 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004bff50 sp=0xc0004bff30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004bffe0 sp=0xc0004bff50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004bffe8 sp=0xc0004bffe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 87 gp=0xc00035e000 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004bef50 sp=0xc0004bef30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004befe0 sp=0xc0004bef50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004befe8 sp=0xc0004befe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 102 gp=0xc00053e380 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004bdf50 sp=0xc0004bdf30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004bdfe0 sp=0xc0004bdf50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004bdfe8 sp=0xc0004bdfe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 88 gp=0xc00035e1c0 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004bcf50 sp=0xc0004bcf30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004bcfe0 sp=0xc0004bcf50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004bcfe8 sp=0xc0004bcfe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 75 gp=0xc0004b8c40 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004bbf50 sp=0xc0004bbf30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004bbfe0 sp=0xc0004bbf50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004bbfe8 sp=0xc0004bbfe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 103 gp=0xc00053e540 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004baf50 sp=0xc0004baf30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004bafe0 sp=0xc0004baf50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004bafe8 sp=0xc0004bafe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 89 gp=0xc00035e380 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0xc000166000?, 0x2014070?, 0x1?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000367f50 sp=0xc000367f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000367fe0 sp=0xc000367f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000367fe8 sp=0xc000367fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 90 gp=0xc00035e540 m=nil [GC worker (idle), 12 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000366f50 sp=0xc000366f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000366fe0 sp=0xc000366f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000366fe8 sp=0xc000366fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 104 gp=0xc00053e700 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x3cfec40?, 0x1?, 0x5b?, 0xaa?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000365f50 sp=0xc000365f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000365fe0 sp=0xc000365f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000365fe8 sp=0xc000365fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 105 gp=0xc00053e8c0 m=nil [GC worker (idle)]: runtime.gopark(0x3cfec40?, 0x1?, 0x1c?, 0xdb?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000364f50 sp=0xc000364f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000364fe0 sp=0xc000364f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000364fe8 sp=0xc000364fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 91 gp=0xc00035e700 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x3cfec40?, 0x1?, 0x57?, 0x52?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000363f50 sp=0xc000363f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000363fe0 sp=0xc000363f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000363fe8 sp=0xc000363fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 106 gp=0xc00053ea80 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x697a032d87046b?, 0x1?, 0xb?, 0xfb?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000362f50 sp=0xc000362f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000362fe0 sp=0xc000362f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000362fe8 sp=0xc000362fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 76 gp=0xc0004b8e00 m=nil [GC worker (idle)]: runtime.gopark(0x3cfec40?, 0x1?, 0xa4?, 0x40?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000361f50 sp=0xc000361f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000361fe0 sp=0xc000361f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000361fe8 sp=0xc000361fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 107 gp=0xc00053ec40 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x3cfec40?, 0x1?, 0xb8?, 0x45?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000360f50 sp=0xc000360f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000360fe0 sp=0xc000360f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000360fe8 sp=0xc000360fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 92 gp=0xc00035e8c0 m=nil [GC worker (idle)]: runtime.gopark(0x697a101aa1ee85?, 0x1?, 0x4e?, 0x15?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00036ff50 sp=0xc00036ff30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00036ffe0 sp=0xc00036ff50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00036ffe8 sp=0xc00036ffe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 93 gp=0xc00035ea80 m=nil [GC worker (idle)]: runtime.gopark(0x697a101b462f6c?, 0x1?, 0xc4?, 0xe5?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00036ef50 sp=0xc00036ef30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00036efe0 sp=0xc00036ef50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00036efe8 sp=0xc00036efe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 108 gp=0xc00053ee00 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x3cfec40?, 0x1?, 0x10?, 0x98?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00036df50 sp=0xc00036df30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00036dfe0 sp=0xc00036df50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00036dfe8 sp=0xc00036dfe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 77 gp=0xc0004b8fc0 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x3cfec40?, 0x1?, 0xb4?, 0x36?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00036cf50 sp=0xc00036cf30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00036cfe0 sp=0xc00036cf50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00036cfe8 sp=0xc00036cfe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 94 gp=0xc00035ec40 m=nil [GC worker (idle)]: runtime.gopark(0x697a101ac01441?, 0x1?, 0xff?, 0x3f?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00036bf50 sp=0xc00036bf30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00036bfe0 sp=0xc00036bf50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00036bfe8 sp=0xc00036bfe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 109 gp=0xc00053efc0 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x3cfec40?, 0x1?, 0x60?, 0x9c?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00036af50 sp=0xc00036af30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00036afe0 sp=0xc00036af50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00036afe8 sp=0xc00036afe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 78 gp=0xc0004b9180 m=nil [GC worker (idle)]: runtime.gopark(0x3cfec40?, 0x1?, 0xe4?, 0x6a?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000369f50 sp=0xc000369f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000369fe0 sp=0xc000369f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000369fe8 sp=0xc000369fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 79 gp=0xc0004b9340 m=nil [GC worker (idle)]: runtime.gopark(0x3cfec40?, 0x1?, 0x4a?, 0xc8?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000368f50 sp=0xc000368f30 pc=0x44288e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000368fe0 sp=0xc000368f50 pc=0x422b65 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000368fe8 sp=0xc000368fe0 pc=0x47d301 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 95 gp=0xc0004b9880 m=nil [sync.Cond.Wait, 12 minutes]: runtime.gopark(0xc00014ecd0?, 0x48f2ce?, 0x1?, 0x0?, 0x480609?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00014ecb0 sp=0xc00014ec90 pc=0x44288e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 sync.runtime_notifyListWait(0xc000180ed8, 0x0) GOROOT/src/runtime/sema.go:569 +0x159 fp=0xc00014ed00 sp=0xc00014ecb0 pc=0x478e79 sync.(*Cond).Wait(0xc000180ec8) GOROOT/src/sync/cond.go:70 +0x75 fp=0xc00014ed30 sp=0xc00014ed00 pc=0x48ceb5 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).findReclaimable(0xc000180808) pkg/sentry/pgalloc/pgalloc.go:1465 +0x1ed fp=0xc00014edf0 sp=0xc00014ed30 pc=0xb7c4cd gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).runReclaim(0xc000180808) pkg/sentry/pgalloc/pgalloc.go:1374 +0xb2 fp=0xc00014efc0 sp=0xc00014edf0 pc=0xb7b672 gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile.gowrap1() pkg/sentry/pgalloc/pgalloc.go:366 +0x34 fp=0xc00014efe0 sp=0xc00014efc0 pc=0xb72d34 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00014efe8 sp=0xc00014efe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile in goroutine 1 pkg/sentry/pgalloc/pgalloc.go:366 +0x64e goroutine 80 gp=0xc000183c00 m=nil [chan receive, 12 minutes]: runtime.gopark(0xc000492c00?, 0x15a1060?, 0xc0?, 0x9b?, 0xc00033a690?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0009b9ef8 sp=0xc0009b9ed8 pc=0x44288e runtime.chanrecv(0xc0005683c0, 0xc0009b9fc0, 0x1) GOROOT/src/runtime/chan.go:583 +0x36d fp=0xc0009b9f70 sp=0xc0009b9ef8 pc=0x40bc2d runtime.chanrecv2(0xc0004b9a40?, 0x1c14c00?) GOROOT/src/runtime/chan.go:447 +0x12 fp=0xc0009b9f98 sp=0xc0009b9f70 pc=0x40b8b2 gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:345 +0x5b fp=0xc0009b9fe0 sp=0xc0009b9f98 pc=0x15a1a3b runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0009b9fe8 sp=0xc0009b9fe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess in goroutine 1 pkg/sentry/platform/systrap/subprocess.go:342 +0x5b6 goroutine 81 gp=0xc000183dc0 m=nil [runnable]: gvisor.dev/gvisor/pkg/sentry/platform/systrap.(*latencyBuckets).getMedian(0x3d002c0) pkg/sentry/platform/systrap/metrics.go:90 +0x125 fp=0xc000785f40 sp=0xc000785f38 pc=0x159b1e5 gvisor.dev/gvisor/pkg/sentry/platform/systrap.sentryOnStubOn(0x2bcfec0) pkg/sentry/platform/systrap/metrics.go:546 +0x45 fp=0xc000785fb8 sp=0xc000785f40 pc=0x159c965 gvisor.dev/gvisor/pkg/sentry/platform/systrap.controlFastPath() pkg/sentry/platform/systrap/metrics.go:273 +0x7c fp=0xc000785fe0 sp=0xc000785fb8 pc=0x159b39c runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000785fe8 sp=0xc000785fe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.New.func2 in goroutine 1 pkg/sentry/platform/systrap/systrap.go:356 +0x25 goroutine 114 gp=0xc00053f180 m=nil [sync.Cond.Wait]: runtime.gopark(0xc00081acd0?, 0x48f2ce?, 0x1?, 0x0?, 0x480609?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00081acb0 sp=0xc00081ac90 pc=0x44288e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 sync.runtime_notifyListWait(0xc000504ed8, 0x10f4) GOROOT/src/runtime/sema.go:569 +0x159 fp=0xc00081ad00 sp=0xc00081acb0 pc=0x478e79 sync.(*Cond).Wait(0xc000504ec8) GOROOT/src/sync/cond.go:70 +0x75 fp=0xc00081ad30 sp=0xc00081ad00 pc=0x48ceb5 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).findReclaimable(0xc000504808) pkg/sentry/pgalloc/pgalloc.go:1465 +0x1ed fp=0xc00081adf0 sp=0xc00081ad30 pc=0xb7c4cd gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).runReclaim(0xc000504808) pkg/sentry/pgalloc/pgalloc.go:1374 +0xb2 fp=0xc00081afc0 sp=0xc00081adf0 pc=0xb7b672 gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile.gowrap1() pkg/sentry/pgalloc/pgalloc.go:366 +0x34 fp=0xc00081afe0 sp=0xc00081afc0 pc=0xb72d34 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00081afe8 sp=0xc00081afe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile in goroutine 1 pkg/sentry/pgalloc/pgalloc.go:366 +0x64e goroutine 115 gp=0xc00053f340 m=nil [select]: runtime.gopark(0xc000cddfa0?, 0x2?, 0x40?, 0x20?, 0xc000cddf04?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000cddd80 sp=0xc000cddd60 pc=0x44288e runtime.selectgo(0xc000cddfa0, 0xc000cddf00, 0x0?, 0x0, 0x0?, 0x1) GOROOT/src/runtime/select.go:327 +0x865 fp=0xc000cdded0 sp=0xc000cddd80 pc=0x455e25 gvisor.dev/gvisor/pkg/sentry/kernel.(*Timekeeper).startUpdater.func1() pkg/sentry/kernel/timekeeper.go:254 +0x312 fp=0xc000cddfe0 sp=0xc000cdded0 pc=0xf6fe52 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000cddfe8 sp=0xc000cddfe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Timekeeper).startUpdater in goroutine 1 pkg/sentry/kernel/timekeeper.go:224 +0x18d goroutine 116 gp=0xc00053f500 m=nil [select, 12 minutes]: runtime.gopark(0x1e30a50?, 0xc0006c4038?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00080fdf0 sp=0xc00080fdd0 pc=0x44288e gvisor.dev/gvisor/pkg/sync.Gopark(0x1e30a50, 0xc0006c4038, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00080fe20 sp=0xc00080fdf0 pc=0x5d27c8 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006c4020, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00080fe90 sp=0xc00080fe20 pc=0x102070d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0006c4020, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00080feb8 sp=0xc00080fe90 pc=0x10208d3 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006c4008, 0xc0002401f8) pkg/tcpip/transport/tcp/dispatcher.go:292 +0x188 fp=0xc00080ffb0 sp=0xc00080feb8 pc=0x1058d88 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:398 +0x45 fp=0xc00080ffe0 sp=0xc00080ffb0 pc=0x10598e5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00080ffe8 sp=0xc00080ffe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:398 +0x217 goroutine 117 gp=0xc00053f6c0 m=nil [select, 12 minutes]: runtime.gopark(0x1e30a50?, 0xc0006c40c8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00081bdf0 sp=0xc00081bdd0 pc=0x44288e gvisor.dev/gvisor/pkg/sync.Gopark(0x1e30a50, 0xc0006c40c8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00081be20 sp=0xc00081bdf0 pc=0x5d27c8 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006c40b0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00081be90 sp=0xc00081be20 pc=0x102070d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0006c40b0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00081beb8 sp=0xc00081be90 pc=0x10208d3 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006c4098, 0xc0002401f8) pkg/tcpip/transport/tcp/dispatcher.go:292 +0x188 fp=0xc00081bfb0 sp=0xc00081beb8 pc=0x1058d88 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:398 +0x45 fp=0xc00081bfe0 sp=0xc00081bfb0 pc=0x10598e5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00081bfe8 sp=0xc00081bfe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:398 +0x217 goroutine 118 gp=0xc00053f880 m=nil [select, 12 minutes]: runtime.gopark(0x1e30a50?, 0xc0006c4158?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00081cdf0 sp=0xc00081cdd0 pc=0x44288e gvisor.dev/gvisor/pkg/sync.Gopark(0x1e30a50, 0xc0006c4158, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00081ce20 sp=0xc00081cdf0 pc=0x5d27c8 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006c4140, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00081ce90 sp=0xc00081ce20 pc=0x102070d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0006c4140, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00081ceb8 sp=0xc00081ce90 pc=0x10208d3 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006c4128, 0xc0002401f8) pkg/tcpip/transport/tcp/dispatcher.go:292 +0x188 fp=0xc00081cfb0 sp=0xc00081ceb8 pc=0x1058d88 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:398 +0x45 fp=0xc00081cfe0 sp=0xc00081cfb0 pc=0x10598e5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00081cfe8 sp=0xc00081cfe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:398 +0x217 goroutine 119 gp=0xc00053fa40 m=nil [select, 12 minutes]: runtime.gopark(0x1e30a50?, 0xc0006c41e8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00081ddf0 sp=0xc00081ddd0 pc=0x44288e gvisor.dev/gvisor/pkg/sync.Gopark(0x1e30a50, 0xc0006c41e8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00081de20 sp=0xc00081ddf0 pc=0x5d27c8 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006c41d0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00081de90 sp=0xc00081de20 pc=0x102070d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0006c41d0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00081deb8 sp=0xc00081de90 pc=0x10208d3 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006c41b8, 0xc0002401f8) pkg/tcpip/transport/tcp/dispatcher.go:292 +0x188 fp=0xc00081dfb0 sp=0xc00081deb8 pc=0x1058d88 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:398 +0x45 fp=0xc00081dfe0 sp=0xc00081dfb0 pc=0x10598e5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00081dfe8 sp=0xc00081dfe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:398 +0x217 goroutine 120 gp=0xc00053fc00 m=nil [select, 12 minutes]: runtime.gopark(0x1e30a50?, 0xc0006c4278?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000822df0 sp=0xc000822dd0 pc=0x44288e gvisor.dev/gvisor/pkg/sync.Gopark(0x1e30a50, 0xc0006c4278, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000822e20 sp=0xc000822df0 pc=0x5d27c8 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006c4260, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000822e90 sp=0xc000822e20 pc=0x102070d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0006c4260, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000822eb8 sp=0xc000822e90 pc=0x10208d3 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006c4248, 0xc0002401f8) pkg/tcpip/transport/tcp/dispatcher.go:292 +0x188 fp=0xc000822fb0 sp=0xc000822eb8 pc=0x1058d88 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:398 +0x45 fp=0xc000822fe0 sp=0xc000822fb0 pc=0x10598e5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000822fe8 sp=0xc000822fe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:398 +0x217 goroutine 121 gp=0xc00053fdc0 m=nil [select, 12 minutes]: runtime.gopark(0x1e30a50?, 0xc0006c4308?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000a80df0 sp=0xc000a80dd0 pc=0x44288e gvisor.dev/gvisor/pkg/sync.Gopark(0x1e30a50, 0xc0006c4308, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000a80e20 sp=0xc000a80df0 pc=0x5d27c8 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006c42f0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000a80e90 sp=0xc000a80e20 pc=0x102070d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0006c42f0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000a80eb8 sp=0xc000a80e90 pc=0x10208d3 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006c42d8, 0xc0002401f8) pkg/tcpip/transport/tcp/dispatcher.go:292 +0x188 fp=0xc000a80fb0 sp=0xc000a80eb8 pc=0x1058d88 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:398 +0x45 fp=0xc000a80fe0 sp=0xc000a80fb0 pc=0x10598e5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000a80fe8 sp=0xc000a80fe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:398 +0x217 goroutine 122 gp=0xc000506380 m=nil [select, 12 minutes]: runtime.gopark(0x1e30a50?, 0xc0006c4398?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000a81df0 sp=0xc000a81dd0 pc=0x44288e gvisor.dev/gvisor/pkg/sync.Gopark(0x1e30a50, 0xc0006c4398, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000a81e20 sp=0xc000a81df0 pc=0x5d27c8 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006c4380, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000a81e90 sp=0xc000a81e20 pc=0x102070d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0006c4380, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000a81eb8 sp=0xc000a81e90 pc=0x10208d3 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006c4368, 0xc0002401f8) pkg/tcpip/transport/tcp/dispatcher.go:292 +0x188 fp=0xc000a81fb0 sp=0xc000a81eb8 pc=0x1058d88 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:398 +0x45 fp=0xc000a81fe0 sp=0xc000a81fb0 pc=0x10598e5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000a81fe8 sp=0xc000a81fe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:398 +0x217 goroutine 123 gp=0xc000506540 m=nil [select, 12 minutes]: runtime.gopark(0x1e30a50?, 0xc0006c4428?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00073bdf0 sp=0xc00073bdd0 pc=0x44288e gvisor.dev/gvisor/pkg/sync.Gopark(0x1e30a50, 0xc0006c4428, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00073be20 sp=0xc00073bdf0 pc=0x5d27c8 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006c4410, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00073be90 sp=0xc00073be20 pc=0x102070d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0006c4410, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00073beb8 sp=0xc00073be90 pc=0x10208d3 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006c43f8, 0xc0002401f8) pkg/tcpip/transport/tcp/dispatcher.go:292 +0x188 fp=0xc00073bfb0 sp=0xc00073beb8 pc=0x1058d88 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:398 +0x45 fp=0xc00073bfe0 sp=0xc00073bfb0 pc=0x10598e5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00073bfe8 sp=0xc00073bfe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:398 +0x217 goroutine 124 gp=0xc000506700 m=nil [select, 12 minutes]: runtime.gopark(0x1e30a50?, 0xc0006c44b8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000991df0 sp=0xc000991dd0 pc=0x44288e gvisor.dev/gvisor/pkg/sync.Gopark(0x1e30a50, 0xc0006c44b8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000991e20 sp=0xc000991df0 pc=0x5d27c8 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006c44a0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000991e90 sp=0xc000991e20 pc=0x102070d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0006c44a0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000991eb8 sp=0xc000991e90 pc=0x10208d3 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006c4488, 0xc0002401f8) pkg/tcpip/transport/tcp/dispatcher.go:292 +0x188 fp=0xc000991fb0 sp=0xc000991eb8 pc=0x1058d88 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:398 +0x45 fp=0xc000991fe0 sp=0xc000991fb0 pc=0x10598e5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000991fe8 sp=0xc000991fe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:398 +0x217 goroutine 125 gp=0xc0005068c0 m=nil [select, 12 minutes]: runtime.gopark(0x1e30a50?, 0xc0006c4548?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000823df0 sp=0xc000823dd0 pc=0x44288e gvisor.dev/gvisor/pkg/sync.Gopark(0x1e30a50, 0xc0006c4548, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000823e20 sp=0xc000823df0 pc=0x5d27c8 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006c4530, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000823e90 sp=0xc000823e20 pc=0x102070d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0006c4530, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000823eb8 sp=0xc000823e90 pc=0x10208d3 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006c4518, 0xc0002401f8) pkg/tcpip/transport/tcp/dispatcher.go:292 +0x188 fp=0xc000823fb0 sp=0xc000823eb8 pc=0x1058d88 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:398 +0x45 fp=0xc000823fe0 sp=0xc000823fb0 pc=0x10598e5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000823fe8 sp=0xc000823fe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:398 +0x217 goroutine 126 gp=0xc000506a80 m=nil [select, 12 minutes]: runtime.gopark(0x1e30a50?, 0xc0006c45d8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000737df0 sp=0xc000737dd0 pc=0x44288e gvisor.dev/gvisor/pkg/sync.Gopark(0x1e30a50, 0xc0006c45d8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000737e20 sp=0xc000737df0 pc=0x5d27c8 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006c45c0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000737e90 sp=0xc000737e20 pc=0x102070d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0006c45c0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000737eb8 sp=0xc000737e90 pc=0x10208d3 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006c45a8, 0xc0002401f8) pkg/tcpip/transport/tcp/dispatcher.go:292 +0x188 fp=0xc000737fb0 sp=0xc000737eb8 pc=0x1058d88 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:398 +0x45 fp=0xc000737fe0 sp=0xc000737fb0 pc=0x10598e5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000737fe8 sp=0xc000737fe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:398 +0x217 goroutine 127 gp=0xc000506c40 m=nil [select, 12 minutes]: runtime.gopark(0x1e30a50?, 0xc0006c4668?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000993df0 sp=0xc000993dd0 pc=0x44288e gvisor.dev/gvisor/pkg/sync.Gopark(0x1e30a50, 0xc0006c4668, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000993e20 sp=0xc000993df0 pc=0x5d27c8 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006c4650, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000993e90 sp=0xc000993e20 pc=0x102070d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0006c4650, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000993eb8 sp=0xc000993e90 pc=0x10208d3 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006c4638, 0xc0002401f8) pkg/tcpip/transport/tcp/dispatcher.go:292 +0x188 fp=0xc000993fb0 sp=0xc000993eb8 pc=0x1058d88 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:398 +0x45 fp=0xc000993fe0 sp=0xc000993fb0 pc=0x10598e5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000993fe8 sp=0xc000993fe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:398 +0x217 goroutine 128 gp=0xc000506e00 m=nil [select, 12 minutes]: runtime.gopark(0x1e30a50?, 0xc0006c46f8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00081edf0 sp=0xc00081edd0 pc=0x44288e gvisor.dev/gvisor/pkg/sync.Gopark(0x1e30a50, 0xc0006c46f8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00081ee20 sp=0xc00081edf0 pc=0x5d27c8 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006c46e0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00081ee90 sp=0xc00081ee20 pc=0x102070d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0006c46e0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00081eeb8 sp=0xc00081ee90 pc=0x10208d3 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006c46c8, 0xc0002401f8) pkg/tcpip/transport/tcp/dispatcher.go:292 +0x188 fp=0xc00081efb0 sp=0xc00081eeb8 pc=0x1058d88 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:398 +0x45 fp=0xc00081efe0 sp=0xc00081efb0 pc=0x10598e5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00081efe8 sp=0xc00081efe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:398 +0x217 goroutine 129 gp=0xc000506fc0 m=nil [select, 12 minutes]: runtime.gopark(0x1e30a50?, 0xc0006c4788?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00073adf0 sp=0xc00073add0 pc=0x44288e gvisor.dev/gvisor/pkg/sync.Gopark(0x1e30a50, 0xc0006c4788, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00073ae20 sp=0xc00073adf0 pc=0x5d27c8 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006c4770, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00073ae90 sp=0xc00073ae20 pc=0x102070d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0006c4770, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00073aeb8 sp=0xc00073ae90 pc=0x10208d3 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006c4758, 0xc0002401f8) pkg/tcpip/transport/tcp/dispatcher.go:292 +0x188 fp=0xc00073afb0 sp=0xc00073aeb8 pc=0x1058d88 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:398 +0x45 fp=0xc00073afe0 sp=0xc00073afb0 pc=0x10598e5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00073afe8 sp=0xc00073afe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:398 +0x217 goroutine 130 gp=0xc000507180 m=nil [select, 12 minutes]: runtime.gopark(0x1e30a50?, 0xc0006c4818?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00098fdf0 sp=0xc00098fdd0 pc=0x44288e gvisor.dev/gvisor/pkg/sync.Gopark(0x1e30a50, 0xc0006c4818, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00098fe20 sp=0xc00098fdf0 pc=0x5d27c8 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006c4800, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00098fe90 sp=0xc00098fe20 pc=0x102070d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0006c4800, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00098feb8 sp=0xc00098fe90 pc=0x10208d3 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006c47e8, 0xc0002401f8) pkg/tcpip/transport/tcp/dispatcher.go:292 +0x188 fp=0xc00098ffb0 sp=0xc00098feb8 pc=0x1058d88 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:398 +0x45 fp=0xc00098ffe0 sp=0xc00098ffb0 pc=0x10598e5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00098ffe8 sp=0xc00098ffe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:398 +0x217 goroutine 131 gp=0xc000507340 m=nil [select, 12 minutes]: runtime.gopark(0x1e30a50?, 0xc0006c48a8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00098edf0 sp=0xc00098edd0 pc=0x44288e gvisor.dev/gvisor/pkg/sync.Gopark(0x1e30a50, 0xc0006c48a8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00098ee20 sp=0xc00098edf0 pc=0x5d27c8 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006c4890, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00098ee90 sp=0xc00098ee20 pc=0x102070d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0006c4890, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00098eeb8 sp=0xc00098ee90 pc=0x10208d3 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006c4878, 0xc0002401f8) pkg/tcpip/transport/tcp/dispatcher.go:292 +0x188 fp=0xc00098efb0 sp=0xc00098eeb8 pc=0x1058d88 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:398 +0x45 fp=0xc00098efe0 sp=0xc00098efb0 pc=0x10598e5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00098efe8 sp=0xc00098efe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:398 +0x217 goroutine 132 gp=0xc000507500 m=nil [select, 12 minutes]: runtime.gopark(0x1e30a50?, 0xc0006c4938?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000990df0 sp=0xc000990dd0 pc=0x44288e gvisor.dev/gvisor/pkg/sync.Gopark(0x1e30a50, 0xc0006c4938, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000990e20 sp=0xc000990df0 pc=0x5d27c8 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006c4920, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000990e90 sp=0xc000990e20 pc=0x102070d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0006c4920, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000990eb8 sp=0xc000990e90 pc=0x10208d3 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006c4908, 0xc0002401f8) pkg/tcpip/transport/tcp/dispatcher.go:292 +0x188 fp=0xc000990fb0 sp=0xc000990eb8 pc=0x1058d88 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:398 +0x45 fp=0xc000990fe0 sp=0xc000990fb0 pc=0x10598e5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000990fe8 sp=0xc000990fe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:398 +0x217 goroutine 133 gp=0xc0005076c0 m=nil [select, 12 minutes]: runtime.gopark(0x1e30a50?, 0xc0006c49c8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000a82df0 sp=0xc000a82dd0 pc=0x44288e gvisor.dev/gvisor/pkg/sync.Gopark(0x1e30a50, 0xc0006c49c8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000a82e20 sp=0xc000a82df0 pc=0x5d27c8 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006c49b0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000a82e90 sp=0xc000a82e20 pc=0x102070d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0006c49b0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000a82eb8 sp=0xc000a82e90 pc=0x10208d3 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006c4998, 0xc0002401f8) pkg/tcpip/transport/tcp/dispatcher.go:292 +0x188 fp=0xc000a82fb0 sp=0xc000a82eb8 pc=0x1058d88 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:398 +0x45 fp=0xc000a82fe0 sp=0xc000a82fb0 pc=0x10598e5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000a82fe8 sp=0xc000a82fe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:398 +0x217 goroutine 134 gp=0xc000507880 m=nil [select, 12 minutes]: runtime.gopark(0x1e30a50?, 0xc0006c4a58?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000731df0 sp=0xc000731dd0 pc=0x44288e gvisor.dev/gvisor/pkg/sync.Gopark(0x1e30a50, 0xc0006c4a58, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000731e20 sp=0xc000731df0 pc=0x5d27c8 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc0006c4a40, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000731e90 sp=0xc000731e20 pc=0x102070d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc0006c4a40, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000731eb8 sp=0xc000731e90 pc=0x10208d3 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc0006c4a28, 0xc0002401f8) pkg/tcpip/transport/tcp/dispatcher.go:292 +0x188 fp=0xc000731fb0 sp=0xc000731eb8 pc=0x1058d88 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:398 +0x45 fp=0xc000731fe0 sp=0xc000731fb0 pc=0x10598e5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000731fe8 sp=0xc000731fe0 pc=0x47d301 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:398 +0x217 VM DIAGNOSIS: I0621 11:14:26.089049 45171 main.go:192] **************** gVisor **************** I0621 11:14:26.089169 45171 main.go:193] Version 0.0.0, go1.22.0 X:nocoverageredesign, amd64, 96 CPUs, linux, PID 45171, PPID 966233, UID 0, GID 0 D0621 11:14:26.089218 45171 main.go:194] Page size: 0x1000 (4096 bytes) I0621 11:14:26.089246 45171 main.go:195] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race-cover/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race-cover/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-cover-1] I0621 11:14:26.089299 45171 config.go:410] Platform: systrap I0621 11:14:26.089338 45171 config.go:411] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race-cover/workdir/gvisor_root I0621 11:14:26.089374 45171 config.go:412] FileAccess: shared / Directfs: true / Overlay: none I0621 11:14:26.093448 45171 config.go:413] Network: sandbox I0621 11:14:26.093595 45171 config.go:415] Debug: true. Strace: false, max size: 1024, syscalls: D0621 11:14:26.093649 45171 config.go:433] Config.RootDir (--root): /syzkaller/managers/ci-gvisor-systrap-1-race-cover/workdir/gvisor_root D0621 11:14:26.093776 45171 config.go:433] Config.Traceback (--traceback): system D0621 11:14:26.093820 45171 config.go:433] Config.Debug (--debug): true D0621 11:14:26.093906 45171 config.go:433] Config.LogFilename (--log): (empty) D0621 11:14:26.094003 45171 config.go:433] Config.LogFormat (--log-format): text D0621 11:14:26.094034 45171 config.go:433] Config.DebugLog (--debug-log): /dev/stderr D0621 11:14:26.094106 45171 config.go:433] Config.DebugToUserLog (--debug-to-user-log): false D0621 11:14:26.094143 45171 config.go:433] Config.DebugCommand (--debug-command): (empty) D0621 11:14:26.094184 45171 config.go:433] Config.PanicLog (--panic-log): (empty) D0621 11:14:26.094230 45171 config.go:433] Config.CoverageReport (--coverage-report): (empty) D0621 11:14:26.094260 45171 config.go:433] Config.DebugLogFormat (--debug-log-format): text D0621 11:14:26.094320 45171 config.go:433] Config.FileAccess (--file-access): shared D0621 11:14:26.094380 45171 config.go:433] Config.FileAccessMounts (--file-access-mounts): shared D0621 11:14:26.094454 45171 config.go:433] Config.Overlay (--overlay): false D0621 11:14:26.094503 45171 config.go:433] Config.Overlay2 (--overlay2): none D0621 11:14:26.094534 45171 config.go:433] Config.FSGoferHostUDS (--fsgofer-host-uds): false D0621 11:14:26.094580 45171 config.go:433] Config.HostUDS (--host-uds): none D0621 11:14:26.094637 45171 config.go:433] Config.HostFifo (--host-fifo): none D0621 11:14:26.094681 45171 config.go:433] Config.Network (--network): sandbox D0621 11:14:26.094721 45171 config.go:433] Config.EnableRaw (--net-raw): true D0621 11:14:26.094788 45171 config.go:433] Config.AllowPacketEndpointWrite (--TESTONLY-allow-packet-endpoint-write): false D0621 11:14:26.094834 45171 config.go:433] Config.HostGSO (--gso): false D0621 11:14:26.094874 45171 config.go:433] Config.GVisorGSO (--software-gso): true D0621 11:14:26.094925 45171 config.go:433] Config.GVisorGRO (--gvisor-gro): false D0621 11:14:26.094961 45171 config.go:433] Config.TXChecksumOffload (--tx-checksum-offload): false D0621 11:14:26.095028 45171 config.go:433] Config.RXChecksumOffload (--rx-checksum-offload): true D0621 11:14:26.095073 45171 config.go:433] Config.QDisc (--qdisc): fifo D0621 11:14:26.095114 45171 config.go:433] Config.LogPackets (--log-packets): false D0621 11:14:26.095158 45171 config.go:433] Config.PCAP (--pcap-log): (empty) D0621 11:14:26.095215 45171 config.go:433] Config.Platform (--platform): systrap D0621 11:14:26.095263 45171 config.go:433] Config.PlatformDevicePath (--platform_device_path): (empty) D0621 11:14:26.095311 45171 config.go:433] Config.MetricServer (--metric-server): (empty) D0621 11:14:26.095365 45171 config.go:433] Config.ProfilingMetrics (--profiling-metrics): (empty) D0621 11:14:26.095453 45171 config.go:433] Config.ProfilingMetricsLog (--profiling-metrics-log): (empty) D0621 11:14:26.095538 45171 config.go:433] Config.ProfilingMetricsRate (--profiling-metrics-rate-us): 1000 D0621 11:14:26.095665 45171 config.go:433] Config.Strace (--strace): false D0621 11:14:26.095721 45171 config.go:433] Config.StraceSyscalls (--strace-syscalls): (empty) D0621 11:14:26.095780 45171 config.go:433] Config.StraceLogSize (--strace-log-size): 1024 D0621 11:14:26.095842 45171 config.go:433] Config.StraceEvent (--strace-event): false D0621 11:14:26.095894 45171 config.go:435] Config.DisableSeccomp: false D0621 11:14:26.095944 45171 config.go:433] Config.EnableCoreTags (--enable-core-tags): false D0621 11:14:26.095990 45171 config.go:433] Config.WatchdogAction (--watchdog-action): panic D0621 11:14:26.096038 45171 config.go:433] Config.PanicSignal (--panic-signal): -1 D0621 11:14:26.096077 45171 config.go:433] Config.ProfileEnable (--profile): false D0621 11:14:26.096140 45171 config.go:433] Config.ProfileBlock (--profile-block): (empty) D0621 11:14:26.096166 45171 config.go:433] Config.ProfileCPU (--profile-cpu): (empty) D0621 11:14:26.096191 45171 config.go:433] Config.ProfileHeap (--profile-heap): (empty) D0621 11:14:26.096229 45171 config.go:433] Config.ProfileMutex (--profile-mutex): (empty) D0621 11:14:26.096300 45171 config.go:433] Config.TraceFile (--trace): (empty) D0621 11:14:26.096341 45171 config.go:433] Config.NumNetworkChannels (--num-network-channels): 1 D0621 11:14:26.096381 45171 config.go:433] Config.NetworkProcessorsPerChannel (--network-processors-per-channel): 0 D0621 11:14:26.096419 45171 config.go:433] Config.Rootless (--rootless): false D0621 11:14:26.096455 45171 config.go:433] Config.AlsoLogToStderr (--alsologtostderr): false D0621 11:14:26.096516 45171 config.go:433] Config.ReferenceLeak (--ref-leak-mode): disabled D0621 11:14:26.096563 45171 config.go:433] Config.CPUNumFromQuota (--cpu-num-from-quota): false D0621 11:14:26.096619 45171 config.go:433] Config.AllowFlagOverride (--allow-flag-override): false D0621 11:14:26.096669 45171 config.go:433] Config.OCISeccomp (--oci-seccomp): false D0621 11:14:26.096708 45171 config.go:433] Config.IgnoreCgroups (--ignore-cgroups): false D0621 11:14:26.096736 45171 config.go:433] Config.SystemdCgroup (--systemd-cgroup): false D0621 11:14:26.096789 45171 config.go:433] Config.PodInitConfig (--pod-init-config): (empty) D0621 11:14:26.096822 45171 config.go:433] Config.BufferPooling (--buffer-pooling): true D0621 11:14:26.096893 45171 config.go:433] Config.XDP (--EXPERIMENTAL-xdp): {0 } D0621 11:14:26.096990 45171 config.go:433] Config.AFXDPUseNeedWakeup (--EXPERIMENTAL-xdp-need-wakeup): true D0621 11:14:26.097036 45171 config.go:433] Config.FDLimit (--fdlimit): -1 D0621 11:14:26.097096 45171 config.go:433] Config.DCache (--dcache): -1 D0621 11:14:26.097128 45171 config.go:433] Config.IOUring (--iouring): false D0621 11:14:26.097179 45171 config.go:433] Config.DirectFS (--directfs): true D0621 11:14:26.097213 45171 config.go:433] Config.NVProxy (--nvproxy): false D0621 11:14:26.097260 45171 config.go:433] Config.NVProxyDocker (--nvproxy-docker): false D0621 11:14:26.097312 45171 config.go:433] Config.NVProxyDriverVersion (--nvproxy-driver-version): (empty) D0621 11:14:26.097381 45171 config.go:433] Config.TPUProxy (--tpuproxy): false D0621 11:14:26.097461 45171 config.go:433] Config.TestOnlyAllowRunAsCurrentUserWithoutChroot (--TESTONLY-unsafe-nonroot): true D0621 11:14:26.097513 45171 config.go:433] Config.TestOnlyTestNameEnv (--TESTONLY-test-name-env): (empty) D0621 11:14:26.097617 45171 config.go:433] Config.TestOnlyAFSSyscallPanic (--TESTONLY-afs-syscall-panic): false D0621 11:14:26.097660 45171 config.go:435] Config.explicitlySet: (unexported) D0621 11:14:26.097709 45171 config.go:433] Config.ReproduceNAT (--reproduce-nat): false D0621 11:14:26.097784 45171 config.go:433] Config.ReproduceNftables (--reproduce-nftables): false D0621 11:14:26.097849 45171 config.go:433] Config.NetDisconnectOk (--net-disconnect-ok): false D0621 11:14:26.097911 45171 config.go:433] Config.TestOnlyAutosaveImagePath (--TESTONLY-autosave-image-path): (empty) D0621 11:14:26.097969 45171 config.go:433] Config.TestOnlyAutosaveResume (--TESTONLY-autosave-resume): false I0621 11:14:26.098010 45171 main.go:197] **************** gVisor **************** W0621 11:14:26.098072 45171 main.go:206] Block the TERM signal. This is only safe in tests! D0621 11:14:26.098254 45171 state_file.go:77] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race-cover/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-cover-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0621 11:14:26.098605 45171 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-race-cover-1": file does not exist loading container "ci-gvisor-systrap-1-race-cover-1": file does not exist W0621 11:14:26.098962 45171 main.go:227] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-race-cover/current/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-race-cover/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-gso=false" "-net-raw" "-watchdog-action=panic" "-TESTONLY-unsafe-nonroot" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-race-cover-1"]: exit status 128 I0621 11:14:26.089049 45171 main.go:192] **************** gVisor **************** I0621 11:14:26.089169 45171 main.go:193] Version 0.0.0, go1.22.0 X:nocoverageredesign, amd64, 96 CPUs, linux, PID 45171, PPID 966233, UID 0, GID 0 D0621 11:14:26.089218 45171 main.go:194] Page size: 0x1000 (4096 bytes) I0621 11:14:26.089246 45171 main.go:195] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race-cover/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race-cover/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-cover-1] I0621 11:14:26.089299 45171 config.go:410] Platform: systrap I0621 11:14:26.089338 45171 config.go:411] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race-cover/workdir/gvisor_root I0621 11:14:26.089374 45171 config.go:412] FileAccess: shared / Directfs: true / Overlay: none I0621 11:14:26.093448 45171 config.go:413] Network: sandbox I0621 11:14:26.093595 45171 config.go:415] Debug: true. Strace: false, max size: 1024, syscalls: D0621 11:14:26.093649 45171 config.go:433] Config.RootDir (--root): /syzkaller/managers/ci-gvisor-systrap-1-race-cover/workdir/gvisor_root D0621 11:14:26.093776 45171 config.go:433] Config.Traceback (--traceback): system D0621 11:14:26.093820 45171 config.go:433] Config.Debug (--debug): true D0621 11:14:26.093906 45171 config.go:433] Config.LogFilename (--log): (empty) D0621 11:14:26.094003 45171 config.go:433] Config.LogFormat (--log-format): text D0621 11:14:26.094034 45171 config.go:433] Config.DebugLog (--debug-log): /dev/stderr D0621 11:14:26.094106 45171 config.go:433] Config.DebugToUserLog (--debug-to-user-log): false D0621 11:14:26.094143 45171 config.go:433] Config.DebugCommand (--debug-command): (empty) D0621 11:14:26.094184 45171 config.go:433] Config.PanicLog (--panic-log): (empty) D0621 11:14:26.094230 45171 config.go:433] Config.CoverageReport (--coverage-report): (empty) D0621 11:14:26.094260 45171 config.go:433] Config.DebugLogFormat (--debug-log-format): text D0621 11:14:26.094320 45171 config.go:433] Config.FileAccess (--file-access): shared D0621 11:14:26.094380 45171 config.go:433] Config.FileAccessMounts (--file-access-mounts): shared D0621 11:14:26.094454 45171 config.go:433] Config.Overlay (--overlay): false D0621 11:14:26.094503 45171 config.go:433] Config.Overlay2 (--overlay2): none D0621 11:14:26.094534 45171 config.go:433] Config.FSGoferHostUDS (--fsgofer-host-uds): false D0621 11:14:26.094580 45171 config.go:433] Config.HostUDS (--host-uds): none D0621 11:14:26.094637 45171 config.go:433] Config.HostFifo (--host-fifo): none D0621 11:14:26.094681 45171 config.go:433] Config.Network (--network): sandbox D0621 11:14:26.094721 45171 config.go:433] Config.EnableRaw (--net-raw): true D0621 11:14:26.094788 45171 config.go:433] Config.AllowPacketEndpointWrite (--TESTONLY-allow-packet-endpoint-write): false D0621 11:14:26.094834 45171 config.go:433] Config.HostGSO (--gso): false D0621 11:14:26.094874 45171 config.go:433] Config.GVisorGSO (--software-gso): true D0621 11:14:26.094925 45171 config.go:433] Config.GVisorGRO (--gvisor-gro): false D0621 11:14:26.094961 45171 config.go:433] Config.TXChecksumOffload (--tx-checksum-offload): false D0621 11:14:26.095028 45171 config.go:433] Config.RXChecksumOffload (--rx-checksum-offload): true D0621 11:14:26.095073 45171 config.go:433] Config.QDisc (--qdisc): fifo D0621 11:14:26.095114 45171 config.go:433] Config.LogPackets (--log-packets): false D0621 11:14:26.095158 45171 config.go:433] Config.PCAP (--pcap-log): (empty) D0621 11:14:26.095215 45171 config.go:433] Config.Platform (--platform): systrap D0621 11:14:26.095263 45171 config.go:433] Config.PlatformDevicePath (--platform_device_path): (empty) D0621 11:14:26.095311 45171 config.go:433] Config.MetricServer (--metric-server): (empty) D0621 11:14:26.095365 45171 config.go:433] Config.ProfilingMetrics (--profiling-metrics): (empty) D0621 11:14:26.095453 45171 config.go:433] Config.ProfilingMetricsLog (--profiling-metrics-log): (empty) D0621 11:14:26.095538 45171 config.go:433] Config.ProfilingMetricsRate (--profiling-metrics-rate-us): 1000 D0621 11:14:26.095665 45171 config.go:433] Config.Strace (--strace): false D0621 11:14:26.095721 45171 config.go:433] Config.StraceSyscalls (--strace-syscalls): (empty) D0621 11:14:26.095780 45171 config.go:433] Config.StraceLogSize (--strace-log-size): 1024 D0621 11:14:26.095842 45171 config.go:433] Config.StraceEvent (--strace-event): false D0621 11:14:26.095894 45171 config.go:435] Config.DisableSeccomp: false D0621 11:14:26.095944 45171 config.go:433] Config.EnableCoreTags (--enable-core-tags): false D0621 11:14:26.095990 45171 config.go:433] Config.WatchdogAction (--watchdog-action): panic D0621 11:14:26.096038 45171 config.go:433] Config.PanicSignal (--panic-signal): -1 D0621 11:14:26.096077 45171 config.go:433] Config.ProfileEnable (--profile): false D0621 11:14:26.096140 45171 config.go:433] Config.ProfileBlock (--profile-block): (empty) D0621 11:14:26.096166 45171 config.go:433] Config.ProfileCPU (--profile-cpu): (empty) D0621 11:14:26.096191 45171 config.go:433] Config.ProfileHeap (--profile-heap): (empty) D0621 11:14:26.096229 45171 config.go:433] Config.ProfileMutex (--profile-mutex): (empty) D0621 11:14:26.096300 45171 config.go:433] Config.TraceFile (--trace): (empty) D0621 11:14:26.096341 45171 config.go:433] Config.NumNetworkChannels (--num-network-channels): 1 D0621 11:14:26.096381 45171 config.go:433] Config.NetworkProcessorsPerChannel (--network-processors-per-channel): 0 D0621 11:14:26.096419 45171 config.go:433] Config.Rootless (--rootless): false D0621 11:14:26.096455 45171 config.go:433] Config.AlsoLogToStderr (--alsologtostderr): false D0621 11:14:26.096516 45171 config.go:433] Config.ReferenceLeak (--ref-leak-mode): disabled D0621 11:14:26.096563 45171 config.go:433] Config.CPUNumFromQuota (--cpu-num-from-quota): false D0621 11:14:26.096619 45171 config.go:433] Config.AllowFlagOverride (--allow-flag-override): false D0621 11:14:26.096669 45171 config.go:433] Config.OCISeccomp (--oci-seccomp): false D0621 11:14:26.096708 45171 config.go:433] Config.IgnoreCgroups (--ignore-cgroups): false D0621 11:14:26.096736 45171 config.go:433] Config.SystemdCgroup (--systemd-cgroup): false D0621 11:14:26.096789 45171 config.go:433] Config.PodInitConfig (--pod-init-config): (empty) D0621 11:14:26.096822 45171 config.go:433] Config.BufferPooling (--buffer-pooling): true D0621 11:14:26.096893 45171 config.go:433] Config.XDP (--EXPERIMENTAL-xdp): {0 } D0621 11:14:26.096990 45171 config.go:433] Config.AFXDPUseNeedWakeup (--EXPERIMENTAL-xdp-need-wakeup): true D0621 11:14:26.097036 45171 config.go:433] Config.FDLimit (--fdlimit): -1 D0621 11:14:26.097096 45171 config.go:433] Config.DCache (--dcache): -1 D0621 11:14:26.097128 45171 config.go:433] Config.IOUring (--iouring): false D0621 11:14:26.097179 45171 config.go:433] Config.DirectFS (--directfs): true D0621 11:14:26.097213 45171 config.go:433] Config.NVProxy (--nvproxy): false D0621 11:14:26.097260 45171 config.go:433] Config.NVProxyDocker (--nvproxy-docker): false D0621 11:14:26.097312 45171 config.go:433] Config.NVProxyDriverVersion (--nvproxy-driver-version): (empty) D0621 11:14:26.097381 45171 config.go:433] Config.TPUProxy (--tpuproxy): false D0621 11:14:26.097461 45171 config.go:433] Config.TestOnlyAllowRunAsCurrentUserWithoutChroot (--TESTONLY-unsafe-nonroot): true D0621 11:14:26.097513 45171 config.go:433] Config.TestOnlyTestNameEnv (--TESTONLY-test-name-env): (empty) D0621 11:14:26.097617 45171 config.go:433] Config.TestOnlyAFSSyscallPanic (--TESTONLY-afs-syscall-panic): false D0621 11:14:26.097660 45171 config.go:435] Config.explicitlySet: (unexported) D0621 11:14:26.097709 45171 config.go:433] Config.ReproduceNAT (--reproduce-nat): false D0621 11:14:26.097784 45171 config.go:433] Config.ReproduceNftables (--reproduce-nftables): false D0621 11:14:26.097849 45171 config.go:433] Config.NetDisconnectOk (--net-disconnect-ok): false D0621 11:14:26.097911 45171 config.go:433] Config.TestOnlyAutosaveImagePath (--TESTONLY-autosave-image-path): (empty) D0621 11:14:26.097969 45171 config.go:433] Config.TestOnlyAutosaveResume (--TESTONLY-autosave-resume): false I0621 11:14:26.098010 45171 main.go:197] **************** gVisor **************** W0621 11:14:26.098072 45171 main.go:206] Block the TERM signal. This is only safe in tests! D0621 11:14:26.098254 45171 state_file.go:77] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race-cover/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-cover-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0621 11:14:26.098605 45171 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-race-cover-1": file does not exist loading container "ci-gvisor-systrap-1-race-cover-1": file does not exist W0621 11:14:26.098962 45171 main.go:227] Failure to execute command, err: 1 [28769413.290584] exe[117972] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ea769a3db38 ax:0 si:7ea769a3dc70 di:19 [28769413.378238] exe[176421] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ea769a3db38 ax:0 si:7ea769a3dc70 di:19 [28769413.460091] exe[117108] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ead121e4b38 ax:0 si:7ead121e4c70 di:19 [28769523.385172] exe[167112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a2e3f4c79 cs:33 sp:7f3e3e3de858 ax:0 si:562a2e45f328 di:ffffffffff600000 [28769523.939793] exe[165218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a2e3f4c79 cs:33 sp:7f3e3e3de858 ax:0 si:562a2e45f328 di:ffffffffff600000 [28769524.452363] exe[184784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a2e3f4c79 cs:33 sp:7f3e3e3de858 ax:0 si:562a2e45f328 di:ffffffffff600000 [28769526.757419] exe[156007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bc5bbac79 cs:33 sp:7f4272dfe858 ax:0 si:559bc5c25328 di:ffffffffff600000 [28769762.595724] exe[185720] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f377a1c8b38 ax:0 si:7f377a1c8c70 di:19 [28769762.807593] exe[183181] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f377a1c8b38 ax:0 si:7f377a1c8c70 di:19 [28769762.964482] exe[183181] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f377a1c8b38 ax:0 si:7f377a1c8c70 di:19 [28769763.109460] exe[160863] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f8feabdcb38 ax:0 si:7f8feabdcc70 di:19 [28769763.276572] exe[160080] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f377a1c8b38 ax:0 si:7f377a1c8c70 di:19 [28769870.128385] exe[166880] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd6729feb38 ax:0 si:7fd6729fec70 di:19 [28769919.061430] exe[150193] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ec116981b38 ax:0 si:7ec116981c70 di:19 [28769920.450522] exe[150193] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ec116981b38 ax:0 si:7ec116981c70 di:19 [28769921.562469] exe[150356] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ec116981b38 ax:0 si:7ec116981c70 di:19 [28769922.387022] exe[150193] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ec116981b38 ax:0 si:7ec116981c70 di:19 [28769923.463376] exe[150193] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ec116981b38 ax:0 si:7ec116981c70 di:19 [28769955.304821] exe[169952] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fa7ae85eb38 ax:0 si:7fa7ae85ec70 di:19 [28770294.631325] exe[171120] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f0d8f7feb38 ax:0 si:7f0d8f7fec70 di:19 [28771564.928268] exe[167385] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f9159827b38 ax:0 si:7f9159827c70 di:19 [28771565.758445] exe[167358] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f9159827b38 ax:0 si:7f9159827c70 di:19 [28771566.575018] exe[167053] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f9159827b38 ax:0 si:7f9159827c70 di:19 [28771567.440880] exe[167385] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f9159827b38 ax:0 si:7f9159827c70 di:19 [28771568.304332] exe[166957] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f9159827b38 ax:0 si:7f9159827c70 di:19 [28771656.023098] exe[193564] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ea173395b38 ax:0 si:7ea173395c70 di:19 [28771943.359441] exe[186753] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fa4ae678b38 ax:0 si:7fa4ae678c70 di:19 [28771944.512265] exe[184988] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fa4ae678b38 ax:0 si:7fa4ae678c70 di:19 [28771945.388322] exe[186753] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fa4ae678b38 ax:0 si:7fa4ae678c70 di:19 [28771946.214964] exe[123322] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fa4ae678b38 ax:0 si:7fa4ae678c70 di:19 [28771947.014017] exe[184519] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fa4ae678b38 ax:0 si:7fa4ae678c70 di:19 [28772218.119480] exe[192314] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd1fcd9db38 ax:0 si:7fd1fcd9dc70 di:19 [28773173.173761] exe[211436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623b679ac79 cs:33 sp:7fa6ef196858 ax:0 si:5623b680531a di:ffffffffff600000 [28773173.392656] exe[207707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0a2a14c79 cs:33 sp:7f400348a858 ax:0 si:55c0a2a7f31a di:ffffffffff600000 [28773173.715347] exe[213107] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564dd9a99c79 cs:33 sp:7fb198a8a858 ax:0 si:564dd9b0431a di:ffffffffff600000 [28773174.032835] exe[214980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623b679ac79 cs:33 sp:7fa6ef196858 ax:0 si:5623b680531a di:ffffffffff600000 [28773491.625971] exe[225213] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fc883f03b38 ax:0 si:7fc883f03c70 di:19 [28774016.795183] exe[226497] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fc56d9a1b38 ax:0 si:7fc56d9a1c70 di:19 [28774182.874341] exe[195547] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f7bfb19bb38 ax:0 si:7f7bfb19bc70 di:19 [28774376.521545] exe[235268] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f3c82e50b38 ax:0 si:7f3c82e50c70 di:19 [28774450.279486] exe[226560] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561dbb55cc79 cs:33 sp:7feba3bfeef8 ax:0 si:200000c0 di:ffffffffff600000 [28774461.194399] exe[238716] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ebc5fef3b38 ax:0 si:7ebc5fef3c70 di:19 [28774465.854965] exe[209742] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56300a89cc79 cs:33 sp:7f669c425ef8 ax:0 si:200000c0 di:ffffffffff600000 [28774465.869608] exe[212469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56300a89cc79 cs:33 sp:7f669c446ef8 ax:0 si:200000c0 di:ffffffffff600000 [28774576.873614] exe[234733] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f7604554b38 ax:0 si:7f7604554c70 di:19 [28774596.628298] exe[240300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac5b477c79 cs:33 sp:7fbf9da3b858 ax:0 si:55ac5b4e231a di:ffffffffff600000 [28774597.320626] exe[234796] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ea45367eb38 ax:0 si:7ea45367ec70 di:19 [28774597.470967] exe[244784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561997156c79 cs:33 sp:7f12fd118858 ax:0 si:5619971c131a di:ffffffffff600000 [28774598.148684] exe[237903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce0f002c79 cs:33 sp:7fb6ada64858 ax:0 si:55ce0f06d31a di:ffffffffff600000 [28774599.147192] exe[242805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561997156c79 cs:33 sp:7f12fd118858 ax:0 si:5619971c131a di:ffffffffff600000 [28774600.236884] exe[237948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561997156c79 cs:33 sp:7f12fd118858 ax:0 si:5619971c131a di:ffffffffff600000 [28774603.447776] exe[234168] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fe5985aab38 ax:0 si:7fe5985aac70 di:19 [28774676.661819] potentially unexpected fatal signal 5. [28774676.667058] CPU: 66 PID: 226514 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28774676.679035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28774676.688660] RIP: 0033:0x7fffffffe062 [28774676.692626] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28774676.711866] RSP: 002b:000000c000021b90 EFLAGS: 00000297 [28774676.718889] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28774676.727832] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28774676.736721] RBP: 000000c000021c28 R08: 0000000000000000 R09: 0000000000000000 [28774676.745621] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000021c18 [28774676.754542] R13: 000000c000028c00 R14: 000000c00046d6c0 R15: 000000000003328f [28774676.763475] FS: 000000c00013b098 GS: 0000000000000000 [28775201.673899] exe[233055] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fba2fe57b38 ax:0 si:7fba2fe57c70 di:19 [28776064.010376] exe[248337] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fcbc7986b38 ax:0 si:7fcbc7986c70 di:19 [28776610.639007] exe[248342] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fe6c16c2b38 ax:0 si:7fe6c16c2c70 di:19 [28776678.543053] exe[226500] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6925b36b38 ax:0 si:7f6925b36c70 di:19 [28776862.088032] exe[246703] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f013f3a3b38 ax:0 si:7f013f3a3c70 di:19 [28777017.514139] exe[265918] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f991cab1b38 ax:0 si:7f991cab1c70 di:19 [28777073.624760] exe[267013] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ff174a5bb38 ax:0 si:7ff174a5bc70 di:19 [28777147.122536] exe[240324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4bbe6ac79 cs:33 sp:7fd10bd50858 ax:0 si:55a4bbed531a di:ffffffffff600000 [28777148.484018] exe[240883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f614c94c79 cs:33 sp:7fceee9ba858 ax:0 si:55f614cff31a di:ffffffffff600000 [28777149.445788] exe[237930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4bbe6ac79 cs:33 sp:7fd10bd50858 ax:0 si:55a4bbed531a di:ffffffffff600000 [28777150.454005] exe[255346] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595f388ec79 cs:33 sp:7f4701be3858 ax:0 si:5595f38f931a di:ffffffffff600000 [28777151.611483] exe[244458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6f18c7c79 cs:33 sp:7ff26a3d8858 ax:0 si:55d6f193231a di:ffffffffff600000 [28777202.838846] exe[232582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699f546c79 cs:33 sp:7ebd546f3858 ax:0 si:55699f5b131a di:ffffffffff600000 [28778739.528568] exe[291756] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fc2a7a5fb38 ax:0 si:7fc2a7a5fc70 di:19 [28778778.277293] exe[296172] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f3c7b482b38 ax:0 si:7f3c7b482c70 di:19 [28779183.723532] exe[290309] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f19b7374b38 ax:0 si:7f19b7374c70 di:19 [28779269.432786] exe[283271] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f9b9666eb38 ax:0 si:7f9b9666ec70 di:19 [28779307.299255] exe[307611] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ea48a746b38 ax:0 si:7ea48a746c70 di:19 [28779347.330442] exe[278131] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ef825ffeb38 ax:0 si:7ef825ffec70 di:19 [28779631.959915] exe[312831] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fb3e3321b38 ax:0 si:7fb3e3321c70 di:19 [28779855.803367] exe[278136] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ee0171cbb38 ax:0 si:7ee0171cbc70 di:19 [28779903.357724] exe[314715] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564bccf87c79 cs:33 sp:7fb7e9868ef8 ax:0 si:20002700 di:ffffffffff600000 [28780104.386563] exe[319988] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f15b7d3bb38 ax:0 si:7f15b7d3bc70 di:19 [28780104.521031] exe[314254] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f15b7d3bb38 ax:0 si:7f15b7d3bc70 di:19 [28780104.521224] exe[320074] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f15b7d1ab38 ax:0 si:7f15b7d1ac70 di:19 [28780290.308028] exe[268113] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f979759db38 ax:0 si:7f979759dc70 di:19 [28780307.344075] exe[316322] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ef5ef8c5b38 ax:0 si:7ef5ef8c5c70 di:19 [28780373.006784] exe[278127] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ec9e5966b38 ax:0 si:7ec9e5966c70 di:19 [28780382.705479] exe[315807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5563b7f98c79 cs:33 sp:7fd54c89fef8 ax:0 si:20001500 di:ffffffffff600000 [28780392.195818] exe[322316] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f942b526b38 ax:0 si:7f942b526c70 di:19 [28780392.208406] exe[322316] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f942b526b38 ax:0 si:7f942b526c70 di:19 [28780392.221181] exe[322316] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f942b526b38 ax:0 si:7f942b526c70 di:19 [28780392.234881] exe[322316] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f942b526b38 ax:0 si:7f942b526c70 di:19 [28780392.248411] exe[322316] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f942b526b38 ax:0 si:7f942b526c70 di:19 [28780392.261804] exe[322316] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f942b526b38 ax:0 si:7f942b526c70 di:19 [28780392.275561] exe[322316] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f942b526b38 ax:0 si:7f942b526c70 di:19 [28780392.288808] exe[322316] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f942b526b38 ax:0 si:7f942b526c70 di:19 [28780392.302325] exe[322316] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f942b526b38 ax:0 si:7f942b526c70 di:19 [28780392.315910] exe[322316] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f942b526b38 ax:0 si:7f942b526c70 di:19 [28780485.421301] warn_bad_vsyscall: 23 callbacks suppressed [28780485.421304] exe[273924] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f239d84c79 cs:33 sp:7f03dd7fe858 ax:0 si:55f239def31a di:ffffffffff600000 [28780566.781698] exe[278130] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ef472d67b38 ax:0 si:7ef472d67c70 di:19 [28780587.401509] exe[280725] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fbb8a648b38 ax:0 si:7fbb8a648c70 di:19 [28780603.338401] exe[316307] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ed67192cb38 ax:0 si:7ed67192cc70 di:19 [28780603.351787] exe[316307] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ed67192cb38 ax:0 si:7ed67192cc70 di:19 [28780611.795105] exe[279447] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fdcc8e67b38 ax:0 si:7fdcc8e67c70 di:19 [28780614.332567] exe[304332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f930f2fc79 cs:33 sp:7f0283dda858 ax:0 si:55f930f9a31a di:ffffffffff600000 [28780656.620956] exe[320531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629ed62bc79 cs:33 sp:7f9fea57c858 ax:0 si:5629ed69631a di:ffffffffff600000 [28780664.593942] exe[322014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c52fc4cc79 cs:33 sp:7f0b851af858 ax:0 si:55c52fcb731a di:ffffffffff600000 [28780710.030520] exe[307990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561afa97dc79 cs:33 sp:7f84e24d9858 ax:0 si:561afa9e831a di:ffffffffff600000 [28780729.434125] exe[295972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55625188cc79 cs:33 sp:7f04ae694858 ax:0 si:5562518f731a di:ffffffffff600000 [28780734.819123] exe[295045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55629ba6fc79 cs:33 sp:7fecb5304858 ax:0 si:55629bada31a di:ffffffffff600000 [28780738.158077] exe[278130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563daaefac79 cs:33 sp:7eb6dadaa858 ax:0 si:563daaf6531a di:ffffffffff600000 [28780763.634100] exe[324480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d51aea6c79 cs:33 sp:7ff2a82f1858 ax:0 si:55d51af1131a di:ffffffffff600000 [28780797.616789] exe[324117] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e3b865c79 cs:33 sp:7f359c3ea858 ax:0 si:559e3b8d031a di:ffffffffff600000 [28780905.011124] exe[321974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641cbe77c79 cs:33 sp:7f808bffe858 ax:0 si:5641cbee231a di:ffffffffff600000 [28780953.224082] exe[328373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5556c2e9dc79 cs:33 sp:7ec42f03e858 ax:0 si:5556c2f0831a di:ffffffffff600000 [28780959.771383] exe[309717] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6bb35ec79 cs:33 sp:7f34e5887858 ax:0 si:55d6bb3c931a di:ffffffffff600000 [28780986.527936] exe[324579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e610a2ec79 cs:33 sp:7eb176620858 ax:0 si:55e610a9931a di:ffffffffff600000 [28781383.250678] exe[337875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1ee973c79 cs:33 sp:7f1ce22af858 ax:0 si:55d1ee9de31a di:ffffffffff600000 [28781688.161947] exe[340798] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ed0073f9b38 ax:0 si:7ed0073f9c70 di:19 [28781757.059123] exe[303645] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fb67effeb38 ax:0 si:7fb67effec70 di:19 [28781875.538512] exe[344106] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f388e661b38 ax:0 si:7f388e661c70 di:19 [28782009.615232] exe[348028] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f114b529b38 ax:0 si:7f114b529c70 di:19 [28782033.263431] exe[303200] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f328516db38 ax:0 si:7f328516dc70 di:19 [28782041.707459] exe[305700] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f328516db38 ax:0 si:7f328516dc70 di:19 [28782043.028599] exe[344391] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f49e3bb6b38 ax:0 si:7f49e3bb6c70 di:19 [28782151.305432] exe[311296] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f991697cb38 ax:0 si:7f991697cc70 di:19 [28782476.028829] exe[363226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bddb850c79 cs:33 sp:7fd1d5ffe858 ax:0 si:55bddb8bb31a di:ffffffffff600000 [28782515.549135] exe[357277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a01e685c79 cs:33 sp:7f69e2d49858 ax:0 si:55a01e6f031a di:ffffffffff600000 [28782522.562657] exe[351218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600e2111c79 cs:33 sp:7f230f31b858 ax:0 si:5600e217c31a di:ffffffffff600000 [28782537.848293] exe[340643] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56108394cc79 cs:33 sp:7ef444ebc858 ax:0 si:5610839b731a di:ffffffffff600000 [28782584.351367] exe[332697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2ad20fc79 cs:33 sp:7fb809d86858 ax:0 si:55c2ad27a31a di:ffffffffff600000 [28782594.886174] exe[348576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1f7506c79 cs:33 sp:7f78a5b70858 ax:0 si:55e1f757131a di:ffffffffff600000 [28782666.345425] exe[344608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574b0e70c79 cs:33 sp:7f4f7f3fe858 ax:0 si:5574b0edb31a di:ffffffffff600000 [28782697.182684] exe[276007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c21aedc79 cs:33 sp:7f9827a25858 ax:0 si:561c21b5831a di:ffffffffff600000 [28782741.301093] exe[285884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa41bac79 cs:33 sp:7eaefa748858 ax:0 si:55ffa422531a di:ffffffffff600000 [28782746.062515] exe[342746] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ea08f090b38 ax:0 si:7ea08f090c70 di:19 [28782792.080824] exe[333021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612f19ffc79 cs:33 sp:7ef7ab42c858 ax:0 si:5612f1a6a31a di:ffffffffff600000 [28782922.445661] exe[349798] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f20ad4ddb38 ax:0 si:7f20ad4ddc70 di:19 [28782939.499273] exe[370743] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fc4269feb38 ax:0 si:7fc4269fec70 di:19 [28782988.856026] exe[302681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56171a4fdc79 cs:33 sp:7f6c3885e858 ax:0 si:56171a56831a di:ffffffffff600000 [28782992.729668] exe[339982] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fba3422ab38 ax:0 si:7fba3422ac70 di:19 [28782993.943314] exe[325872] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f77aaae9b38 ax:0 si:7f77aaae9c70 di:19 [28782996.615267] exe[371132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e43054c79 cs:33 sp:7ff321ff4858 ax:0 si:561e430bf31a di:ffffffffff600000 [28783005.745561] exe[370974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a02166c79 cs:33 sp:7f39216bf858 ax:0 si:560a021d131a di:ffffffffff600000 [28783566.842691] exe[344051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55679c55bc79 cs:33 sp:7ee49277e858 ax:0 si:55679c5c631a di:ffffffffff600000 [28783653.511690] exe[333016] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fca51a47b38 ax:0 si:7fca51a47c70 di:19 [28783657.084367] exe[388151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e87672c79 cs:33 sp:7ff486f5f858 ax:0 si:555e876dd31a di:ffffffffff600000 [28783682.941614] exe[389269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5585a5f3cc79 cs:33 sp:7f1a34956858 ax:0 si:5585a5fa731a di:ffffffffff600000 [28783683.333064] exe[379655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609419afc79 cs:33 sp:7fa797f40858 ax:0 si:560941a1a31a di:ffffffffff600000 [28783683.989874] exe[389307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555f9eedac79 cs:33 sp:7f1df0361858 ax:0 si:555f9ef4531a di:ffffffffff600000 [28783684.734892] exe[379265] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd95628c79 cs:33 sp:7fde24097858 ax:0 si:55bd9569331a di:ffffffffff600000 [28783843.271541] exe[393311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564735479c79 cs:33 sp:7f2925fa2858 ax:0 si:5647354e431a di:ffffffffff600000 [28783845.964942] exe[342379] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fe0a667bb38 ax:0 si:7fe0a667bc70 di:19 [28784020.423556] exe[394417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e57991c79 cs:33 sp:7ff816c74858 ax:0 si:559e579fc31a di:ffffffffff600000 [28784727.750702] exe[416620] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7febb358bb38 ax:0 si:7febb358bc70 di:19 [28784727.917238] exe[405710] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7febb358bb38 ax:0 si:7febb358bc70 di:19 [28784736.414193] exe[416290] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7febb358bb38 ax:0 si:7febb358bc70 di:19 [28784926.132790] exe[405091] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd2d4783b38 ax:0 si:7fd2d4783c70 di:19 [28784927.097470] exe[404942] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd2d4783b38 ax:0 si:7fd2d4783c70 di:19 [28784955.838723] exe[411504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa0763cc79 cs:33 sp:7f42c00e1858 ax:0 si:55aa076a731a di:ffffffffff600000 [28785028.506456] exe[421932] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fdf4457cb38 ax:0 si:7fdf4457cc70 di:19 [28785134.802279] exe[424178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4ebd23c79 cs:33 sp:7f94d5c2b858 ax:0 si:55e4ebd8e31a di:ffffffffff600000 [28785173.432756] exe[425263] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f5e1969eb38 ax:0 si:7f5e1969ec70 di:19 [28785290.293236] exe[426083] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6888148b38 ax:0 si:7f6888148c70 di:19 [28785427.941032] exe[435417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557628aa4c79 cs:33 sp:7f55c4266858 ax:0 si:557628b0f31a di:ffffffffff600000 [28785500.606588] exe[424860] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f88c2765b38 ax:0 si:7f88c2765c70 di:19 [28785575.285784] exe[424828] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fa19d16ab38 ax:0 si:7fa19d16ac70 di:19 [28785612.188496] exe[423612] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ecd2f6e1b38 ax:0 si:7ecd2f6e1c70 di:19 [28785729.982020] exe[442347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56249bfd5c79 cs:33 sp:7f14193c4858 ax:0 si:56249c04031a di:ffffffffff600000 [28785737.059557] exe[436458] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fbf3c1feb38 ax:0 si:7fbf3c1fec70 di:19 [28785956.175680] exe[425463] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fc2aa637b38 ax:0 si:7fc2aa637c70 di:19 [28786005.732755] exe[432629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556803741c79 cs:33 sp:7f7d65679858 ax:0 si:5568037ac31a di:ffffffffff600000 [28786087.462848] exe[387106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574435aec79 cs:33 sp:7eacb10eb858 ax:0 si:55744361931a di:ffffffffff600000 [28786094.570286] exe[450514] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f52e0392b38 ax:0 si:7f52e0392c70 di:19 [28786324.149240] exe[459465] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f1ae8ed3b38 ax:0 si:7f1ae8ed3c70 di:19 [28786353.811156] exe[387824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c008f0bc79 cs:33 sp:7ef149af9858 ax:0 si:55c008f7631a di:ffffffffff600000 [28786541.229100] exe[446949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e2df0fc79 cs:33 sp:7f1fcdcdf858 ax:0 si:557e2df7a31a di:ffffffffff600000 [28786643.298149] exe[390752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccb9493c79 cs:33 sp:7eecf79c8858 ax:0 si:55ccb94fe31a di:ffffffffff600000 [28786763.699195] exe[470111] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fce01c94b38 ax:0 si:7fce01c94c70 di:19 [28786816.967985] exe[466181] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6b7f96ab38 ax:0 si:7f6b7f96ac70 di:19 [28786899.374085] exe[473004] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f5ff68ffb38 ax:0 si:7f5ff68ffc70 di:19 [28787186.846824] exe[466229] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fa712d77b38 ax:0 si:7fa712d77c70 di:19 [28787770.670019] exe[432256] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ecb9447db38 ax:0 si:7ecb9447dc70 di:19 [28787877.474498] exe[489043] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fa55e57bb38 ax:0 si:7fa55e57bc70 di:19 [28787961.140626] exe[484897] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f1b6077eb38 ax:0 si:7f1b6077ec70 di:19 [28787961.140745] exe[484430] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f1b6079fb38 ax:0 si:7f1b6079fc70 di:19 [28788275.814398] exe[440625] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eec98820b38 ax:0 si:7eec98820c70 di:19 [28788651.960706] exe[500203] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f56a6976b38 ax:0 si:7f56a6976c70 di:19 [28788679.802341] exe[340001] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ebab2b30b38 ax:0 si:7ebab2b30c70 di:19 [28789797.486619] exe[531600] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f61b49d2b38 ax:0 si:7f61b49d2c70 di:19 [28790154.016888] exe[532251] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd7d1dfeb38 ax:0 si:7fd7d1dfec70 di:19 [28790194.594463] exe[516594] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7efa9aca4b38 ax:0 si:7efa9aca4c70 di:19 [28790210.980935] exe[529948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1dcc24c79 cs:33 sp:7fcb7c3feef8 ax:0 si:20000480 di:ffffffffff600000 [28790354.471908] exe[555581] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556316e94c79 cs:33 sp:7f2d36dae858 ax:0 si:556316eff31a di:ffffffffff600000 [28790733.180898] exe[566994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608fddcec79 cs:33 sp:7f7c867d9858 ax:0 si:5608fde3931a di:ffffffffff600000 [28791061.272816] exe[525136] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fcb64ffeb38 ax:0 si:7fcb64ffec70 di:19 [28791075.114972] exe[575706] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fde4e597b38 ax:0 si:7fde4e597c70 di:19 [28791159.090162] exe[536726] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f08a26d7b38 ax:0 si:7f08a26d7c70 di:19 [28791216.862610] exe[531757] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f2518a76b38 ax:0 si:7f2518a76c70 di:19 [28791239.629885] exe[577287] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fa7d1a8bb38 ax:0 si:7fa7d1a8bc70 di:19 [28791288.480804] exe[575922] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6a038f1b38 ax:0 si:7f6a038f1c70 di:19 [28791296.592390] exe[532370] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f63dc69db38 ax:0 si:7f63dc69dc70 di:19 [28791497.267417] exe[502685] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eb194885b38 ax:0 si:7eb194885c70 di:19 [28791770.362890] exe[592581] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac55125c79 cs:33 sp:7f43311a8ef8 ax:0 si:200018c0 di:ffffffffff600000 [28791836.401848] exe[577789] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd7e8346b38 ax:0 si:7fd7e8346c70 di:19 [28791888.247764] exe[529377] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ee35b099b38 ax:0 si:7ee35b099c70 di:19 [28791949.627035] exe[536469] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ea5a44e4b38 ax:0 si:7ea5a44e4c70 di:19 [28791976.210510] exe[529423] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ec0e6b8fb38 ax:0 si:7ec0e6b8fc70 di:19 [28791976.211252] exe[529413] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ec0e6b6eb38 ax:0 si:7ec0e6b6ec70 di:19 [28792936.227945] exe[661547] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eaf38fc6b38 ax:0 si:7eaf38fc6c70 di:19 [28792968.184576] exe[664106] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eaf38fc6b38 ax:0 si:7eaf38fc6c70 di:19 [28793167.399752] exe[674763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563cb6dd8c79 cs:33 sp:7f99e13fe858 ax:0 si:563cb6e4331a di:ffffffffff600000 [28793230.715090] exe[670468] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f74c89feb38 ax:0 si:7f74c89fec70 di:19 [28793254.346827] exe[674401] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f36dbe7bb38 ax:0 si:7f36dbe7bc70 di:19 [28793346.013111] exe[675896] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f3836b2ab38 ax:0 si:7f3836b2ac70 di:19 [28793358.438250] exe[671793] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56241561f3f7 cs:33 sp:7f0fb851bef8 ax:4bc00000 si:56241569e4bc di:ffffffffff600000 [28793409.401479] exe[680458] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7faff43d0b38 ax:0 si:7faff43d0c70 di:19 [28793830.252777] exe[693903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55feb0ff0c79 cs:33 sp:7f43edea7858 ax:0 si:55feb105b31a di:ffffffffff600000 [28793830.252876] exe[698250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55feb0ff0c79 cs:33 sp:7f43edf2b858 ax:0 si:55feb105b31a di:ffffffffff600000 [28793858.601524] exe[671609] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ebb317f8b38 ax:0 si:7ebb317f8c70 di:19 [28794846.128893] exe[657302] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ef4cb682b38 ax:0 si:7ef4cb682c70 di:19 [28795066.593661] exe[668571] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fbc5e1a9b38 ax:0 si:7fbc5e1a9c70 di:19 [28795132.750231] potentially unexpected fatal signal 5. [28795132.755449] CPU: 49 PID: 704264 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28795132.767419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28795132.777074] RIP: 0033:0x7fffffffe062 [28795132.781079] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28795132.800281] RSP: 002b:000000c0005a7b90 EFLAGS: 00000297 [28795132.807310] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28795132.816225] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28795132.825152] RBP: 000000c0005a7c28 R08: 0000000000000000 R09: 0000000000000000 [28795132.834113] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005a7c18 [28795132.843063] R13: 000000c00059da70 R14: 000000c000580540 R15: 00000000000ab8de [28795132.852008] FS: 000000c00013b898 GS: 0000000000000000 [28795292.960722] exe[666804] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ef109e9fb38 ax:0 si:7ef109e9fc70 di:19 [28795325.683327] exe[699545] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f25b9282b38 ax:0 si:7f25b9282c70 di:19 [28795372.523232] exe[696586] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f16bb86eb38 ax:0 si:7f16bb86ec70 di:19 [28795380.274382] exe[657430] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ec9cdd39b38 ax:0 si:7ec9cdd39c70 di:19 [28795860.416011] exe[657279] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ea218c69b38 ax:0 si:7ea218c69c70 di:19 [28795949.950064] exe[655775] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ee918b6bb38 ax:0 si:7ee918b6bc70 di:19 [28796226.781637] exe[688201] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fe3460d1b38 ax:0 si:7fe3460d1c70 di:19 [28796469.282240] exe[773282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc69e29c79 cs:33 sp:7f32beb1e858 ax:0 si:55dc69e9431a di:ffffffffff600000 [28796509.772664] exe[775793] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f2865d8db38 ax:0 si:7f2865d8dc70 di:19 [28796660.730193] exe[775804] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fda0805cb38 ax:0 si:7fda0805cc70 di:19 [28796670.749004] exe[674182] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f0e1a44cb38 ax:0 si:7f0e1a44cc70 di:19 [28796707.655051] exe[756903] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f2a0c47eb38 ax:0 si:7f2a0c47ec70 di:19 [28796760.651094] exe[758141] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fa5e49f8b38 ax:0 si:7fa5e49f8c70 di:19 [28796787.565004] exe[768544] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ea85cbfeb38 ax:0 si:7ea85cbfec70 di:19 [28797039.373056] exe[784725] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fa9670fbb38 ax:0 si:7fa9670fbc70 di:19 [28797067.962095] exe[785077] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f8c4299db38 ax:0 si:7f8c4299dc70 di:19 [28797161.983673] exe[778240] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fcb24cacb38 ax:0 si:7fcb24cacc70 di:19 [28797186.211789] exe[787569] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f99501feb38 ax:0 si:7f99501fec70 di:19 [28797267.856024] exe[786126] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f69bbe9db38 ax:0 si:7f69bbe9dc70 di:19 [28797413.836671] exe[785044] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f03fe855b38 ax:0 si:7f03fe855c70 di:19 [28797437.274933] exe[684606] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f757f8d4b38 ax:0 si:7f757f8d4c70 di:19 [28797568.379463] exe[785364] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6fba3dfb38 ax:0 si:7f6fba3dfc70 di:19 [28797598.198687] exe[790337] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fcce68e5b38 ax:0 si:7fcce68e5c70 di:19 [28797643.472278] exe[795567] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fe9b9fb3b38 ax:0 si:7fe9b9fb3c70 di:19 [28797653.379784] exe[785192] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6fba3dfb38 ax:0 si:7f6fba3dfc70 di:19 [28797659.858618] exe[788769] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fe9b9fb3b38 ax:0 si:7fe9b9fb3c70 di:19 [28797660.469249] exe[803763] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fe522baab38 ax:0 si:7fe522baac70 di:19 [28797841.404789] exe[771588] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f3e0abacb38 ax:0 si:7f3e0abacc70 di:19 [28798252.899251] exe[705974] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f48daa6cb38 ax:0 si:7f48daa6cc70 di:19 [28798270.099428] exe[825898] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f9a3f270b38 ax:0 si:7f9a3f270c70 di:19 [28798739.184743] potentially unexpected fatal signal 5. [28798739.189965] CPU: 19 PID: 841172 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28798739.201980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28798739.211665] RIP: 0033:0x7fffffffe062 [28798739.215688] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28798739.234925] RSP: 002b:000000c000021b90 EFLAGS: 00000297 [28798739.241942] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28798739.250883] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28798739.259775] RBP: 000000c000021c28 R08: 0000000000000000 R09: 0000000000000000 [28798739.268779] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000021c18 [28798739.277615] R13: 000000c000703a70 R14: 000000c000160fc0 R15: 00000000000cc907 [28798739.286518] FS: 000000c00013a898 GS: 0000000000000000 [28799049.145127] exe[709564] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fb08b324b38 ax:0 si:7fb08b324c70 di:19 [28799220.805567] exe[822186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b139623c79 cs:33 sp:7f81cdbfe858 ax:0 si:55b13968e31a di:ffffffffff600000 [28799526.737197] exe[865100] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f1ee842db38 ax:0 si:7f1ee842dc70 di:19 [28799737.504377] exe[866747] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f916b02bb38 ax:0 si:7f916b02bc70 di:19 [28799851.855421] exe[768545] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ec6b76d0b38 ax:0 si:7ec6b76d0c70 di:19 [28799874.325310] exe[880653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bd60f4c79 cs:33 sp:7f233da2f858 ax:0 si:557bd615f31a di:ffffffffff600000 [28800069.205879] exe[890239] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fe9ff346b38 ax:0 si:7fe9ff346c70 di:19 [28800096.083146] exe[890243] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fe9ff367b38 ax:0 si:7fe9ff367c70 di:19 [28800100.637577] exe[883167] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fe9ff367b38 ax:0 si:7fe9ff367c70 di:19 [28800108.417007] exe[881267] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fe9ff346b38 ax:0 si:7fe9ff346c70 di:19 [28800178.581950] exe[866050] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f7bddc58b38 ax:0 si:7f7bddc58c70 di:19 [28800356.565909] exe[865889] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f696bffeb38 ax:0 si:7f696bffec70 di:19 [28800456.326889] exe[674600] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f0822f82b38 ax:0 si:7f0822f82c70 di:19 [28800807.302702] exe[905581] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fc48baebb38 ax:0 si:7fc48baebc70 di:19 [28800814.918696] exe[910631] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fc97888fb38 ax:0 si:7fc97888fc70 di:19 [28800905.646039] exe[909360] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ff8d23c9b38 ax:0 si:7ff8d23c9c70 di:19 [28800938.645113] exe[916301] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f9729940b38 ax:0 si:7f9729940c70 di:19 [28801139.164000] potentially unexpected fatal signal 5. [28801139.169246] CPU: 0 PID: 908020 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28801139.181152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28801139.190755] RIP: 0033:0x7fffffffe062 [28801139.194728] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28801139.213950] RSP: 002b:000000c00066bb90 EFLAGS: 00000297 [28801139.221016] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28801139.229933] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28801139.238845] RBP: 000000c00066bc28 R08: 0000000000000000 R09: 0000000000000000 [28801139.247774] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00066bc18 [28801139.256709] R13: 000000c00065cf90 R14: 000000c000510a80 R15: 00000000000dd9ca [28801139.265647] FS: 0000000002055bb0 GS: 0000000000000000 [28801212.238497] exe[913102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a27c5543f7 cs:33 sp:7fa1823d2ef8 ax:4bc00000 si:55a27c5d34bc di:ffffffffff600000 [28801366.584217] exe[928024] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5618704ddc79 cs:33 sp:7ec201296858 ax:0 si:56187054831a di:ffffffffff600000 [28801469.046648] exe[925842] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ff7add27b38 ax:0 si:7ff7add27c70 di:19 [28801523.153547] exe[679123] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f23f4ff0b38 ax:0 si:7f23f4ff0c70 di:19 [28801666.565067] exe[928977] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f5541b4cb38 ax:0 si:7f5541b4cc70 di:19 [28801675.837828] exe[931473] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f5541b4cb38 ax:0 si:7f5541b4cc70 di:19 [28802020.746874] exe[940685] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f19e190ab38 ax:0 si:7f19e190ac70 di:19 [28802123.681562] exe[674316] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f49bf3a6b38 ax:0 si:7f49bf3a6c70 di:19 [28802157.365880] exe[937348] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eb9b5248b38 ax:0 si:7eb9b5248c70 di:19 [28803031.795822] exe[94594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56479a5bac79 cs:33 sp:7f14aeffe858 ax:0 si:56479a62531a di:ffffffffff600000 [28803032.311366] exe[87705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556023f90c79 cs:33 sp:7f878a34c858 ax:0 si:556023ffb31a di:ffffffffff600000 [28803032.834210] exe[93668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615064c0c79 cs:33 sp:7ff272747858 ax:0 si:56150652b31a di:ffffffffff600000 [28803033.942851] exe[87939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615064c0c79 cs:33 sp:7ff272747858 ax:0 si:56150652b31a di:ffffffffff600000 [28803034.516611] exe[94503] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559462f7ec79 cs:33 sp:7fbbfde9f858 ax:0 si:559462fe931a di:ffffffffff600000 [28803084.755529] exe[55608] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ff2ac63eb38 ax:0 si:7ff2ac63ec70 di:19 [28803085.942296] exe[47031] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ff2ac63eb38 ax:0 si:7ff2ac63ec70 di:19 [28803087.112757] exe[45438] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ff2ac63eb38 ax:0 si:7ff2ac63ec70 di:19 [28803087.961915] exe[45472] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ff2ac63eb38 ax:0 si:7ff2ac63ec70 di:19 [28803088.742751] exe[57811] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fe1c8f5cb38 ax:0 si:7fe1c8f5cc70 di:19 [28803810.952450] exe[83559] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6295084b38 ax:0 si:7f6295084c70 di:19 [28803811.676031] exe[84057] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6295084b38 ax:0 si:7f6295084c70 di:19 [28803812.576680] exe[99142] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6295084b38 ax:0 si:7f6295084c70 di:19 [28803813.490008] exe[83376] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6295084b38 ax:0 si:7f6295084c70 di:19 [28803814.232241] exe[99142] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6295084b38 ax:0 si:7f6295084c70 di:19 [28803982.399892] exe[37001] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eede067fb38 ax:0 si:7eede067fc70 di:19 [28803982.541881] exe[101588] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eede067fb38 ax:0 si:7eede067fc70 di:19 [28803982.681097] exe[101588] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eede067fb38 ax:0 si:7eede067fc70 di:19 [28803982.827976] exe[100249] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eede067fb38 ax:0 si:7eede067fc70 di:19 [28803982.940811] exe[37001] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eede067fb38 ax:0 si:7eede067fc70 di:19 [28804262.912861] exe[100680] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f1430cd1b38 ax:0 si:7f1430cd1c70 di:19 [28804288.287442] exe[101868] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fb4c558db38 ax:0 si:7fb4c558dc70 di:19 [28804288.366433] exe[101868] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fb4c558db38 ax:0 si:7fb4c558dc70 di:19 [28804288.525977] exe[101890] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fb4c558db38 ax:0 si:7fb4c558dc70 di:19 [28804636.441686] exe[79202] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7faa79dc2b38 ax:0 si:7faa79dc2c70 di:19 [28804637.222694] exe[103711] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fb418e31b38 ax:0 si:7fb418e31c70 di:19 [28804638.472260] exe[103711] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fb418e31b38 ax:0 si:7fb418e31c70 di:19 [28804639.340302] exe[103697] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fb418e31b38 ax:0 si:7fb418e31c70 di:19 [28804640.954247] exe[102817] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fb418e31b38 ax:0 si:7fb418e31c70 di:19 [28805484.825603] exe[102806] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f7f307c6b38 ax:0 si:7f7f307c6c70 di:19 [28805485.760132] exe[100605] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f7f307c6b38 ax:0 si:7f7f307c6c70 di:19 [28805485.900593] exe[100605] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f7f307c6b38 ax:0 si:7f7f307c6c70 di:19 [28805486.031944] exe[100142] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f7f307c6b38 ax:0 si:7f7f307c6c70 di:19 [28805486.174386] exe[102806] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f7f307c6b38 ax:0 si:7f7f307c6c70 di:19 [28805488.438657] exe[103622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560165602c79 cs:33 sp:7fbd3d1d5858 ax:0 si:56016566d328 di:ffffffffff600000 [28805489.111745] exe[96174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e38985c79 cs:33 sp:7f7f021fa858 ax:0 si:556e389f0328 di:ffffffffff600000 [28805489.587002] exe[96799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560165602c79 cs:33 sp:7fbd3d1d5858 ax:0 si:56016566d328 di:ffffffffff600000 [28805490.092366] exe[100189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b08f54c79 cs:33 sp:7f6cfe2d4858 ax:0 si:559b08fbf328 di:ffffffffff600000 [28805490.336806] exe[103632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b08f54c79 cs:33 sp:7f6cfe2d4858 ax:0 si:559b08fbf328 di:ffffffffff600000 [28805584.524217] exe[95202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c71148fc79 cs:33 sp:7fa9a75a8858 ax:0 si:55c7114fa31a di:ffffffffff600000 [28805585.457209] exe[96479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0dc6fec79 cs:33 sp:7f011782e858 ax:0 si:55d0dc76931a di:ffffffffff600000 [28805586.163668] exe[96963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c71148fc79 cs:33 sp:7fa9a75a8858 ax:0 si:55c7114fa31a di:ffffffffff600000 [28805587.059744] exe[97315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c71148fc79 cs:33 sp:7fa9a75a8858 ax:0 si:55c7114fa31a di:ffffffffff600000 [28805587.962577] exe[98084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e03e4c2c79 cs:33 sp:7f60246ec858 ax:0 si:55e03e52d31a di:ffffffffff600000 [28805715.674022] exe[72272] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f850b147b38 ax:0 si:7f850b147c70 di:19 [28805715.766576] exe[71220] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f850b147b38 ax:0 si:7f850b147c70 di:19 [28805716.743785] exe[69865] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f850b147b38 ax:0 si:7f850b147c70 di:19 [28805717.694148] exe[72231] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f850b147b38 ax:0 si:7f850b147c70 di:19 [28805718.651911] exe[71437] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f850b147b38 ax:0 si:7f850b147c70 di:19 [28805726.020668] exe[59882] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f432ccadb38 ax:0 si:7f432ccadc70 di:19 [28805751.249557] exe[46739] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fb836e84b38 ax:0 si:7fb836e84c70 di:19 [28805776.510692] exe[55535] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6b6002db38 ax:0 si:7f6b6002dc70 di:19 [28805776.608688] exe[22548] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f3cfe676b38 ax:0 si:7f3cfe676c70 di:19 [28805776.742103] exe[65542] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6b6002db38 ax:0 si:7f6b6002dc70 di:19 [28806422.061492] exe[53012] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ebd84fdcb38 ax:0 si:7ebd84fdcc70 di:19 [28806423.171611] exe[53012] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ebd84fdcb38 ax:0 si:7ebd84fdcc70 di:19 [28806424.258617] exe[52179] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ebfe6c76b38 ax:0 si:7ebfe6c76c70 di:19 [28806425.194984] exe[19590] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ebfe6c76b38 ax:0 si:7ebfe6c76c70 di:19 [28806426.131914] exe[19590] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ebfe6c76b38 ax:0 si:7ebfe6c76c70 di:19 [28806722.548533] exe[108539] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6b987dfb38 ax:0 si:7f6b987dfc70 di:19 [28808063.748411] exe[132630] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ee1bca52b38 ax:0 si:7ee1bca52c70 di:19 [28808148.480575] exe[127344] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f710b85fb38 ax:0 si:7f710b85fc70 di:19 [28808326.901850] exe[132333] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fddd6dccb38 ax:0 si:7fddd6dccc70 di:19 [28808470.497876] exe[141245] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f3ea5bfdb38 ax:0 si:7f3ea5bfdc70 di:19 [28808470.512781] exe[141165] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f3ea5bfdb38 ax:0 si:7f3ea5bfdc70 di:19 [28808470.525570] exe[141165] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f3ea5bfdb38 ax:0 si:7f3ea5bfdc70 di:19 [28808470.539168] exe[141165] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f3ea5bfdb38 ax:0 si:7f3ea5bfdc70 di:19 [28808470.553003] exe[141165] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f3ea5bfdb38 ax:0 si:7f3ea5bfdc70 di:19 [28808470.566283] exe[141165] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f3ea5bfdb38 ax:0 si:7f3ea5bfdc70 di:19 [28808470.580564] exe[141165] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f3ea5bfdb38 ax:0 si:7f3ea5bfdc70 di:19 [28808470.593923] exe[141165] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f3ea5bfdb38 ax:0 si:7f3ea5bfdc70 di:19 [28808470.607201] exe[141165] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f3ea5bfdb38 ax:0 si:7f3ea5bfdc70 di:19 [28808470.620571] exe[141165] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f3ea5bfdb38 ax:0 si:7f3ea5bfdc70 di:19 [28808660.169386] warn_bad_vsyscall: 23 callbacks suppressed [28808660.169390] exe[132629] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eebdb568b38 ax:0 si:7eebdb568c70 di:19 [28808794.398405] exe[107439] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f2388c48b38 ax:0 si:7f2388c48c70 di:19 [28808810.385713] exe[127331] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f2153567b38 ax:0 si:7f2153567c70 di:19 [28808844.833906] exe[117667] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f71983bfb38 ax:0 si:7f71983bfc70 di:19 [28809238.338457] exe[108323] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6cebffeb38 ax:0 si:7f6cebffec70 di:19 [28809301.157372] exe[135491] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f13acb2fb38 ax:0 si:7f13acb2fc70 di:19 [28809652.729972] exe[111330] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ea98c3feb38 ax:0 si:7ea98c3fec70 di:19 [28809661.244784] exe[149295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562934d2ac79 cs:33 sp:7f1c62390ef8 ax:0 si:200000c0 di:ffffffffff600000 [28809663.343381] exe[149544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a424990c79 cs:33 sp:7f8fa98afef8 ax:0 si:200000c0 di:ffffffffff600000 [28809900.007456] exe[151612] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f4e1cd66b38 ax:0 si:7f4e1cd66c70 di:19 [28810426.825085] exe[153455] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fa732376b38 ax:0 si:7fa732376c70 di:19 [28810643.406615] exe[154585] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f89a6f46b38 ax:0 si:7f89a6f46c70 di:19 [28810915.001079] exe[162084] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6a455ccb38 ax:0 si:7f6a455ccc70 di:19 [28810915.129577] exe[162117] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6a455abb38 ax:0 si:7f6a455abc70 di:19 [28811167.228208] potentially unexpected fatal signal 5. [28811167.233458] CPU: 93 PID: 177177 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28811167.245528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28811167.255165] RIP: 0033:0x7fffffffe062 [28811167.259197] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28811167.279758] RSP: 002b:000000c0005d5b90 EFLAGS: 00000297 [28811167.286773] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28811167.295681] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28811167.304608] RBP: 000000c0005d5c28 R08: 0000000000000000 R09: 0000000000000000 [28811167.313551] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005d5c18 [28811167.322464] R13: 000000c0003d2390 R14: 000000c000524fc0 R15: 000000000002718d [28811167.331507] FS: 000000c000512098 GS: 0000000000000000 [28811365.726871] exe[75946] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fe242072b38 ax:0 si:7fe242072c70 di:19 [28811619.106576] exe[148407] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fb70f118b38 ax:0 si:7fb70f118c70 di:19 [28811673.539315] exe[183453] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fef02bcdb38 ax:0 si:7fef02bcdc70 di:19 [28811845.258094] exe[181816] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f77595feb38 ax:0 si:7f77595fec70 di:19 [28811873.891706] exe[176376] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c275efec79 cs:33 sp:7f893d8aaef8 ax:0 si:200001c0 di:ffffffffff600000 [28812096.669347] exe[187489] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f70d2a54b38 ax:0 si:7f70d2a54c70 di:19 [28812293.509407] exe[187408] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f2fa6ca3b38 ax:0 si:7f2fa6ca3c70 di:19 [28812397.065186] exe[176376] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fc06103bb38 ax:0 si:7fc06103bc70 di:19 [28813106.196315] exe[174536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cfe331c79 cs:33 sp:7fcf371b5858 ax:0 si:557cfe39c31a di:ffffffffff600000 [28813106.948154] exe[168685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e020de5c79 cs:33 sp:7fb0a4703858 ax:0 si:55e020e5031a di:ffffffffff600000 [28813107.467156] exe[174529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cbdc4c1c79 cs:33 sp:7f766af51858 ax:0 si:55cbdc52c31a di:ffffffffff600000 [28813108.325540] exe[175021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cbdc4c1c79 cs:33 sp:7f766af51858 ax:0 si:55cbdc52c31a di:ffffffffff600000 [28813108.808576] exe[176236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e020de5c79 cs:33 sp:7fb0a4703858 ax:0 si:55e020e5031a di:ffffffffff600000 [28813707.470709] exe[215279] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f109e704b38 ax:0 si:7f109e704c70 di:19 [28814025.947830] exe[203570] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f7840866b38 ax:0 si:7f7840866c70 di:19 [28814046.429208] exe[221689] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f3669d15b38 ax:0 si:7f3669d15c70 di:19 [28814112.901069] exe[231511] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f276686cb38 ax:0 si:7f276686cc70 di:19 [28814357.011560] exe[213484] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fe4937a2b38 ax:0 si:7fe4937a2c70 di:19 [28814469.530191] exe[239649] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fed91f13b38 ax:0 si:7fed91f13c70 di:19 [28814527.505261] exe[231354] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f733d5a8b38 ax:0 si:7f733d5a8c70 di:19 [28814527.714536] exe[218712] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f733d587b38 ax:0 si:7f733d587c70 di:19 [28814527.715172] exe[217024] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f733d5a8b38 ax:0 si:7f733d5a8c70 di:19 [28814528.055146] exe[207195] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f733d5a8b38 ax:0 si:7f733d5a8c70 di:19 [28814537.607942] exe[242992] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f19edbf2b38 ax:0 si:7f19edbf2c70 di:19 [28814564.398359] exe[205088] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f5f707ddb38 ax:0 si:7f5f707ddc70 di:19 [28814608.474636] exe[202477] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ecaedd0db38 ax:0 si:7ecaedd0dc70 di:19 [28814706.245643] exe[202571] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eeae5d6eb38 ax:0 si:7eeae5d6ec70 di:19 [28814731.974178] exe[251071] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fae30913b38 ax:0 si:7fae30913c70 di:19 [28814903.378275] exe[249411] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f1b65b61b38 ax:0 si:7f1b65b61c70 di:19 [28814939.832969] exe[249442] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd3a04e0b38 ax:0 si:7fd3a04e0c70 di:19 [28814939.879990] exe[249442] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd3a04e0b38 ax:0 si:7fd3a04e0c70 di:19 [28815004.892242] exe[258768] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fdab74dfb38 ax:0 si:7fdab74dfc70 di:19 [28815041.041570] exe[222072] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7faefe02ab38 ax:0 si:7faefe02ac70 di:19 [28815112.255015] exe[243717] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f0fb6b51b38 ax:0 si:7f0fb6b51c70 di:19 [28815153.068088] exe[188911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e6e79bc79 cs:33 sp:7ede0ff5fef8 ax:0 si:2000a340 di:ffffffffff600000 [28815455.455931] exe[253090] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ff78d57bb38 ax:0 si:7ff78d57bc70 di:19 [28815741.854392] exe[251687] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f1d03b71b38 ax:0 si:7f1d03b71c70 di:19 [28815760.919914] exe[238867] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ec5dcd76b38 ax:0 si:7ec5dcd76c70 di:19 [28816086.539153] exe[268758] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f185c25db38 ax:0 si:7f185c25dc70 di:19 [28816214.561639] exe[268752] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f463a8c3b38 ax:0 si:7f463a8c3c70 di:19 [28816487.095132] exe[279086] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f31a84c6b38 ax:0 si:7f31a84c6c70 di:19 [28816509.764042] exe[284814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55968fd4cc79 cs:33 sp:7ee8d9638858 ax:0 si:55968fdb734f di:ffffffffff600000 [28816509.783753] exe[284821] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55968fd4cc79 cs:33 sp:7ee8d9638858 ax:0 si:55968fdb734f di:ffffffffff600000 [28816509.803934] exe[284818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55968fd4cc79 cs:33 sp:7ee8d9638858 ax:0 si:55968fdb734f di:ffffffffff600000 [28816509.824139] exe[284878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55968fd4cc79 cs:33 sp:7ee8d9638858 ax:0 si:55968fdb734f di:ffffffffff600000 [28816509.843561] exe[284879] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55968fd4cc79 cs:33 sp:7ee8d9638858 ax:0 si:55968fdb734f di:ffffffffff600000 [28816509.862916] exe[284818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55968fd4cc79 cs:33 sp:7ee8d9638858 ax:0 si:55968fdb734f di:ffffffffff600000 [28816509.882603] exe[284814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55968fd4cc79 cs:33 sp:7ee8d9638858 ax:0 si:55968fdb734f di:ffffffffff600000 [28816509.902918] exe[284879] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55968fd4cc79 cs:33 sp:7ee8d9638858 ax:0 si:55968fdb734f di:ffffffffff600000 [28816509.923102] exe[284808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55968fd4cc79 cs:33 sp:7ee8d9638858 ax:0 si:55968fdb734f di:ffffffffff600000 [28816509.945373] exe[284878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55968fd4cc79 cs:33 sp:7ee8d9638858 ax:0 si:55968fdb734f di:ffffffffff600000 [28816612.611874] warn_bad_vsyscall: 55 callbacks suppressed [28816612.611877] exe[207529] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ecb047feb38 ax:0 si:7ecb047fec70 di:19 [28816969.941019] exe[290939] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f2496241b38 ax:0 si:7f2496241c70 di:19 [28817082.588592] exe[291925] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6f2a2ddb38 ax:0 si:7f6f2a2ddc70 di:19 [28817264.136632] exe[291274] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fa516bf9b38 ax:0 si:7fa516bf9c70 di:19 [28817411.798600] exe[225202] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eec496d0b38 ax:0 si:7eec496d0c70 di:19 [28817452.004468] exe[308974] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f2dc852cb38 ax:0 si:7f2dc852cc70 di:19 [28817477.560212] exe[205357] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eb48c781b38 ax:0 si:7eb48c781c70 di:19 [28817477.560347] exe[204689] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eb48c7a2b38 ax:0 si:7eb48c7a2c70 di:19 [28817579.122903] exe[297273] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7faf61a5fb38 ax:0 si:7faf61a5fc70 di:19 [28817580.555322] exe[316057] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fcae5dc2b38 ax:0 si:7fcae5dc2c70 di:19 [28817603.096817] exe[291243] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7faf61a5fb38 ax:0 si:7faf61a5fc70 di:19 [28817641.345024] exe[316885] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f7f60d95b38 ax:0 si:7f7f60d95c70 di:19 [28817641.421367] exe[317578] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f7f60d95b38 ax:0 si:7f7f60d95c70 di:19 [28817715.572991] exe[319701] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd36670cb38 ax:0 si:7fd36670cc70 di:19 [28817763.977796] exe[303775] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6990db9b38 ax:0 si:7f6990db9c70 di:19 [28817935.411677] exe[312563] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fefd4f45b38 ax:0 si:7fefd4f45c70 di:19 [28818291.576916] exe[330303] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f0886b1bb38 ax:0 si:7f0886b1bc70 di:19 [28818336.202965] exe[280697] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f8a9e22bb38 ax:0 si:7f8a9e22bc70 di:19 [28818415.595923] potentially unexpected fatal signal 5. [28818415.601146] CPU: 31 PID: 318173 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28818415.613130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28818415.622765] RIP: 0033:0x7fffffffe062 [28818415.626778] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28818415.647343] RSP: 002b:000000c000549b90 EFLAGS: 00000297 [28818415.654379] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28818415.663298] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28818415.672243] RBP: 000000c000549c28 R08: 0000000000000000 R09: 0000000000000000 [28818415.681145] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000549c18 [28818415.690064] R13: 000000c000552c00 R14: 000000c0004a36c0 R15: 000000000004b417 [28818415.698993] FS: 000000c00013b898 GS: 0000000000000000 [28818799.668098] exe[332000] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f5d3e5eab38 ax:0 si:7f5d3e5eac70 di:19 [28818856.864216] exe[338575] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ff5888c1b38 ax:0 si:7ff5888c1c70 di:19 [28818917.575350] exe[333507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56256b2bdc79 cs:33 sp:7f62ff1d4858 ax:0 si:56256b32831a di:ffffffffff600000 [28819013.363110] exe[344168] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fab936c0b38 ax:0 si:7fab936c0c70 di:19 [28819013.363845] exe[344158] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fab936e1b38 ax:0 si:7fab936e1c70 di:19 [28819079.100488] exe[223994] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fede0e8bb38 ax:0 si:7fede0e8bc70 di:19 [28819225.849578] exe[343877] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f2f66cc8b38 ax:0 si:7f2f66cc8c70 di:19 [28819274.255459] exe[334644] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ffae39eeb38 ax:0 si:7ffae39eec70 di:19 [28819307.203901] exe[345945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed62781c79 cs:33 sp:7f09c6b3aef8 ax:0 si:200007c0 di:ffffffffff600000 [28819346.137827] exe[338011] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ea837ac6b38 ax:0 si:7ea837ac6c70 di:19 [28819688.885961] exe[326350] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6d43036b38 ax:0 si:7f6d43036c70 di:19 [28819688.914329] exe[239553] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6d42bfeb38 ax:0 si:7f6d42bfec70 di:19 [28819757.886107] exe[322755] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f76bd2f1b38 ax:0 si:7f76bd2f1c70 di:19 [28820074.189579] exe[372359] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f7523b3ab38 ax:0 si:7f7523b3ac70 di:19 [28820280.682185] exe[368711] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fbc88510b38 ax:0 si:7fbc88510c70 di:19 [28820280.847616] exe[368718] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fbc88510b38 ax:0 si:7fbc88510c70 di:19 [28820333.283277] exe[350644] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fbc88510b38 ax:0 si:7fbc88510c70 di:19 [28820334.267882] exe[350644] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fbc88510b38 ax:0 si:7fbc88510c70 di:19 [28820405.708185] exe[365324] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fbc88510b38 ax:0 si:7fbc88510c70 di:19 [28820417.720613] exe[354445] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fbc88510b38 ax:0 si:7fbc88510c70 di:19 [28820510.273244] exe[305703] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7edffdcf2b38 ax:0 si:7edffdcf2c70 di:19 [28820728.375463] exe[377421] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f5fbeb4cb38 ax:0 si:7f5fbeb4cc70 di:19 [28820773.051078] exe[383661] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f5fbeb2bb38 ax:0 si:7f5fbeb2bc70 di:19 [28820780.063457] exe[377729] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f5fbeb2bb38 ax:0 si:7f5fbeb2bc70 di:19 [28820868.753987] exe[382261] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f3c3e356b38 ax:0 si:7f3c3e356c70 di:19 [28820896.933932] exe[383051] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f3c3e377b38 ax:0 si:7f3c3e377c70 di:19 [28821353.868453] exe[381080] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f0b4d291b38 ax:0 si:7f0b4d291c70 di:19 [28821566.570215] exe[220839] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6ebaedcb38 ax:0 si:7f6ebaedcc70 di:19 [28821652.570799] exe[409435] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ff7f94fdb38 ax:0 si:7ff7f94fdc70 di:19 [28821700.090748] exe[410780] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fbbca9fcb38 ax:0 si:7fbbca9fcc70 di:19 [28821824.236056] exe[224894] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f465512db38 ax:0 si:7f465512dc70 di:19 [28821878.381481] exe[416658] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f3bc6ae2b38 ax:0 si:7f3bc6ae2c70 di:19 [28821910.741174] exe[410674] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f0d1aebbb38 ax:0 si:7f0d1aebbc70 di:19 [28822149.008251] exe[232017] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd211cb1b38 ax:0 si:7fd211cb1c70 di:19 [28822253.324519] exe[426135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e57fe61c79 cs:33 sp:7f2b881fd858 ax:0 si:55e57fecc31a di:ffffffffff600000 [28822293.364347] exe[227837] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f97915eab38 ax:0 si:7f97915eac70 di:19 [28822344.271101] exe[258812] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f580f70eb38 ax:0 si:7f580f70ec70 di:19 [28822451.245835] exe[415871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c59f8e5c79 cs:33 sp:7f475ec7a858 ax:0 si:55c59f950328 di:ffffffffff600000 [28822636.711635] exe[244460] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f11cd2eab38 ax:0 si:7f11cd2eac70 di:19 [28823216.317450] exe[411751] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eb5f018cb38 ax:0 si:7eb5f018cc70 di:19 [28823354.710286] exe[464765] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd3c5f09b38 ax:0 si:7fd3c5f09c70 di:19 [28823367.503058] exe[331336] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f5694b51b38 ax:0 si:7f5694b51c70 di:19 [28823424.980555] exe[465139] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f52df9e2b38 ax:0 si:7f52df9e2c70 di:19 [28823485.500534] exe[437051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f88c423f7 cs:33 sp:7ff4fcb21ef8 ax:4bc00000 si:560f88cc14bc di:ffffffffff600000 [28823581.461371] exe[475365] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f08a6862b38 ax:0 si:7f08a6862c70 di:19 [28824048.962813] exe[435462] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f443165ab38 ax:0 si:7f443165ac70 di:19 [28825218.973282] exe[512217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c991757c79 cs:33 sp:7fc2e1d03858 ax:0 si:55c9917c231a di:ffffffffff600000 [28825277.670921] potentially unexpected fatal signal 5. [28825277.676118] CPU: 9 PID: 550991 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28825277.688012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28825277.697663] RIP: 0033:0x7fffffffe062 [28825277.701676] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28825277.722237] RSP: 002b:000000c0005d1be8 EFLAGS: 00000297 [28825277.729230] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28825277.738163] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28825277.747063] RBP: 000000c0005d1c80 R08: 0000000000000000 R09: 0000000000000000 [28825277.755994] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005d1c70 [28825277.764888] R13: 000000c000263000 R14: 000000c0004d1340 R15: 0000000000086558 [28825277.773808] FS: 000000c000180098 GS: 0000000000000000 [28825320.883591] exe[511923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a8f807c79 cs:33 sp:7f20efdfe858 ax:0 si:558a8f87231a di:ffffffffff600000 [28825320.902309] exe[511923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a8f807c79 cs:33 sp:7f20efdfe858 ax:0 si:558a8f87231a di:ffffffffff600000 [28825320.923840] exe[511923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a8f807c79 cs:33 sp:7f20efdfe858 ax:0 si:558a8f87231a di:ffffffffff600000 [28825320.943971] exe[511923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a8f807c79 cs:33 sp:7f20efdfe858 ax:0 si:558a8f87231a di:ffffffffff600000 [28825320.963554] exe[511923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a8f807c79 cs:33 sp:7f20efdfe858 ax:0 si:558a8f87231a di:ffffffffff600000 [28825320.984230] exe[511923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a8f807c79 cs:33 sp:7f20efdfe858 ax:0 si:558a8f87231a di:ffffffffff600000 [28825321.004586] exe[511923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a8f807c79 cs:33 sp:7f20efdfe858 ax:0 si:558a8f87231a di:ffffffffff600000 [28825321.024359] exe[511923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a8f807c79 cs:33 sp:7f20efdfe858 ax:0 si:558a8f87231a di:ffffffffff600000 [28825321.044895] exe[511923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a8f807c79 cs:33 sp:7f20efdfe858 ax:0 si:558a8f87231a di:ffffffffff600000 [28825321.064117] exe[511923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a8f807c79 cs:33 sp:7f20efdfe858 ax:0 si:558a8f87231a di:ffffffffff600000 [28825397.102654] warn_bad_vsyscall: 23 callbacks suppressed [28825397.102657] exe[559149] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56229380ac79 cs:33 sp:7f1036d01858 ax:0 si:56229387531a di:ffffffffff600000 [28825545.213671] exe[524845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3425e8c79 cs:33 sp:7fb7a99dd858 ax:0 si:55c34265331a di:ffffffffff600000 [28825545.454855] exe[523829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3425e8c79 cs:33 sp:7fb7a99dd858 ax:0 si:55c34265331a di:ffffffffff600000 [28825545.483940] exe[566697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3425e8c79 cs:33 sp:7fb7a99dd858 ax:0 si:55c34265331a di:ffffffffff600000 [28825545.527537] exe[567445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3425e8c79 cs:33 sp:7fb7a99dd858 ax:0 si:55c34265331a di:ffffffffff600000 [28825545.575821] exe[567445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3425e8c79 cs:33 sp:7fb7a99dd858 ax:0 si:55c34265331a di:ffffffffff600000 [28825545.611860] exe[567445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3425e8c79 cs:33 sp:7fb7a99dd858 ax:0 si:55c34265331a di:ffffffffff600000 [28825545.645188] exe[523816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3425e8c79 cs:33 sp:7fb7a99dd858 ax:0 si:55c34265331a di:ffffffffff600000 [28825545.678842] exe[523829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3425e8c79 cs:33 sp:7fb7a99dd858 ax:0 si:55c34265331a di:ffffffffff600000 [28825545.714864] exe[566697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3425e8c79 cs:33 sp:7fb7a99dd858 ax:0 si:55c34265331a di:ffffffffff600000 [28825545.744596] exe[567531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3425e8c79 cs:33 sp:7fb7a99dd858 ax:0 si:55c34265331a di:ffffffffff600000 [28825901.573789] warn_bad_vsyscall: 10 callbacks suppressed [28825901.573793] exe[557188] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fca215d3b38 ax:0 si:7fca215d3c70 di:19 [28826230.659284] exe[546495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564a6b7e3f7 cs:33 sp:7f7db2a84ef8 ax:4bc00000 si:5564a6bfd4bc di:ffffffffff600000 [28826429.914413] exe[571492] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5556f86543f7 cs:33 sp:7fc63604eef8 ax:4bc00000 si:5556f86d34bc di:ffffffffff600000 [28826617.812546] exe[601510] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fc64aab6b38 ax:0 si:7fc64aab6c70 di:19 [28827033.792563] exe[591911] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f45497feb38 ax:0 si:7f45497fec70 di:19 [28827073.273705] exe[592527] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f977743eb38 ax:0 si:7f977743ec70 di:19 [28827201.010160] exe[577861] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6467628b38 ax:0 si:7f6467628c70 di:19 [28827779.483590] exe[555550] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ecf12abfb38 ax:0 si:7ecf12abfc70 di:19 [28828149.377607] exe[652270] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f973e794b38 ax:0 si:7f973e794c70 di:19 [28828189.253372] exe[604746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad17da83f7 cs:33 sp:7f72aeb66ef8 ax:4bc00000 si:55ad17e274bc di:ffffffffff600000 [28828255.721659] exe[651766] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7feb7fdfeb38 ax:0 si:7feb7fdfec70 di:19 [28828506.587918] exe[602093] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ff9a295ab38 ax:0 si:7ff9a295ac70 di:19 [28828580.052960] exe[679690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cde57ec79 cs:33 sp:7ee7c25c9858 ax:0 si:557cde5e931a di:ffffffffff600000 [28828650.521821] exe[679707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e32f96fc79 cs:33 sp:7ef8fda9e858 ax:0 si:55e32f9da31a di:ffffffffff600000 [28829141.690799] exe[689070] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f8da22b9b38 ax:0 si:7f8da22b9c70 di:19 [28829297.231495] exe[686143] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fb43fe42b38 ax:0 si:7fb43fe42c70 di:19 [28829417.484655] exe[684083] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eca6f315b38 ax:0 si:7eca6f315c70 di:19 [28829431.212772] exe[700213] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f5f81b9ab38 ax:0 si:7f5f81b9ac70 di:19 [28829481.423620] exe[684113] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7efa5fb86b38 ax:0 si:7efa5fb86c70 di:19 [28829524.930735] exe[684061] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ea00e0eeb38 ax:0 si:7ea00e0eec70 di:19 [28829704.546432] exe[684083] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ee9f145eb38 ax:0 si:7ee9f145ec70 di:19 [28829809.377385] exe[714673] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fb09e21fb38 ax:0 si:7fb09e21fc70 di:19 [28829964.112191] exe[722193] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fb1a9630b38 ax:0 si:7fb1a9630c70 di:19 [28829964.184812] exe[718706] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fb1a9630b38 ax:0 si:7fb1a9630c70 di:19 [28829998.143257] exe[726264] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7feadde84b38 ax:0 si:7feadde84c70 di:19 [28830440.574623] exe[688961] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f47fb0e4b38 ax:0 si:7f47fb0e4c70 di:19 [28830451.691567] exe[737273] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ff15877bb38 ax:0 si:7ff15877bc70 di:19 [28830477.551173] exe[717731] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f877f784b38 ax:0 si:7f877f784c70 di:19 [28830726.330173] exe[741629] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f35a5254b38 ax:0 si:7f35a5254c70 di:19 [28831036.918844] exe[741786] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eb3ec5feb38 ax:0 si:7eb3ec5fec70 di:19 [28831088.455303] exe[728329] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f7a70d04b38 ax:0 si:7f7a70d04c70 di:19 [28831293.929623] exe[762505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55990f2c4c79 cs:33 sp:7eb5ec9dd858 ax:0 si:55990f32f31a di:ffffffffff600000 [28831302.366863] exe[736884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef789333f7 cs:33 sp:7fef719d8ef8 ax:4bc00000 si:55ef789b24bc di:ffffffffff600000 [28831394.283331] exe[763940] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f35b5ffeb38 ax:0 si:7f35b5ffec70 di:19 [28832029.192979] exe[779793] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c77edc1c79 cs:33 sp:7fa898187858 ax:0 si:55c77ee2c31a di:ffffffffff600000 [28832600.745912] exe[810902] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6b24501b38 ax:0 si:7f6b24501c70 di:19 [28832710.646267] exe[762765] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eb2f6b09b38 ax:0 si:7eb2f6b09c70 di:19 [28832875.154939] exe[555506] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ea42f23fb38 ax:0 si:7ea42f23fc70 di:19 [28832982.441858] exe[820689] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f24461ddb38 ax:0 si:7f24461ddc70 di:19 [28832982.442046] exe[820686] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f24461bcb38 ax:0 si:7f24461bcc70 di:19 [28833331.600927] exe[795561] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ee827927b38 ax:0 si:7ee827927c70 di:19 [28833702.895265] exe[840548] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eb5cf710b38 ax:0 si:7eb5cf710c70 di:19 [28833813.254006] exe[824718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649f9f7cc79 cs:33 sp:7fcb7c624858 ax:0 si:5649f9fe731a di:ffffffffff600000 [28834284.642113] exe[870976] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f84020e5b38 ax:0 si:7f84020e5c70 di:19 [28834365.419843] exe[859475] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fc9c8777b38 ax:0 si:7fc9c8777c70 di:19 [28834380.647815] exe[855678] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fe0e88a1b38 ax:0 si:7fe0e88a1c70 di:19 [28834381.278533] exe[795479] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ee0495c0b38 ax:0 si:7ee0495c0c70 di:19 [28834418.454185] exe[844577] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eb46f589b38 ax:0 si:7eb46f589c70 di:19 [28834418.457183] exe[864169] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eb46f5aab38 ax:0 si:7eb46f5aac70 di:19 [28834551.789807] exe[879846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93d8dbc79 cs:33 sp:7f8e75a62858 ax:0 si:55f93d94631a di:ffffffffff600000 [28835116.507542] exe[878091] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ef958db1b38 ax:0 si:7ef958db1c70 di:19 [28835167.189664] potentially unexpected fatal signal 5. [28835167.194879] CPU: 59 PID: 861929 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28835167.206836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28835167.216437] RIP: 0033:0x7fffffffe062 [28835167.220412] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28835167.239581] RSP: 002b:000000c000019b90 EFLAGS: 00000297 [28835167.245219] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28835167.254147] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28835167.263064] RBP: 000000c000019c28 R08: 0000000000000000 R09: 0000000000000000 [28835167.271979] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000019c18 [28835167.280920] R13: 000000c00055a150 R14: 000000c000581180 R15: 00000000000d165e [28835167.289798] FS: 000000c000180098 GS: 0000000000000000 [28835173.728150] potentially unexpected fatal signal 5. [28835173.733379] CPU: 39 PID: 900595 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28835173.745358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28835173.754979] RIP: 0033:0x7fffffffe062 [28835173.759003] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28835173.778171] RSP: 002b:000000c000677b90 EFLAGS: 00000297 [28835173.783787] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28835173.792747] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28835173.801679] RBP: 000000c000677c28 R08: 0000000000000000 R09: 0000000000000000 [28835173.810623] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000677c18 [28835173.819515] R13: 000000c00060ab40 R14: 000000c00050a700 R15: 00000000000dbd00 [28835173.828445] FS: 000000c000508098 GS: 0000000000000000 [28835283.040396] exe[815009] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f8382bacb38 ax:0 si:7f8382bacc70 di:19 [28835497.949260] exe[917940] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f7adfe3cb38 ax:0 si:7f7adfe3cc70 di:19 [28835729.366108] exe[925123] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ee8e2719b38 ax:0 si:7ee8e2719c70 di:19 [28836038.342720] exe[925117] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ede9f425b38 ax:0 si:7ede9f425c70 di:19 [28836137.271246] exe[925657] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f037e523b38 ax:0 si:7f037e523c70 di:19 [28836730.603022] exe[949734] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f59ed3feb38 ax:0 si:7f59ed3fec70 di:19 [28836910.839136] exe[953035] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ec440b9bb38 ax:0 si:7ec440b9bc70 di:19 [28837039.352822] exe[925103] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ecbcdda3b38 ax:0 si:7ecbcdda3c70 di:19 [28837195.597786] exe[956635] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd4fc748b38 ax:0 si:7fd4fc748c70 di:19 [28837338.413696] exe[973841] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f73d6ca5b38 ax:0 si:7f73d6ca5c70 di:19 [28837374.101966] exe[967286] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f76cea5cb38 ax:0 si:7f76cea5cc70 di:19 [28837403.541610] exe[978500] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f78892ebb38 ax:0 si:7f78892ebc70 di:19 [28838092.830017] exe[6603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568afd91c79 cs:33 sp:7eee35387858 ax:0 si:5568afdfc34f di:ffffffffff600000 [28838176.987592] exe[6594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e2c83ec79 cs:33 sp:7ebda5145858 ax:0 si:558e2c8a934f di:ffffffffff600000 [28838303.745321] exe[21374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a3a8adc79 cs:33 sp:7f352d550858 ax:0 si:556a3a91831a di:ffffffffff600000 [28838318.599740] exe[6581] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ee45e962b38 ax:0 si:7ee45e962c70 di:19 [28838490.827719] exe[9457] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f08dac88b38 ax:0 si:7f08dac88c70 di:19 [28838568.083025] exe[28383] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2f8032c79 cs:33 sp:7f7e2b754ef8 ax:0 si:20000040 di:ffffffffff600000 [28838681.229025] exe[34030] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ebd49f1cb38 ax:0 si:7ebd49f1cc70 di:19 [28838690.162008] exe[914415] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f4f6e87db38 ax:0 si:7f4f6e87dc70 di:19 [28838727.314301] exe[5465] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f0b3db34b38 ax:0 si:7f0b3db34c70 di:19 [28838767.279496] potentially unexpected fatal signal 5. [28838767.284720] CPU: 16 PID: 17416 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28838767.296608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28838767.306222] RIP: 0033:0x7fffffffe062 [28838767.310172] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28838767.329365] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [28838767.335030] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28838767.342647] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28838767.351566] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [28838767.360527] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000029c18 [28838767.369472] R13: 000000c000032c00 R14: 000000c000468e00 R15: 00000000000042c8 [28838767.378393] FS: 0000000002055bb0 GS: 0000000000000000 [28838879.624337] exe[44922] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fdb133fdb38 ax:0 si:7fdb133fdc70 di:19 [28838916.097417] exe[25727] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f60805dfb38 ax:0 si:7f60805dfc70 di:19 [28838929.045227] exe[40617] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ff60c086b38 ax:0 si:7ff60c086c70 di:19 [28838933.691754] exe[985846] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ea5da8e0b38 ax:0 si:7ea5da8e0c70 di:19 [28838934.186642] exe[966077] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ee1adbfeb38 ax:0 si:7ee1adbfec70 di:19 [28838934.940092] exe[36531] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f2d20e22b38 ax:0 si:7f2d20e22c70 di:19 [28838935.041380] exe[967318] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ebbdee4eb38 ax:0 si:7ebbdee4ec70 di:19 [28838944.753084] exe[10116] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f8115f2eb38 ax:0 si:7f8115f2ec70 di:19 [28838945.286137] exe[45927] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f8115f2eb38 ax:0 si:7f8115f2ec70 di:19 [28838945.696675] exe[32215] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f9eea934b38 ax:0 si:7f9eea934c70 di:19 [28838945.827844] exe[27193] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f8a312ccb38 ax:0 si:7f8a312ccc70 di:19 [28838979.301080] exe[44228] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ff1fda74b38 ax:0 si:7ff1fda74c70 di:19 [28838979.510572] exe[46773] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eba07f40b38 ax:0 si:7eba07f40c70 di:19 [28838990.461968] exe[41690] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f02b2d1db38 ax:0 si:7f02b2d1dc70 di:19 [28839003.166416] exe[939724] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f8a2cdf5b38 ax:0 si:7f8a2cdf5c70 di:19 [28839027.480249] exe[934815] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ed561c2bb38 ax:0 si:7ed561c2bc70 di:19 [28839225.374204] exe[965084] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fcb283ddb38 ax:0 si:7fcb283ddc70 di:19 [28839365.693604] exe[10813] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fa9e4770b38 ax:0 si:7fa9e4770c70 di:19 [28839948.347906] exe[78497] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fca6f8ffb38 ax:0 si:7fca6f8ffc70 di:19 [28840379.388779] exe[6587] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ed1ff5bbb38 ax:0 si:7ed1ff5bbc70 di:19 [28840578.825825] exe[62858] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ed84b44fb38 ax:0 si:7ed84b44fc70 di:19 [28840790.067651] exe[952394] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fa02f6d8b38 ax:0 si:7fa02f6d8c70 di:19 [28840921.642522] exe[114235] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f63f2cc79 cs:33 sp:7f1ff8051858 ax:0 si:561f63f9734f di:ffffffffff600000 [28841121.057319] exe[116340] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f80ab4cfb38 ax:0 si:7f80ab4cfc70 di:19 [28841185.016183] exe[124548] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f489eae1b38 ax:0 si:7f489eae1c70 di:19 [28841186.026911] exe[105373] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fca35872b38 ax:0 si:7fca35872c70 di:19 [28841663.282203] exe[143008] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f7705af7b38 ax:0 si:7f7705af7c70 di:19 [28841900.388056] exe[153550] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ff9ac45eb38 ax:0 si:7ff9ac45ec70 di:19 [28841913.019286] exe[142258] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ff9ac43db38 ax:0 si:7ff9ac43dc70 di:19 [28842267.591817] exe[152593] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ef1c8e56b38 ax:0 si:7ef1c8e56c70 di:19 [28842334.808556] exe[62877] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ecf60b50b38 ax:0 si:7ecf60b50c70 di:19 [28842412.595692] exe[159012] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f97b2f94b38 ax:0 si:7f97b2f94c70 di:19 [28843042.468451] exe[121456] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd9a9f5fb38 ax:0 si:7fd9a9f5fc70 di:19 [28843246.590347] exe[181453] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f88c14efb38 ax:0 si:7f88c14efc70 di:19 [28843246.590430] exe[190379] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f88c1510b38 ax:0 si:7f88c1510c70 di:19 [28843567.354227] potentially unexpected fatal signal 5. [28843567.359443] CPU: 95 PID: 188954 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28843567.371418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28843567.381027] RIP: 0033:0x7fffffffe062 [28843567.384982] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28843567.404186] RSP: 002b:000000c0005b3b90 EFLAGS: 00000297 [28843567.409861] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28843567.418763] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28843567.427674] RBP: 000000c0005b3c28 R08: 0000000000000000 R09: 0000000000000000 [28843567.435251] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005b3c18 [28843567.444129] R13: 000000c0005d6ab0 R14: 000000c0004e1180 R15: 000000000002dcbc [28843567.453068] FS: 000000c00013b898 GS: 0000000000000000 [28844122.289397] exe[212854] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56274d37b3f7 cs:33 sp:7fd6c9828ef8 ax:4bc00000 si:56274d3fa4bc di:ffffffffff600000 [28844129.990361] exe[233905] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f023543bb38 ax:0 si:7f023543bc70 di:19 [28844207.772357] exe[204666] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f2c07e61b38 ax:0 si:7f2c07e61c70 di:19 [28844877.642315] exe[181453] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f299b8cfb38 ax:0 si:7f299b8cfc70 di:19 [28845006.205985] exe[181453] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f2bf8fdeb38 ax:0 si:7f2bf8fdec70 di:19 [28848097.934468] exe[428289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e9bfbfbb9 cs:33 sp:7fc0c16c0858 ax:0 si:560e9c02a31a di:ffffffffff600000 [28851895.637984] exe[497525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f18cf3bb9 cs:33 sp:7fb6decdf858 ax:0 si:556f18d5e31a di:ffffffffff600000 [28855289.689742] exe[565696] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ea196dc8b38 ax:0 si:7ea196dc8c70 di:19 [28858499.524316] exe[714338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650b13d5bb9 cs:33 sp:7eb357abfef8 ax:0 si:20002540 di:ffffffffff600000 [28858899.129598] exe[730034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff4cdd5bb9 cs:33 sp:7f5d2236c858 ax:0 si:55ff4ce40328 di:ffffffffff600000 [28858899.517184] exe[734290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae16f49bb9 cs:33 sp:7f83ea29f858 ax:0 si:55ae16fb4328 di:ffffffffff600000 [28858899.844891] exe[725665] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae16f49bb9 cs:33 sp:7f83ea29f858 ax:0 si:55ae16fb4328 di:ffffffffff600000 [28858900.170147] exe[726951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff4cdd5bb9 cs:33 sp:7f5d2236c858 ax:0 si:55ff4ce40328 di:ffffffffff600000 [28858900.536706] exe[732325] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e20177cbb9 cs:33 sp:7f1e55b17858 ax:0 si:55e2017e7328 di:ffffffffff600000 [28859035.643952] exe[663387] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fc5c4afeb38 ax:0 si:7fc5c4afec70 di:19 [28859273.772150] exe[664349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5626ae45abb9 cs:33 sp:7f68720a7858 ax:0 si:5626ae4c531a di:ffffffffff600000 [28859439.395580] exe[652335] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eeb81d5db38 ax:0 si:7eeb81d5dc70 di:19 [28859513.647546] exe[673608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561855a31bb9 cs:33 sp:7fdb279ea858 ax:0 si:561855a9c31a di:ffffffffff600000 [28859813.423141] exe[692343] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7edacf301b38 ax:0 si:7edacf301c70 di:19 [28859947.475221] exe[652513] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ed8a0c49b38 ax:0 si:7ed8a0c49c70 di:19 [28860004.463342] exe[698724] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f65fe8bdb38 ax:0 si:7f65fe8bdc70 di:19 [28860023.657681] exe[676366] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5596341a7bb9 cs:33 sp:7fade67dd858 ax:0 si:55963421231a di:ffffffffff600000 [28860062.697887] exe[668649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565771acbb9 cs:33 sp:7f9ed913e858 ax:0 si:55657721731a di:ffffffffff600000 [28860179.098882] exe[733214] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f286b4dbb38 ax:0 si:7f286b4dbc70 di:19 [28860188.553972] exe[733214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55586bc25bb9 cs:33 sp:7fc1bbb2c858 ax:0 si:55586bc9031a di:ffffffffff600000 [28860213.015922] exe[662175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649f7603bb9 cs:33 sp:7f4f5f733858 ax:0 si:5649f766e31a di:ffffffffff600000 [28860295.903066] exe[664585] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f61d7dfeb38 ax:0 si:7f61d7dfec70 di:19 [28861329.194823] exe[808646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e41c88bbb9 cs:33 sp:7f99aae66858 ax:0 si:55e41c8f6328 di:ffffffffff600000 [28861475.409147] exe[797392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa18750bb9 cs:33 sp:7fa65a2bc858 ax:0 si:55aa187bb31a di:ffffffffff600000 [28861494.152296] exe[830486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fa228bdbb9 cs:33 sp:7fb42ef71858 ax:0 si:55fa2292831a di:ffffffffff600000 [28862685.157098] exe[868178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fbe630337 cs:33 sp:7fbae04afef8 ax:4bc00000 si:555fbe6af4bc di:ffffffffff600000 [28865075.381170] potentially unexpected fatal signal 5. [28865075.386381] CPU: 68 PID: 909931 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28865075.398342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28865075.408058] RIP: 0033:0x7fffffffe062 [28865075.412075] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28865075.432632] RSP: 002b:000000c000729b90 EFLAGS: 00000297 [28865075.439650] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28865075.448573] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28865075.457479] RBP: 000000c000729c28 R08: 0000000000000000 R09: 0000000000000000 [28865075.466377] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000729c18 [28865075.475275] R13: 000000c000732c00 R14: 000000c00048ea80 R15: 00000000000de0cb [28865075.484187] FS: 000000c00013b898 GS: 0000000000000000 [28865219.635853] exe[939822] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5590b9015bb9 cs:33 sp:7f8aaa6c2858 ax:0 si:5590b908034f di:ffffffffff600000 [28865250.195726] exe[960000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0169087c1 cs:33 sp:7fbb783bc578 ax:8 si:1 di:7fbb783bc670 [28867707.762732] exe[48168] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4fa83bbb9 cs:33 sp:7f6868deb858 ax:0 si:55b4fa8a631a di:ffffffffff600000 [28867708.856207] exe[47473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4fa83bbb9 cs:33 sp:7f6868deb858 ax:0 si:55b4fa8a631a di:ffffffffff600000 [28867709.939636] exe[48553] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0fd65abb9 cs:33 sp:7fbff7ebc858 ax:0 si:55e0fd6c531a di:ffffffffff600000 [28867710.528837] exe[47737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a81cebb9 cs:33 sp:7fa011591858 ax:0 si:5601a823931a di:ffffffffff600000 [28867710.838600] exe[47609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a81cebb9 cs:33 sp:7fa011591858 ax:0 si:5601a823931a di:ffffffffff600000 [28867711.140430] exe[50274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0fd65abb9 cs:33 sp:7fbff7ebc858 ax:0 si:55e0fd6c531a di:ffffffffff600000 [28867712.040702] exe[49667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d97261bb9 cs:33 sp:7ffa55dfe858 ax:0 si:557d972cc31a di:ffffffffff600000 [28867712.196206] exe[47470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d97261bb9 cs:33 sp:7ffa55dfe858 ax:0 si:557d972cc31a di:ffffffffff600000 [28867712.862099] exe[47702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a81cebb9 cs:33 sp:7fa011591858 ax:0 si:5601a823931a di:ffffffffff600000 [28867713.299860] exe[47504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d97261bb9 cs:33 sp:7ffa55dfe858 ax:0 si:557d972cc31a di:ffffffffff600000 [28867713.624824] exe[49010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d97261bb9 cs:33 sp:7ffa55dfe858 ax:0 si:557d972cc31a di:ffffffffff600000 [28867714.505410] exe[48553] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c7cfd4cbb9 cs:33 sp:7f9757085858 ax:0 si:55c7cfdb731a di:ffffffffff600000 [28867714.719178] exe[48547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d97261bb9 cs:33 sp:7ffa55dfe858 ax:0 si:557d972cc31a di:ffffffffff600000 [28867715.026326] exe[49036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a81cebb9 cs:33 sp:7fa011591858 ax:0 si:5601a823931a di:ffffffffff600000 [28867715.628213] exe[48081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c7cfd4cbb9 cs:33 sp:7f9757085858 ax:0 si:55c7cfdb731a di:ffffffffff600000 [28867716.105964] exe[50023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b2f9d1bb9 cs:33 sp:7f25d9068858 ax:0 si:561b2fa3c31a di:ffffffffff600000 [28867717.073059] exe[47859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b2f9d1bb9 cs:33 sp:7f25d9089858 ax:0 si:561b2fa3c31a di:ffffffffff600000 [28867718.254331] exe[47850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a81cebb9 cs:33 sp:7fa011591858 ax:0 si:5601a823931a di:ffffffffff600000 [28867718.767964] exe[47797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0fd65abb9 cs:33 sp:7fbff7ebc858 ax:0 si:55e0fd6c531a di:ffffffffff600000 [28867719.391571] exe[49004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c7cfd4cbb9 cs:33 sp:7f9757085858 ax:0 si:55c7cfdb731a di:ffffffffff600000 [28867719.638058] exe[49789] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a81cebb9 cs:33 sp:7fa011591858 ax:0 si:5601a823931a di:ffffffffff600000 [28867719.885837] exe[48476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b2f9d1bb9 cs:33 sp:7f25d9089858 ax:0 si:561b2fa3c31a di:ffffffffff600000 [28867720.514216] exe[47504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0fd65abb9 cs:33 sp:7fbff7ebc858 ax:0 si:55e0fd6c531a di:ffffffffff600000 [28867721.082659] exe[49430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b2f9d1bb9 cs:33 sp:7f25d9089858 ax:0 si:561b2fa3c31a di:ffffffffff600000 [28867721.765010] exe[50019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0fd65abb9 cs:33 sp:7fbff7ebc858 ax:0 si:55e0fd6c531a di:ffffffffff600000 [28867722.339290] exe[47900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c7cfd4cbb9 cs:33 sp:7f9757085858 ax:0 si:55c7cfdb731a di:ffffffffff600000 [28867722.914268] exe[49003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a81cebb9 cs:33 sp:7fa011591858 ax:0 si:5601a823931a di:ffffffffff600000 [28867723.825832] exe[57488] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0fd65abb9 cs:33 sp:7fbff7ebc858 ax:0 si:55e0fd6c531a di:ffffffffff600000 [28867725.321357] exe[48604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a81cebb9 cs:33 sp:7fa011591858 ax:0 si:5601a823931a di:ffffffffff600000 [28867752.279067] potentially unexpected fatal signal 5. [28867752.284286] CPU: 93 PID: 26300 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28867752.296174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28867752.305812] RIP: 0033:0x7fffffffe062 [28867752.309808] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28867752.330374] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [28867752.337413] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28867752.344958] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28867752.353913] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [28867752.362852] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000029c18 [28867752.371754] R13: 000000c00016fbc0 R14: 000000c00050ee00 R15: 000000000000483f [28867752.380695] FS: 000000c000180098 GS: 0000000000000000 [28867922.745237] exe[66469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642cdb6fbb9 cs:33 sp:7ef873ffe858 ax:0 si:5642cdbda31a di:ffffffffff600000 [28867995.391182] exe[985010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e819784a50 cs:33 sp:7f04c9acb070 ax:55e819784a50 si:3 di:55e8198262b8 [28868137.305223] exe[78720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bde1c57bb9 cs:33 sp:7fb2a627d858 ax:0 si:55bde1cc231a di:ffffffffff600000 [28868153.881299] exe[79225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc4a2e2bb9 cs:33 sp:7fdc69e2f858 ax:0 si:55dc4a34d31a di:ffffffffff600000 [28868199.703771] exe[64556] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563cea1f6bb9 cs:33 sp:7f799ab62858 ax:0 si:563cea26131a di:ffffffffff600000 [28868221.063174] exe[57959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e420647bb9 cs:33 sp:7fe0f4f38858 ax:0 si:55e4206b231a di:ffffffffff600000 [28868251.412640] exe[72648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555dbfa88bb9 cs:33 sp:7f0ca63d0858 ax:0 si:555dbfaf331a di:ffffffffff600000 [28868251.955714] exe[54525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556913a6fbb9 cs:33 sp:7f4f43847858 ax:0 si:556913ada31a di:ffffffffff600000 [28868253.978322] exe[63697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56486905cbb9 cs:33 sp:7f5de0958858 ax:0 si:5648690c731a di:ffffffffff600000 [28868257.094941] exe[82638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630882ddbb9 cs:33 sp:7f4832ff8858 ax:0 si:56308834831a di:ffffffffff600000 [28868260.697510] exe[60181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560731608bb9 cs:33 sp:7fe893798858 ax:0 si:56073167331a di:ffffffffff600000 [28868269.188308] exe[79807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55569bea4bb9 cs:33 sp:7f22046dd858 ax:0 si:55569bf0f31a di:ffffffffff600000 [28868321.746273] exe[82433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632d14ecbb9 cs:33 sp:7ec7e9748858 ax:0 si:5632d155731a di:ffffffffff600000 [28868327.869233] exe[75214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ce3ee4bb9 cs:33 sp:7ed23d9ef858 ax:0 si:561ce3f4f31a di:ffffffffff600000 [28868383.951987] exe[47516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561395abfbb9 cs:33 sp:7fcfae638858 ax:0 si:561395b2a31a di:ffffffffff600000 [28868467.445547] exe[66464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ad316bbb9 cs:33 sp:7ed41a287858 ax:0 si:562ad31d631a di:ffffffffff600000 [28868875.516112] exe[102607] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584cab99bb9 cs:33 sp:7fc3da0a8858 ax:0 si:5584cac0431a di:ffffffffff600000 [28869301.634800] exe[77657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a920487bb9 cs:33 sp:7f4eaf4d0ef8 ax:0 si:200033c0 di:ffffffffff600000 [28872853.571165] exe[226533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ef07a8bb9 cs:33 sp:7ef81fa8f858 ax:0 si:555ef081334f di:ffffffffff600000 [28873985.291214] exe[297654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca0235cbb9 cs:33 sp:7efdc7118858 ax:0 si:55ca023c734f di:ffffffffff600000 [28874585.810957] exe[299838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55edc75e4bb9 cs:33 sp:7fbcebf1f858 ax:0 si:55edc764f31a di:ffffffffff600000 [28874958.996234] potentially unexpected fatal signal 5. [28874959.001444] CPU: 15 PID: 348380 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28874959.013437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28874959.023168] RIP: 0033:0x7fffffffe062 [28874959.027143] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28874959.046349] RSP: 002b:000000c000287b90 EFLAGS: 00000297 [28874959.053357] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28874959.062262] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28874959.071188] RBP: 000000c000287c28 R08: 0000000000000000 R09: 0000000000000000 [28874959.080112] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000287c18 [28874959.089031] R13: 000000c0001a2c00 R14: 000000c00015e8c0 R15: 00000000000485ef [28874959.097940] FS: 000000c000180898 GS: 0000000000000000 [28875262.516269] potentially unexpected fatal signal 5. [28875262.521504] CPU: 31 PID: 209529 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28875262.533461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28875262.543072] RIP: 0033:0x7fffffffe062 [28875262.547022] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28875262.566237] RSP: 002b:000000c000695b90 EFLAGS: 00000297 [28875262.571896] RAX: 0000000000058cb7 RBX: 0000000000000000 RCX: 00007fffffffe05a [28875262.580803] RDX: 0000000000000000 RSI: 000000c000696000 RDI: 0000000000012f00 [28875262.589751] RBP: 000000c000695c28 R08: 000000c0009241f0 R09: 0000000000000000 [28875262.598676] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000695c18 [28875262.607580] R13: 000000c0006a3bc0 R14: 000000c00048aa80 R15: 00000000000331a7 [28875262.616487] FS: 000000c0002ee898 GS: 0000000000000000 [28876557.458919] exe[405125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638a98307c1 cs:33 sp:7f80ec8f5578 ax:8 si:1 di:7f80ec8f5670 [28878052.944589] exe[438469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d43c34bb9 cs:33 sp:7fd46594a858 ax:0 si:563d43c9f31a di:ffffffffff600000 [28878120.801161] exe[434582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c40aaebb9 cs:33 sp:7f6368d7b858 ax:0 si:558c40b1931a di:ffffffffff600000 [28878579.818515] exe[495432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b21d4bebb9 cs:33 sp:7f9dabe2d858 ax:0 si:55b21d52934f di:ffffffffff600000 [28878816.009583] exe[501039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c00923bb9 cs:33 sp:7f3ed167aef8 ax:0 si:20000080 di:ffffffffff600000 [28878840.664941] exe[510140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f238dcbb9 cs:33 sp:7f9ca4d98858 ax:0 si:559f2394734f di:ffffffffff600000 [28880008.386923] exe[536141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab8cdcfbb9 cs:33 sp:7fb229c7d858 ax:0 si:55ab8ce3a31a di:ffffffffff600000 [28881149.565992] exe[596496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c96364bb9 cs:33 sp:7fdbba23aef8 ax:0 si:200022c0 di:ffffffffff600000 [28881270.899309] exe[590959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f0345ebb9 cs:33 sp:7f9f4b90e858 ax:0 si:564f034c934f di:ffffffffff600000 [28881802.201894] exe[616147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ad526ebb9 cs:33 sp:7f1f52315858 ax:0 si:557ad52d9328 di:ffffffffff600000 [28882158.755701] potentially unexpected fatal signal 5. [28882158.760933] CPU: 45 PID: 615027 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28882158.772935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28882158.782587] RIP: 0033:0x7fffffffe062 [28882158.786606] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28882158.807292] RSP: 002b:000000c000327b90 EFLAGS: 00000297 [28882158.814284] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28882158.823185] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28882158.832215] RBP: 000000c000327c28 R08: 0000000000000000 R09: 0000000000000000 [28882158.841128] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000327c18 [28882158.850062] R13: 000000c000204c00 R14: 000000c00024b500 R15: 0000000000095c0e [28882158.858985] FS: 000000c00013a898 GS: 0000000000000000 [28882458.291988] exe[649792] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651dcec3bb9 cs:33 sp:7eda1a0c8858 ax:0 si:5651dcf2e31a di:ffffffffff600000 [28882739.788259] exe[598494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5559b0683bb9 cs:33 sp:7ef2b09de858 ax:0 si:5559b06ee328 di:ffffffffff600000 [28882741.333625] exe[640769] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643a617f7c1 cs:33 sp:7f2ab8560578 ax:8 si:1 di:7f2ab8560670 [28883402.176027] exe[667223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d9e460bb9 cs:33 sp:7f851823d858 ax:0 si:562d9e4cb31a di:ffffffffff600000 [28884558.822469] potentially unexpected fatal signal 5. [28884558.827705] CPU: 47 PID: 719456 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28884558.839675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28884558.849291] RIP: 0033:0x7fffffffe062 [28884558.853255] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28884558.872500] RSP: 002b:000000c000619b90 EFLAGS: 00000297 [28884558.879567] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28884558.888455] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28884558.897376] RBP: 000000c000619c28 R08: 0000000000000000 R09: 0000000000000000 [28884558.906266] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000619c18 [28884558.915168] R13: 000000c0004e3a70 R14: 000000c00025a700 R15: 00000000000ae0d9 [28884558.924181] FS: 0000000002055bb0 GS: 0000000000000000 [28886014.208960] exe[767631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6ffe31bb9 cs:33 sp:7f5f0aafe858 ax:0 si:55a6ffe9c31a di:ffffffffff600000 [28886259.003046] exe[772074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ea901b337 cs:33 sp:7fe7e5a32ef8 ax:4bc00000 si:555ea909a4bc di:ffffffffff600000 [28886952.316819] potentially unexpected fatal signal 5. [28886952.322040] CPU: 47 PID: 803891 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28886952.334021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28886952.343647] RIP: 0033:0x7fffffffe062 [28886952.347648] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28886952.366837] RSP: 002b:000000c00026db90 EFLAGS: 00000297 [28886952.373833] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28886952.382753] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28886952.391675] RBP: 000000c00026dc28 R08: 0000000000000000 R09: 0000000000000000 [28886952.400618] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00026dc18 [28886952.409535] R13: 000000c00028cc00 R14: 000000c00015dc00 R15: 00000000000c40ff [28886952.418450] FS: 000000c00013b098 GS: 0000000000000000 [28888107.147411] exe[746247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cbe4db0bb9 cs:33 sp:7f2599768858 ax:0 si:55cbe4e1b34f di:ffffffffff600000 [28888124.229398] exe[856415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559cefa9fbb9 cs:33 sp:7eaf7e948858 ax:0 si:559cefb0a34f di:ffffffffff600000 [28888141.054791] exe[860963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e28d6fbb9 cs:33 sp:7f3af14f1858 ax:0 si:555e28dda31a di:ffffffffff600000 [28888651.380586] exe[877063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572f3f00bb9 cs:33 sp:7f88a4796858 ax:0 si:5572f3f6b31a di:ffffffffff600000 [28889487.862463] exe[887394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aba9a2bb9 cs:33 sp:7ef1ade81ef8 ax:0 si:20000b00 di:ffffffffff600000 [28889690.313477] exe[950830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8279f5bb9 cs:33 sp:7f706409f858 ax:0 si:55c827a6031a di:ffffffffff600000 [28889815.017471] exe[987437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608eb105bb9 cs:33 sp:7feb92568858 ax:0 si:5608eb17034f di:ffffffffff600000 [28890466.093007] exe[5711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a73ebfbb9 cs:33 sp:7f2003f2d858 ax:0 si:563a73f2a34f di:ffffffffff600000 [28890653.162538] exe[40428] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e59e398bb9 cs:33 sp:7f9eaaa63858 ax:0 si:55e59e40331a di:ffffffffff600000 [28890733.873594] exe[47080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3e9891bb9 cs:33 sp:7fafead0a858 ax:0 si:55e3e98fc328 di:ffffffffff600000 [28891026.121830] exe[891988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acf250dbb9 cs:33 sp:7f812a3fe858 ax:0 si:55acf257831a di:ffffffffff600000 [28891035.975725] exe[34898] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55927cd19bb9 cs:33 sp:7f17223b8858 ax:0 si:55927cd8431a di:ffffffffff600000 [28891051.118398] exe[36593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581d388fbb9 cs:33 sp:7fc3919e4858 ax:0 si:5581d38fa31a di:ffffffffff600000 [28891111.369273] exe[43696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f59d39ebb9 cs:33 sp:7f5303b92858 ax:0 si:55f59d40931a di:ffffffffff600000 [28891112.492371] exe[60138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654a153bbb9 cs:33 sp:7f08b7bd0858 ax:0 si:5654a15a631a di:ffffffffff600000 [28891196.052458] exe[39159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555adb1d0bb9 cs:33 sp:7ebc3d1fe858 ax:0 si:555adb23b31a di:ffffffffff600000 [28891225.951832] exe[24132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe19282bb9 cs:33 sp:7fd7e86c7858 ax:0 si:55fe192ed31a di:ffffffffff600000 [28891328.926018] exe[44979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c556358bb9 cs:33 sp:7eca9c1c9858 ax:0 si:55c5563c331a di:ffffffffff600000 [28892069.941754] exe[96859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615b78cabb9 cs:33 sp:7fc7adf35858 ax:0 si:5615b7935328 di:ffffffffff600000 [28892100.309410] potentially unexpected fatal signal 5. [28892100.314659] CPU: 38 PID: 891842 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28892100.326706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28892100.336344] RIP: 0033:0x7fffffffe062 [28892100.340360] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28892100.359573] RSP: 002b:000000c00061bb90 EFLAGS: 00000297 [28892100.366596] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28892100.375525] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28892100.384429] RBP: 000000c00061bc28 R08: 0000000000000000 R09: 0000000000000000 [28892100.393365] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00061bc18 [28892100.402271] R13: 000000c0006280c0 R14: 000000c00044a8c0 R15: 00000000000d9b8f [28892100.411187] FS: 0000000002055bb0 GS: 0000000000000000 [28892390.083169] exe[69921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e861aa4bb9 cs:33 sp:7ff353475858 ax:0 si:55e861b0f31a di:ffffffffff600000 [28892761.487404] exe[92873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56382da97bb9 cs:33 sp:7f1b7a140858 ax:0 si:56382db0231a di:ffffffffff600000 [28893169.046791] exe[135587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a9481bb9 cs:33 sp:7fe1149db858 ax:0 si:55b4a94ec328 di:ffffffffff600000 [28893315.722629] exe[195857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569cda1bbb9 cs:33 sp:7f17050e5ef8 ax:0 si:20002980 di:ffffffffff600000 [28899722.225157] potentially unexpected fatal signal 5. [28899722.230410] CPU: 86 PID: 350639 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28899722.242406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28899722.252040] RIP: 0033:0x7fffffffe062 [28899722.256013] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28899722.275230] RSP: 002b:000000c00085bb08 EFLAGS: 00000297 [28899722.280901] RAX: 000055a3984e5000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28899722.289849] RDX: 0000000000000001 RSI: 0000000000021000 RDI: 000055a3984e5000 [28899722.298755] RBP: 000000c00085bb90 R08: 0000000000000009 R09: 0000000007dcc000 [28899722.307696] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00085ba50 [28899722.316625] R13: 000000c00020a808 R14: 000000c0004f0a80 R15: 00000000000554b6 [28899722.325576] FS: 00007fea52ffd6c0 GS: 0000000000000000 [28900174.343078] exe[343118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56402aef1bb9 cs:33 sp:7f795894a858 ax:0 si:56402af5c31a di:ffffffffff600000 [28900364.568768] exe[304381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4e2d45bb9 cs:33 sp:7fcd39264858 ax:0 si:55e4e2db0328 di:ffffffffff600000 [28900365.013245] exe[299115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f268fabb9 cs:33 sp:7f5a11c46858 ax:0 si:564f26965328 di:ffffffffff600000 [28900365.925885] exe[303630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4e2d45bb9 cs:33 sp:7fcd39264858 ax:0 si:55e4e2db0328 di:ffffffffff600000 [28900366.327334] exe[299223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd5e58ebb9 cs:33 sp:7f65f0919858 ax:0 si:55fd5e5f9328 di:ffffffffff600000 [28900366.997932] exe[294340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4e2d45bb9 cs:33 sp:7fcd39264858 ax:0 si:55e4e2db0328 di:ffffffffff600000 [28900445.817327] potentially unexpected fatal signal 5. [28900445.822596] CPU: 5 PID: 290105 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28900445.834675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28900445.844325] RIP: 0033:0x7fffffffe062 [28900445.848319] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28900445.867684] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [28900445.874714] RAX: 0000000000059b7e RBX: 0000000000000000 RCX: 00007fffffffe05a [28900445.883665] RDX: 0000000000000000 RSI: 000000c00002a000 RDI: 0000000000012f00 [28900445.892629] RBP: 000000c000029c28 R08: 000000c0008c64c0 R09: 0000000000000000 [28900445.901579] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000029c18 [28900445.910694] R13: 000000c00016cc00 R14: 000000c000169dc0 R15: 0000000000046cb5 [28900445.919918] FS: 000000c00013b898 GS: 0000000000000000 [28900637.427135] exe[301991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587f2f23337 cs:33 sp:7fe2a5645ef8 ax:4bc00000 si:5587f2fa24bc di:ffffffffff600000 [28901572.204943] exe[398258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4cf733bb9 cs:33 sp:7f0910a30ef8 ax:0 si:20002500 di:ffffffffff600000 [28901982.102683] exe[357253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555aea1dfbb9 cs:33 sp:7f67e927c858 ax:0 si:555aea24a31a di:ffffffffff600000 [28902144.364173] exe[367835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe153b2bb9 cs:33 sp:7eb4da3d3ef8 ax:0 si:200001c0 di:ffffffffff600000 [28902185.334389] exe[371747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5556253a3bb9 cs:33 sp:7f249a354858 ax:0 si:55562540e31a di:ffffffffff600000 [28902291.219906] exe[412001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567f4b87bb9 cs:33 sp:7fcaf3ffe858 ax:0 si:5567f4bf231a di:ffffffffff600000 [28902965.592901] potentially unexpected fatal signal 11. [28902965.598321] CPU: 6 PID: 439058 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28902965.610207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28902965.619857] RIP: 0033:0x55d8f6578b4b [28902965.623873] Code: e9 ff ff 48 89 c1 48 85 c0 75 c9 e9 6d f8 ff ff 48 8d 3d 10 6c 09 00 e8 43 c7 ff ff 48 8d 15 1c eb 12 00 48 8d 34 19 48 39 d5 <48> 89 75 60 0f 95 c2 48 29 d8 48 83 c1 10 0f b6 d2 48 83 c8 01 48 [28902965.643222] RSP: 002b:00007f67952532f0 EFLAGS: 00010246 [28902965.650176] RAX: 0000000000020830 RBX: 0000000000008040 RCX: 000055d8f720d7d0 [28902965.657738] RDX: 000055d8f66a7660 RSI: 000055d8f7215810 RDI: 0000000000000004 [28902965.666662] RBP: 000055d8f66a7660 R08: 000000000d1d556f R09: 000000000000003a [28902965.675646] R10: 0000000000001000 R11: 0000000000000802 R12: 0000000000008030 [28902965.684576] R13: 0000000000000076 R14: 000055d8f66a76c0 R15: 0000000000000000 [28902965.693474] FS: 000055d8f720c480 GS: 0000000000000000 [28904304.683388] potentially unexpected fatal signal 5. [28904304.688623] CPU: 46 PID: 482715 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28904304.700685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28904304.710319] RIP: 0033:0x7fffffffe062 [28904304.714340] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28904304.733573] RSP: 002b:000000c0004bbb90 EFLAGS: 00000297 [28904304.739226] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28904304.748154] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28904304.757057] RBP: 000000c0004bbc28 R08: 0000000000000000 R09: 0000000000000000 [28904304.764616] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0004bbc18 [28904304.774270] R13: 000000c0004d09f0 R14: 000000c000482a80 R15: 0000000000075b47 [28904304.783270] FS: 000000c00013b098 GS: 0000000000000000 [28904585.152239] exe[509114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4c1b89bb9 cs:33 sp:7fb564326ef8 ax:0 si:20000340 di:ffffffffff600000 [28905903.744290] exe[476482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcb1084bb9 cs:33 sp:7f2137f2b858 ax:0 si:55fcb10ef31a di:ffffffffff600000 [28910620.766573] exe[700618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a19e5a3bb9 cs:33 sp:7fdb678b9858 ax:0 si:55a19e60e328 di:ffffffffff600000 [28910622.683383] exe[701272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566176e6bb9 cs:33 sp:7fa628bfe858 ax:0 si:556617751328 di:ffffffffff600000 [28910623.468033] exe[723378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a19e5a3bb9 cs:33 sp:7fdb678b9858 ax:0 si:55a19e60e328 di:ffffffffff600000 [28910623.899320] exe[718579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bb474abb9 cs:33 sp:7f8e2a0db858 ax:0 si:558bb47b5328 di:ffffffffff600000 [28910625.903129] exe[715079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a19e5a3bb9 cs:33 sp:7fdb678b9858 ax:0 si:55a19e60e328 di:ffffffffff600000 [28912810.829223] exe[754392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5588b0502bb9 cs:33 sp:7fd8b10a1858 ax:0 si:5588b056d31a di:ffffffffff600000 [28914181.082608] exe[775434] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559216642bb9 cs:33 sp:7f9122490858 ax:0 si:5592166ad31a di:ffffffffff600000 [28915293.734129] exe[774571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647e0ef6bb9 cs:33 sp:7effcf517858 ax:0 si:5647e0f6131a di:ffffffffff600000 [28915466.547138] exe[825201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55995c0f3bb9 cs:33 sp:7f4ddcff6858 ax:0 si:55995c15e31a di:ffffffffff600000 [28915567.919113] exe[774281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b00158bb9 cs:33 sp:7f8dccbb0858 ax:0 si:562b001c331a di:ffffffffff600000 [28918411.136543] exe[900644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e645d29337 cs:33 sp:7f17279feef8 ax:4be00000 si:55e645da84be di:ffffffffff600000 [28918508.126475] exe[912955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55730e019337 cs:33 sp:7f920b246ef8 ax:4be00000 si:55730e0984be di:ffffffffff600000 [28919646.395340] potentially unexpected fatal signal 5. [28919646.400567] CPU: 56 PID: 924754 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28919646.412532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28919646.422166] RIP: 0033:0x7fffffffe062 [28919646.426193] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28919646.446765] RSP: 002b:000000c000651b90 EFLAGS: 00000297 [28919646.453822] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28919646.462731] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28919646.471663] RBP: 000000c000651c28 R08: 0000000000000000 R09: 0000000000000000 [28919646.480583] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000651c18 [28919646.489513] R13: 000000c00065ac00 R14: 000000c00037c8c0 R15: 00000000000e10db [28919646.498418] FS: 0000000002056bb0 GS: 0000000000000000 [28920391.665825] exe[956185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c57a7fbb9 cs:33 sp:7ec7b3bfe858 ax:0 si:559c57aea34f di:ffffffffff600000 [28926342.931989] exe[246650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3dd6e0bb9 cs:33 sp:7ecfd16aaef8 ax:0 si:20000480 di:ffffffffff600000 [28928420.054286] exe[409491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aad1dd6bb9 cs:33 sp:7f2ec10c3858 ax:0 si:55aad1e4131a di:ffffffffff600000 [28929518.353838] exe[479043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558641bc6bb9 cs:33 sp:7fdb479fe858 ax:0 si:558641c3131a di:ffffffffff600000 [28929833.748891] exe[495783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f71d1c9bb9 cs:33 sp:7ffa049b6858 ax:0 si:55f71d23434f di:ffffffffff600000 [28931641.806705] potentially unexpected fatal signal 5. [28931641.811947] CPU: 6 PID: 592048 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28931641.823849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28931641.833491] RIP: 0033:0x7fffffffe062 [28931641.837490] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28931641.858174] RSP: 002b:000000c0002d7b90 EFLAGS: 00000297 [28931641.865186] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28931641.874196] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28931641.883120] RBP: 000000c0002d7c28 R08: 0000000000000000 R09: 0000000000000000 [28931641.892043] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0002d7c18 [28931641.900974] R13: 000000c000789a70 R14: 000000c0002c1500 R15: 00000000000905f0 [28931641.909928] FS: 0000000002056bb0 GS: 0000000000000000 [28932470.311617] exe[594916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5563fa1e8bb9 cs:33 sp:7eb6fe5b5858 ax:0 si:5563fa25331a di:ffffffffff600000 [28932509.670841] exe[658181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f6e098bb9 cs:33 sp:7f9f33e83858 ax:0 si:559f6e10331a di:ffffffffff600000 [28932520.432177] exe[657880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e21095bb9 cs:33 sp:7ff046901858 ax:0 si:562e2110031a di:ffffffffff600000 [28932545.523730] exe[659841] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564edc699bb9 cs:33 sp:7f370ffbd858 ax:0 si:564edc70431a di:ffffffffff600000 [28932601.019299] exe[665957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9ce862bb9 cs:33 sp:7f324f9a5858 ax:0 si:55d9ce8cd31a di:ffffffffff600000 [28932689.374783] exe[623218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562431b28bb9 cs:33 sp:7eb911a25858 ax:0 si:562431b9331a di:ffffffffff600000 [28932690.949083] exe[639849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2af3fbb9 cs:33 sp:7f9309074858 ax:0 si:55ff2afaa31a di:ffffffffff600000 [28932865.519779] exe[678168] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561882878bb9 cs:33 sp:7f3a42f1f858 ax:0 si:5618828e331a di:ffffffffff600000 [28932869.837865] exe[676189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ef7478bb9 cs:33 sp:7f96bedfe858 ax:0 si:560ef74e331a di:ffffffffff600000 [28934418.163084] exe[741099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56145f134bb9 cs:33 sp:7f017473e858 ax:0 si:56145f19f34f di:ffffffffff600000 [28937277.350263] exe[933577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620cac7c337 cs:33 sp:7f6927870ef8 ax:4be00000 si:5620cacfb4be di:ffffffffff600000 [28939402.125652] exe[85770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f2dfbabb9 cs:33 sp:7f1a704bfef8 ax:0 si:20000800 di:ffffffffff600000 [28941976.779608] exe[219513] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d14b695bb9 cs:33 sp:7f4cd1b67858 ax:0 si:55d14b70031a di:ffffffffff600000 [28942435.062248] exe[169014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598f0c50bb9 cs:33 sp:7eaf84c60858 ax:0 si:5598f0cbb31a di:ffffffffff600000 [28942932.169776] exe[316014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bccbb4bb9 cs:33 sp:7f3b43e3c858 ax:0 si:555bccc1f31a di:ffffffffff600000 [28943635.533343] potentially unexpected fatal signal 5. [28943635.538590] CPU: 7 PID: 358086 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28943635.550482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28943635.560121] RIP: 0033:0x7fffffffe062 [28943635.564148] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28943635.584769] RSP: 002b:000000c0005cfb90 EFLAGS: 00000297 [28943635.591789] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28943635.600716] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28943635.609652] RBP: 000000c0005cfc28 R08: 0000000000000000 R09: 0000000000000000 [28943635.618556] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005cfc18 [28943635.627467] R13: 000000c0005d8c00 R14: 000000c000580540 R15: 0000000000057672 [28943635.636406] FS: 000000c00013a898 GS: 0000000000000000 [28943835.117441] exe[266005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55656f733337 cs:33 sp:7eb9f704eef8 ax:4be00000 si:55656f7b24be di:ffffffffff600000 [28944835.426974] potentially unexpected fatal signal 5. [28944835.432191] CPU: 56 PID: 432284 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28944835.444147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28944835.453753] RIP: 0033:0x7fffffffe062 [28944835.457706] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28944835.476935] RSP: 002b:000000c0005bbb90 EFLAGS: 00000297 [28944835.482569] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28944835.490119] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28944835.497689] RBP: 000000c0005bbc28 R08: 0000000000000000 R09: 0000000000000000 [28944835.506635] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005bbc18 [28944835.515536] R13: 000000c0005ce210 R14: 000000c00045ea80 R15: 0000000000069426 [28944835.524489] FS: 000000c00013b098 GS: 0000000000000000 [28944841.934499] potentially unexpected fatal signal 5. [28944841.939719] CPU: 26 PID: 440842 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28944841.951718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28944841.961353] RIP: 0033:0x7fffffffe062 [28944841.965384] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28944841.984584] RSP: 002b:000000c000495b90 EFLAGS: 00000297 [28944841.991605] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28944842.000531] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28944842.009459] RBP: 000000c000495c28 R08: 0000000000000000 R09: 0000000000000000 [28944842.018424] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000495c18 [28944842.027367] R13: 000000c00049e0c0 R14: 000000c0004f48c0 R15: 000000000006b64d [28944842.034990] FS: 000000c00013a898 GS: 0000000000000000 [28948647.295194] exe[695822] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55727ee61bb9 cs:33 sp:7f58bcebbef8 ax:0 si:200002c0 di:ffffffffff600000 [28948701.237946] exe[706315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab50881bb9 cs:33 sp:7fc7258ddef8 ax:0 si:20004800 di:ffffffffff600000 [28949245.064823] exe[736485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56502a82dbb9 cs:33 sp:7f42cca82858 ax:0 si:56502a89834f di:ffffffffff600000 [28954581.082646] exe[890555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55804c9f0bb9 cs:33 sp:7fe54ff69858 ax:0 si:55804ca5b328 di:ffffffffff600000 [28954581.756102] exe[906347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55804c9f0bb9 cs:33 sp:7fe54ff69858 ax:0 si:55804ca5b328 di:ffffffffff600000 [28954582.345694] exe[901805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5593ace25bb9 cs:33 sp:7fba34acd858 ax:0 si:5593ace90328 di:ffffffffff600000 [28954583.000417] exe[889604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b6b2b5bb9 cs:33 sp:7f011e0a3858 ax:0 si:558b6b320328 di:ffffffffff600000 [28954584.111621] exe[900918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f39f36cbb9 cs:33 sp:7fb0418ce858 ax:0 si:55f39f3d7328 di:ffffffffff600000 [28956951.800041] potentially unexpected fatal signal 5. [28956951.805273] CPU: 22 PID: 905897 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28956951.817288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28956951.826986] RIP: 0033:0x7fffffffe062 [28956951.830949] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28956951.850155] RSP: 002b:000000c0002d5b90 EFLAGS: 00000297 [28956951.855813] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28956951.863364] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28956951.870882] RBP: 000000c0002d5c28 R08: 0000000000000000 R09: 0000000000000000 [28956951.879819] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0002d5c18 [28956951.888754] R13: 000000c0002e2c00 R14: 000000c000249c00 R15: 00000000000d884d [28956951.897692] FS: 000000c00013b898 GS: 0000000000000000 [28956952.238936] potentially unexpected fatal signal 5. [28956952.244669] CPU: 5 PID: 889760 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28956952.256631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28956952.266407] RIP: 0033:0x7fffffffe062 [28956952.270601] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28956952.291367] RSP: 002b:000000c000239b90 EFLAGS: 00000297 [28956952.298647] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [28956952.308266] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [28956952.317304] RBP: 000000c000239c28 R08: 0000000000000000 R09: 0000000000000000 [28956952.327262] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000239c18 [28956952.336307] R13: 000000c0001a0c00 R14: 000000c000582700 R15: 00000000000d894e [28956952.345324] FS: 000000c000680098 GS: 0000000000000000 [28956961.480805] potentially unexpected fatal signal 5. [28956961.486024] CPU: 29 PID: 894039 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28956961.497984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28956961.498461] potentially unexpected fatal signal 5. [28956961.507612] RIP: 0033:0x7fffffffe062 [28956961.507616] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28956961.507618] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [28956961.507620] RAX: 00000000000ec95f RBX: 0000000000000000 RCX: 00007fffffffe05a [28956961.507621] RDX: 0000000000000000 RSI: 000000c00004e000 RDI: 0000000000012f00 [28956961.507625] RBP: 000000c00004db30 R08: 000000c0001e6970 R09: 0000000000000000 [28956961.512935] CPU: 84 PID: 893726 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28956961.518278] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00004d9c8 [28956961.518279] R13: 000000c000180008 R14: 000000c000183a40 R15: 00000000000da2ac [28956961.518280] FS: 00007fd63d19c6c0 GS: 0000000000000000 [28956961.608427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28956961.619597] RIP: 0033:0x7fffffffe062 [28956961.624962] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28956961.645501] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [28956961.652520] RAX: 00000000000ec95e RBX: 0000000000000000 RCX: 00007fffffffe05a [28956961.661438] RDX: 0000000000000000 RSI: 000000c00004e000 RDI: 0000000000012f00 [28956961.670420] RBP: 000000c00004db30 R08: 000000c0001e6100 R09: 0000000000000000 [28956961.679388] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00004d9c8 [28956961.688273] R13: 000000c000180008 R14: 000000c000183a40 R15: 00000000000da2ac [28956961.697215] FS: 00007fd63d19c6c0 GS: 0000000000000000 [28958300.160070] potentially unexpected fatal signal 5. [28958300.165304] CPU: 59 PID: 20172 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28958300.177179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28958300.186998] RIP: 0033:0x7fffffffe062 [28958300.191018] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28958300.211611] RSP: 002b:000000c0007ebbe8 EFLAGS: 00000297 [28958300.218658] RAX: 00000000000051ca RBX: 0000000000000000 RCX: 00007fffffffe05a [28958300.227585] RDX: 0000000000000000 RSI: 000000c0007ec000 RDI: 0000000000012f00 [28958300.236522] RBP: 000000c0007ebc80 R08: 000000c0002c2c40 R09: 0000000000000000 [28958300.244115] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0007ebc70 [28958300.253039] R13: 000000c00029b800 R14: 000000c00034ca80 R15: 0000000000004ebf [28958300.261960] FS: 000000c0004f5098 GS: 0000000000000000 [28963653.411312] exe[222558] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c150457c1 cs:33 sp:7f29e22f04c8 ax:8 si:1 di:7f29e22f05c0 [28964166.968122] exe[215261] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5606b5ff1bb9 cs:33 sp:7ea40b328858 ax:0 si:5606b605c31a di:ffffffffff600000 [28964249.357322] exe[236475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557848e31bb9 cs:33 sp:7fd413d03858 ax:0 si:557848e9c34f di:ffffffffff600000 [28965042.588597] exe[201825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563962ecbbb9 cs:33 sp:7ef02f6e6ef8 ax:0 si:20001340 di:ffffffffff600000 [28965367.388845] exe[283214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cb1984cbb9 cs:33 sp:7fc6aad9c858 ax:0 si:55cb198b731a di:ffffffffff600000 [28968173.090033] exe[418118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55feb0597bb9 cs:33 sp:7f02f8da2858 ax:0 si:55feb060231a di:ffffffffff600000 [28968300.745350] exe[407260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56130b677337 cs:33 sp:7fe271ea0ef8 ax:4be00000 si:56130b6f64be di:ffffffffff600000 [28969059.204014] exe[484610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570c6c95bb9 cs:33 sp:7f3f01868858 ax:0 si:5570c6d0031a di:ffffffffff600000 [28969160.993925] exe[464087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558741609bb9 cs:33 sp:7f0e58878858 ax:0 si:55874167431a di:ffffffffff600000 [28969204.251675] exe[494403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565193e21bb9 cs:33 sp:7fa111e8b858 ax:0 si:565193e8c31a di:ffffffffff600000 [28969294.728186] exe[495964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565350f35bb9 cs:33 sp:7f7bc09d9858 ax:0 si:565350fa031a di:ffffffffff600000 [28969388.569350] exe[357616] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558804ef0bb9 cs:33 sp:7eb3714b5858 ax:0 si:558804f5b31a di:ffffffffff600000 [28969431.193080] exe[502852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628bdc88bb9 cs:33 sp:7f135d86b858 ax:0 si:5628bdcf331a di:ffffffffff600000 [28969495.859528] exe[508313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56510615abb9 cs:33 sp:7ebe2e933858 ax:0 si:5651061c531a di:ffffffffff600000 [28969674.868980] exe[521547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577887c9bb9 cs:33 sp:7f74c8827858 ax:0 si:55778883431a di:ffffffffff600000 [28970924.134298] exe[589184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578daf09bb9 cs:33 sp:7f5764d47ef8 ax:0 si:20000040 di:ffffffffff600000 [28971142.118372] exe[586629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f0b9c2bb9 cs:33 sp:7f2c0196b858 ax:0 si:556f0ba2d31a di:ffffffffff600000 [28971211.281311] exe[599406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556312811337 cs:33 sp:7f951b51eef8 ax:4be00000 si:5563128904be di:ffffffffff600000 [28971212.071185] exe[588038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557392c0e337 cs:33 sp:7faf1d899ef8 ax:4be00000 si:557392c8d4be di:ffffffffff600000 [28972088.750383] exe[658989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f87c71bb9 cs:33 sp:7ff0b5eeeef8 ax:0 si:20000100 di:ffffffffff600000 [28975433.049159] exe[837801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acbf647bb9 cs:33 sp:7f748d0b3858 ax:0 si:55acbf6b231a di:ffffffffff600000 [28975788.492818] exe[798160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa548d7bb9 cs:33 sp:7ec5e346e858 ax:0 si:55aa5494234f di:ffffffffff600000 [28977430.757178] exe[955863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55978c3f2bb9 cs:33 sp:7fb1ec4d0ef8 ax:0 si:20000680 di:ffffffffff600000 [28977722.555758] exe[976279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cbaf4dfbb9 cs:33 sp:7fabd5b8a858 ax:0 si:55cbaf54a31a di:ffffffffff600000 [28979310.051020] exe[51137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55842b29abb9 cs:33 sp:7f7c15bc0858 ax:0 si:55842b30531a di:ffffffffff600000 [28979550.210249] exe[42911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff78855bb9 cs:33 sp:7ec6939d9858 ax:0 si:55ff788c034f di:ffffffffff600000 [28980281.610683] exe[88332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d86008ebb9 cs:33 sp:7f315d38eef8 ax:0 si:20006a40 di:ffffffffff600000 [28981785.040397] exe[219333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e668157bb9 cs:33 sp:7ea9da30bef8 ax:0 si:20000540 di:ffffffffff600000 [28981978.464841] exe[224808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b583fbb9 cs:33 sp:7f7374302858 ax:0 si:55c5b58aa31a di:ffffffffff600000 [28982438.349285] potentially unexpected fatal signal 5. [28982438.354506] CPU: 58 PID: 262593 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28982438.366528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28982438.376186] RIP: 0033:0x7fffffffe062 [28982438.380194] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [28982438.399638] RSP: 002b:000000c0006f7be8 EFLAGS: 00000297 [28982438.406633] RAX: 0000000000040c23 RBX: 0000000000000000 RCX: 00007fffffffe05a [28982438.415540] RDX: 0000000000000000 RSI: 000000c0006f8000 RDI: 0000000000012f00 [28982438.424464] RBP: 000000c0006f7c80 R08: 000000c0003e0790 R09: 0000000000000000 [28982438.433396] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0006f7c70 [28982438.442336] R13: 000000c00040d000 R14: 000000c00033ae00 R15: 00000000000401ae [28982438.451275] FS: 000000c00048e098 GS: 0000000000000000 [28984407.949805] exe[357738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d503a7bb9 cs:33 sp:7f4883287858 ax:0 si:562d5041234f di:ffffffffff600000 [28986928.671276] exe[531493] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ce8e607c1 cs:33 sp:7f00ecb684c8 ax:8 si:1 di:7f00ecb685c0 [28986961.822368] exe[523032] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f278ef1bb9 cs:33 sp:7ee7272b5858 ax:0 si:55f278f5c31a di:ffffffffff600000 [28987083.491612] exe[578058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffb1207bb9 cs:33 sp:7f01077e4858 ax:0 si:55ffb127231a di:ffffffffff600000 [28987086.271428] potentially unexpected fatal signal 11. [28987086.276723] CPU: 38 PID: 597701 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28987086.288701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28987086.298314] RIP: 0033:0x47290e [28987086.301738] Code: 0f 6f 59 e0 f3 44 0f 6f 61 f0 c5 fe 6f 26 4c 01 de 48 29 c3 c5 fe 6f 06 c5 fe 6f 4e 20 c5 fe 6f 56 40 c5 fe 6f 5e 60 48 01 c6 fd 7f 07 c5 fd 7f 4f 20 c5 fd 7f 57 40 c5 fd 7f 5f 60 48 01 c7 [28987086.320936] RSP: 002b:000000c000389b10 EFLAGS: 00010202 [28987086.326622] RAX: 0000000000000080 RBX: 000000000000b7cb RCX: 000000c0005c112d [28987086.335558] RDX: 000000c00057e000 RSI: 000000c0005b5962 RDI: 000000c000600000 [28987086.344471] RBP: 000000c000389b98 R08: 000000000002564c R09: 000000000004984b [28987086.353448] R10: 000000c0005e61ff R11: 0000000000000001 R12: ffffffffffffffff [28987086.362393] R13: 000000000001dae1 R14: 000000c0000061a0 R15: 0000000000000000 [28987086.371301] FS: 00000000025cd470 GS: 0000000000000000 [28987197.724236] exe[591231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2eeb35bb9 cs:33 sp:7f6d6f9fe858 ax:0 si:55c2eeba031a di:ffffffffff600000 [28993766.505915] exe[767790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5596a01debb9 cs:33 sp:7fea956dd858 ax:0 si:5596a024931a di:ffffffffff600000 [28994903.511524] potentially unexpected fatal signal 11. [28994903.516836] CPU: 81 PID: 846212 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [28994903.528838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [28994903.538505] RIP: 0033:0x563fc7be9b8b [28994903.542487] Code: ea 12 00 48 8d 34 19 48 39 d5 48 89 75 60 0f 95 c2 48 29 d8 48 83 c1 10 0f b6 d2 48 83 c8 01 48 c1 e2 02 48 09 da 48 83 ca 01 <48> 89 51 f8 48 89 46 08 eb 80 48 8d 0d 01 5e 09 00 48 8d 15 05 70 [28994903.563064] RSP: 002b:00007fc80c98d2f0 EFLAGS: 00010206 [28994903.570083] RAX: 00000000000187f1 RBX: 0000000000008040 RCX: 0000563fc887e7e0 [28994903.577636] RDX: 0000000000008041 RSI: 0000563fc8886810 RDI: 0000000000000004 [28994903.585189] RBP: 0000563fc7d18660 R08: 000000001a3c85e2 R09: 000000000000003a [28994903.594098] R10: 0000000000001000 R11: 0000000000000802 R12: 0000000000008030 [28994903.603037] R13: 0000000000000076 R14: 0000563fc7d186c0 R15: 0000000000000000 [28994903.610578] FS: 0000563fc887d480 GS: 0000000000000000 [28995337.997382] exe[811790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a81c8afbb9 cs:33 sp:7eaf6d1ca858 ax:0 si:55a81c91a31a di:ffffffffff600000 [28995346.265810] exe[848232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d72e680bb9 cs:33 sp:7ef92b180858 ax:0 si:55d72e6eb31a di:ffffffffff600000 [28996754.512079] exe[829652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f192b4fbb9 cs:33 sp:7ff607650858 ax:0 si:55f192bba31a di:ffffffffff600000 [28996840.093539] exe[867386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564abe50bbb9 cs:33 sp:7ff3d46aa858 ax:0 si:564abe57631a di:ffffffffff600000 [28997062.489798] exe[861964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c07caabb9 cs:33 sp:7f6935acc858 ax:0 si:557c07d1531a di:ffffffffff600000 [28997106.081294] exe[887775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f34279337 cs:33 sp:7f53696d5ef8 ax:4be00000 si:556f342f84be di:ffffffffff600000 [28997646.099139] exe[831614] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f8fb7bbb9 cs:33 sp:7f2185efd858 ax:0 si:564f8fbe631a di:ffffffffff600000 [28997653.865428] exe[831671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a20bc77bb9 cs:33 sp:7fa84efcc858 ax:0 si:55a20bce231a di:ffffffffff600000 [29000100.363659] exe[928696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bf9e001bb9 cs:33 sp:7f4d23fa3858 ax:0 si:55bf9e06c328 di:ffffffffff600000 [29000101.340360] exe[925258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bf9e001bb9 cs:33 sp:7f4d23fa3858 ax:0 si:55bf9e06c328 di:ffffffffff600000 [29000102.219470] exe[916157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d841584bb9 cs:33 sp:7f973ac38858 ax:0 si:55d8415ef328 di:ffffffffff600000 [29000102.500084] exe[957391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bf9e001bb9 cs:33 sp:7f4d23fa3858 ax:0 si:55bf9e06c328 di:ffffffffff600000 [29000103.457342] exe[916783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614ede00bb9 cs:33 sp:7f058211e858 ax:0 si:5614ede6b328 di:ffffffffff600000 [29000662.942134] exe[42251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cc5b4ebb9 cs:33 sp:7fbbbeaa0858 ax:0 si:557cc5bb931a di:ffffffffff600000 [29000682.632092] exe[987118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612d2aa3bb9 cs:33 sp:7f8497e8e858 ax:0 si:5612d2b0e31a di:ffffffffff600000 [29000753.149893] exe[46476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c882956bb9 cs:33 sp:7eed4ce4d858 ax:0 si:55c8829c131a di:ffffffffff600000 [29001023.459475] exe[87601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607f50cdbb9 cs:33 sp:7f73e1433858 ax:0 si:5607f5138328 di:ffffffffff600000 [29001024.379934] exe[87727] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d22fe37bb9 cs:33 sp:7f5ca190c858 ax:0 si:55d22fea2328 di:ffffffffff600000 [29001024.910275] exe[75420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d323cc4bb9 cs:33 sp:7f9ae44dd858 ax:0 si:55d323d2f328 di:ffffffffff600000 [29001025.668223] exe[76748] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeb647cbb9 cs:33 sp:7f3547a4b858 ax:0 si:55aeb64e7328 di:ffffffffff600000 [29001026.141488] exe[105028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607f50cdbb9 cs:33 sp:7f73e1433858 ax:0 si:5607f5138328 di:ffffffffff600000 [29002319.645989] potentially unexpected fatal signal 5. [29002319.651226] CPU: 81 PID: 140236 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29002319.663229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29002319.672902] RIP: 0033:0x7fffffffe062 [29002319.678278] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29002319.698807] RSP: 002b:000000c00004db08 EFLAGS: 00000297 [29002319.705822] RAX: 0000557d9eb96000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29002319.714732] RDX: 0000000000000003 RSI: 0000000000021000 RDI: 0000557d9eb96000 [29002319.723654] RBP: 000000c00004db90 R08: 0000000000000009 R09: 0000000008529000 [29002319.732581] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004da50 [29002319.741482] R13: 000000c000143008 R14: 000000c0003b2e00 R15: 0000000000021e9c [29002319.750426] FS: 00007f4f72f9e6c0 GS: 0000000000000000 [29007220.307904] exe[198984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb7614bbb9 cs:33 sp:7fd3fdb74858 ax:0 si:55bb761b631a di:ffffffffff600000 [29007265.124016] exe[172618] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f3bad8c3b38 ax:0 si:7f3bad8c3c70 di:19 [29008052.883587] potentially unexpected fatal signal 5. [29008052.888914] CPU: 43 PID: 173081 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29008052.900892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29008052.910536] RIP: 0033:0x7fffffffe062 [29008052.914595] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29008052.933792] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [29008052.940843] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29008052.948407] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29008052.955965] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [29008052.964889] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000029c18 [29008052.972449] R13: 000000c000030c00 R14: 000000c00047ce00 R15: 0000000000029e0f [29008052.980028] FS: 000000c000600098 GS: 0000000000000000 [29008830.254831] exe[274295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605b4da4bb9 cs:33 sp:7f708f5b9858 ax:0 si:5605b4e0f31a di:ffffffffff600000 [29009353.270710] exe[272836] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ed5e7788b38 ax:0 si:7ed5e7788c70 di:19 [29009948.617046] exe[304753] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f4f93521b38 ax:0 si:7f4f93521c70 di:19 [29010216.901323] exe[298812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0747cabb9 cs:33 sp:7ff8f8f1d858 ax:0 si:55e07483531a di:ffffffffff600000 [29010583.084226] exe[250384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ea9076bb9 cs:33 sp:7fcd559ed858 ax:0 si:562ea90e131a di:ffffffffff600000 [29010743.428034] exe[310170] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f96414dcb38 ax:0 si:7f96414dcc70 di:19 [29011145.026727] exe[268668] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f8ff94cab38 ax:0 si:7f8ff94cac70 di:19 [29011858.825050] exe[356360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654d8e22bb9 cs:33 sp:7f65f20af858 ax:0 si:5654d8e8d31a di:ffffffffff600000 [29013092.486744] exe[397896] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea36f96bb9 cs:33 sp:7ea03bf3aef8 ax:0 si:20000580 di:ffffffffff600000 [29013784.406995] exe[425259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641bfe8cbb9 cs:33 sp:7f1b6fda3858 ax:0 si:5641bfef734f di:ffffffffff600000 [29015313.610675] potentially unexpected fatal signal 5. [29015313.613999] potentially unexpected fatal signal 5. [29015313.614330] potentially unexpected fatal signal 5. [29015313.614336] CPU: 2 PID: 485352 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29015313.614338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29015313.614344] RIP: 0033:0x7fffffffe062 [29015313.614347] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29015313.614348] RSP: 002b:000000c0005e5b90 EFLAGS: 00000297 [29015313.614351] RAX: 0000000000078283 RBX: 0000000000000000 RCX: 00007fffffffe05a [29015313.614351] RDX: 0000000000000000 RSI: 000000c0005e6000 RDI: 0000000000012f00 [29015313.614352] RBP: 000000c0005e5c28 R08: 000000c00001e880 R09: 0000000000000000 [29015313.614353] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005e5c18 [29015313.614354] R13: 000000c0005f80c0 R14: 000000c000511dc0 R15: 000000000007677e [29015313.614355] FS: 0000000002057bb0 GS: 0000000000000000 [29015313.615894] CPU: 16 PID: 485338 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29015313.620681] potentially unexpected fatal signal 5. [29015313.620686] CPU: 6 PID: 485265 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29015313.620688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29015313.620694] RIP: 0033:0x7fffffffe062 [29015313.620698] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29015313.620699] RSP: 002b:000000c0005e5b90 EFLAGS: 00000297 [29015313.620702] RAX: 0000000000078280 RBX: 0000000000000000 RCX: 00007fffffffe05a [29015313.620703] RDX: 0000000000000000 RSI: 000000c0005e6000 RDI: 0000000000012f00 [29015313.620704] RBP: 000000c0005e5c28 R08: 000000c0005f62e0 R09: 0000000000000000 [29015313.620705] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005e5c18 [29015313.620706] R13: 000000c0005f80c0 R14: 000000c000511dc0 R15: 000000000007677e [29015313.620708] FS: 0000000002057bb0 GS: 0000000000000000 [29015313.621085] CPU: 66 PID: 485349 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29015313.621088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29015313.621094] RIP: 0033:0x7fffffffe062 [29015313.621096] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29015313.621098] RSP: 002b:000000c0005e5b90 EFLAGS: 00000297 [29015313.621100] RAX: 0000000000078282 RBX: 0000000000000000 RCX: 00007fffffffe05a [29015313.621103] RDX: 0000000000000000 RSI: 000000c0005e6000 RDI: 0000000000012f00 [29015313.622213] potentially unexpected fatal signal 5. [29015313.622219] CPU: 52 PID: 485298 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29015313.622221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29015313.622227] RIP: 0033:0x7fffffffe062 [29015313.622231] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29015313.622232] RSP: 002b:000000c0005e5b90 EFLAGS: 00000297 [29015313.622235] RAX: 0000000000078285 RBX: 0000000000000000 RCX: 00007fffffffe05a [29015313.622236] RDX: 0000000000000000 RSI: 000000c0005e6000 RDI: 0000000000012f00 [29015313.622237] RBP: 000000c0005e5c28 R08: 000000c000524880 R09: 0000000000000000 [29015313.622238] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005e5c18 [29015313.622238] R13: 000000c0005f80c0 R14: 000000c000511dc0 R15: 000000000007677e [29015313.622240] FS: 0000000002057bb0 GS: 0000000000000000 [29015313.626337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29015313.626340] RIP: 0033:0x7fffffffe062 [29015313.626343] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29015313.626344] RSP: 002b:000000c0005e5b90 EFLAGS: 00000297 [29015313.626345] RAX: 0000000000078281 RBX: 0000000000000000 RCX: 00007fffffffe05a [29015313.626346] RDX: 0000000000000000 RSI: 000000c0005e6000 RDI: 0000000000012f00 [29015313.626347] RBP: 000000c0005e5c28 R08: 000000c0004b43d0 R09: 0000000000000000 [29015313.626348] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005e5c18 [29015313.626348] R13: 000000c0005f80c0 R14: 000000c000511dc0 R15: 000000000007677e [29015313.626349] FS: 0000000002057bb0 GS: 0000000000000000 [29015313.652521] potentially unexpected fatal signal 5. [29015313.653198] RBP: 000000c0005e5c28 R08: 000000c0004b4880 R09: 0000000000000000 [29015313.672464] CPU: 54 PID: 485368 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29015313.672467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29015313.672476] RIP: 0033:0x7fffffffe062 [29015313.679465] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005e5c18 [29015313.679467] R13: 000000c0005f80c0 R14: 000000c000511dc0 R15: 000000000007677e [29015313.679469] FS: 0000000002057bb0 GS: 0000000000000000 [29015314.176292] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29015314.196913] RSP: 002b:000000c0005e5b90 EFLAGS: 00000297 [29015314.203942] RAX: 0000000000078284 RBX: 0000000000000000 RCX: 00007fffffffe05a [29015314.212867] RDX: 0000000000000000 RSI: 000000c0005e6000 RDI: 0000000000012f00 [29015314.221771] RBP: 000000c0005e5c28 R08: 000000c000524e20 R09: 0000000000000000 [29015314.230724] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005e5c18 [29015314.239678] R13: 000000c0005f80c0 R14: 000000c000511dc0 R15: 000000000007677e [29015314.248585] FS: 0000000002057bb0 GS: 0000000000000000 [29015475.010375] exe[488097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c93921bb9 cs:33 sp:7eed8ae84858 ax:0 si:557c9398c31a di:ffffffffff600000 [29016032.776505] exe[503648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d17c6fcbb9 cs:33 sp:7eaa47b91858 ax:0 si:55d17c76731a di:ffffffffff600000 [29016068.847510] exe[511195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56210e075bb9 cs:33 sp:7ff24c9d3858 ax:0 si:56210e0e031a di:ffffffffff600000 [29016259.375278] exe[507941] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ef811dfeb38 ax:0 si:7ef811dfec70 di:19 [29016976.661569] exe[488891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df47581bb9 cs:33 sp:7fb84effe858 ax:0 si:55df475ec31a di:ffffffffff600000 [29017267.934440] exe[489624] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd52235eb38 ax:0 si:7fd52235ec70 di:19 [29017268.332861] exe[488272] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f2e55cbeb38 ax:0 si:7f2e55cbec70 di:19 [29017269.296465] exe[514936] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f2e55cbeb38 ax:0 si:7f2e55cbec70 di:19 [29017342.977250] exe[496264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559237b1fbb9 cs:33 sp:7f03abd63858 ax:0 si:559237b8a31a di:ffffffffff600000 [29017360.553190] exe[533247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0961adbb9 cs:33 sp:7f1d8a516858 ax:0 si:55a09621834f di:ffffffffff600000 [29017593.313194] exe[495395] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fce1bc1fb38 ax:0 si:7fce1bc1fc70 di:19 [29017600.556913] exe[571264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d4576dbb9 cs:33 sp:7fd5ec70f858 ax:0 si:557d457d834f di:ffffffffff600000 [29018761.127472] exe[633337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55def5b8a337 cs:33 sp:7ecd6abbcef8 ax:4be00000 si:55def5c094be di:ffffffffff600000 [29022496.738130] potentially unexpected fatal signal 5. [29022496.743336] CPU: 48 PID: 810866 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29022496.755378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29022496.764179] potentially unexpected fatal signal 5. [29022496.765021] RIP: 0033:0x7fffffffe062 [29022496.770196] CPU: 8 PID: 805635 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29022496.770198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29022496.770204] RIP: 0033:0x7fffffffe062 [29022496.770208] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29022496.770209] RSP: 002b:000000c000643b90 EFLAGS: 00000297 [29022496.774201] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29022496.774203] RSP: 002b:000000c000643b90 EFLAGS: 00000297 [29022496.774205] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29022496.774206] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29022496.774206] RBP: 000000c000643c28 R08: 0000000000000000 R09: 0000000000000000 [29022496.774207] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000643c18 [29022496.774208] R13: 000000c00064c150 R14: 000000c00049c540 R15: 00000000000c3102 [29022496.774209] FS: 000000c000180898 GS: 0000000000000000 [29022496.816247] potentially unexpected fatal signal 5. [29022496.820286] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29022496.820287] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29022496.820288] RBP: 000000c000643c28 R08: 0000000000000000 R09: 0000000000000000 [29022496.820289] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000643c18 [29022496.820290] R13: 000000c00064c150 R14: 000000c00049c540 R15: 00000000000c3102 [29022496.820291] FS: 000000c000180898 GS: 0000000000000000 [29022496.962110] CPU: 53 PID: 799663 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29022496.975498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29022496.986574] RIP: 0033:0x7fffffffe062 [29022496.991919] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29022497.012465] RSP: 002b:000000c000643b90 EFLAGS: 00000297 [29022497.019510] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29022497.028477] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29022497.037388] RBP: 000000c000643c28 R08: 0000000000000000 R09: 0000000000000000 [29022497.047252] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000643c18 [29022497.056159] R13: 000000c00064c150 R14: 000000c00049c540 R15: 00000000000c3102 [29022497.065083] FS: 000000c000180898 GS: 0000000000000000 [29024618.707439] potentially unexpected fatal signal 5. [29024618.712643] CPU: 27 PID: 951578 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29024618.724622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29024618.734281] RIP: 0033:0x7fffffffe062 [29024618.738257] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29024618.757684] RSP: 002b:000000c000795be8 EFLAGS: 00000297 [29024618.763327] RAX: 00000000000e8948 RBX: 0000000000000000 RCX: 00007fffffffe05a [29024618.770866] RDX: 0000000000000000 RSI: 000000c000796000 RDI: 0000000000012f00 [29024618.779820] RBP: 000000c000795c80 R08: 000000c0004342e0 R09: 0000000000000000 [29024618.788842] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000795c70 [29024618.797782] R13: 000000c0002a9800 R14: 000000c0003248c0 R15: 00000000000e8510 [29024618.806712] FS: 000000c000588098 GS: 0000000000000000 [29025498.887420] exe[882667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e537f2bb9 cs:33 sp:7ea18affe858 ax:0 si:563e5385d31a di:ffffffffff600000 [29026096.914602] potentially unexpected fatal signal 5. [29026096.919815] CPU: 32 PID: 967929 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29026096.931821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29026096.941484] RIP: 0033:0x7fffffffe062 [29026096.945497] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29026096.964738] RSP: 002b:000000c000667b90 EFLAGS: 00000297 [29026096.971753] RAX: 0000000000006507 RBX: 0000000000000000 RCX: 00007fffffffe05a [29026096.980670] RDX: 0000000000000000 RSI: 000000c000668000 RDI: 0000000000012f00 [29026096.989592] RBP: 000000c000667c28 R08: 000000c0003f0010 R09: 0000000000000000 [29026096.998490] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000667c18 [29026097.006039] R13: 000000c000670c00 R14: 000000c00016e700 R15: 00000000000ec4a3 [29026097.014920] FS: 000000c00013a898 GS: 0000000000000000 [29026350.003885] exe[31465] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635047aebb9 cs:33 sp:7fc03313c858 ax:0 si:563504819328 di:ffffffffff600000 [29027095.877753] exe[87703] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563da3366337 cs:33 sp:7f911469eef8 ax:4be00000 si:563da33e54be di:ffffffffff600000 [29027109.445989] exe[58074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56336b0d2bb9 cs:33 sp:7fc7cedc3858 ax:0 si:56336b13d328 di:ffffffffff600000 [29028561.794018] exe[175653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0436abb9 cs:33 sp:7fe1464bf858 ax:0 si:556c043d531a di:ffffffffff600000 [29028568.162499] exe[180339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e91c6f4bb9 cs:33 sp:7f6b9654a858 ax:0 si:55e91c75f31a di:ffffffffff600000 [29028597.235257] exe[180547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc37211bb9 cs:33 sp:7f19a1e46858 ax:0 si:55bc3727c31a di:ffffffffff600000 [29028731.697247] exe[176776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deda1f6bb9 cs:33 sp:7f4e5327d858 ax:0 si:55deda26131a di:ffffffffff600000 [29028732.404094] exe[138602] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bebfdebb9 cs:33 sp:7eb9b1b00858 ax:0 si:557bec04931a di:ffffffffff600000 [29028741.583034] exe[185892] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561347d84bb9 cs:33 sp:7f455935f858 ax:0 si:561347def31a di:ffffffffff600000 [29028742.402677] exe[187490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a67f9f3bb9 cs:33 sp:7ee8e9445858 ax:0 si:55a67fa5e31a di:ffffffffff600000 [29028871.507225] exe[169557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c6b28f9bb9 cs:33 sp:7f15ada91858 ax:0 si:55c6b296431a di:ffffffffff600000 [29029648.344890] exe[209711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557750608bb9 cs:33 sp:7f58ee102858 ax:0 si:55775067331a di:ffffffffff600000 [29029713.520822] potentially unexpected fatal signal 5. [29029713.521241] potentially unexpected fatal signal 5. [29029713.526090] CPU: 67 PID: 229076 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29029713.526791] potentially unexpected fatal signal 5. [29029713.526795] CPU: 18 PID: 229130 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29029713.526797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29029713.526803] RIP: 0033:0x7fffffffe062 [29029713.526807] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29029713.526809] RSP: 002b:000000c00065db90 EFLAGS: 00000297 [29029713.526811] RAX: 000000000003b02f RBX: 0000000000000000 RCX: 00007fffffffe05a [29029713.526812] RDX: 0000000000000000 RSI: 000000c00065e000 RDI: 0000000000012f00 [29029713.526813] RBP: 000000c00065dc28 R08: 000000c0009924c0 R09: 0000000000000000 [29029713.526814] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00065dc18 [29029713.526815] R13: 000000c000715050 R14: 000000c00050a700 R15: 0000000000037e7d [29029713.526816] FS: 000000c000180098 GS: 0000000000000000 [29029713.531293] CPU: 51 PID: 229113 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29029713.531302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29029713.531314] RIP: 0033:0x7fffffffe062 [29029713.543364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29029713.543368] RIP: 0033:0x7fffffffe062 [29029713.543371] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29029713.543381] RSP: 002b:000000c00065db90 EFLAGS: 00000297 [29029713.548564] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29029713.560594] RAX: 000000000003b031 RBX: 0000000000000000 RCX: 00007fffffffe05a [29029713.560595] RDX: 0000000000000000 RSI: 000000c00065e000 RDI: 0000000000012f00 [29029713.560596] RBP: 000000c00065dc28 R08: 000000c0008441f0 R09: 0000000000000000 [29029713.560601] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00065dc18 [29029713.570250] RSP: 002b:000000c00065db90 EFLAGS: 00000297 [29029713.570254] RAX: 000000000003b030 RBX: 0000000000000000 RCX: 00007fffffffe05a [29029713.570255] RDX: 0000000000000000 RSI: 000000c00065e000 RDI: 0000000000012f00 [29029713.570256] RBP: 000000c00065dc28 R08: 000000c000798b50 R09: 0000000000000000 [29029713.570257] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00065dc18 [29029713.570258] R13: 000000c000715050 R14: 000000c00050a700 R15: 0000000000037e7d [29029713.570260] FS: 000000c000180098 GS: 0000000000000000 [29029713.824027] R13: 000000c000715050 R14: 000000c00050a700 R15: 0000000000037e7d [29029713.833059] FS: 000000c000180098 GS: 0000000000000000 [29030610.894847] exe[251617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556277ee0bb9 cs:33 sp:7f0b0e2f1858 ax:0 si:556277f4b31a di:ffffffffff600000 [29030633.761968] exe[250129] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556277ee0bb9 cs:33 sp:7f0b0e312858 ax:0 si:556277f4b31a di:ffffffffff600000 [29030906.943060] potentially unexpected fatal signal 5. [29030906.944791] potentially unexpected fatal signal 5. [29030906.948279] CPU: 74 PID: 280432 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29030906.948283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29030906.948288] RIP: 0033:0x7fffffffe062 [29030906.948293] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29030906.948296] RSP: 002b:000000c00069bb90 EFLAGS: 00000297 [29030906.948298] RAX: 000000000004e21c RBX: 0000000000000000 RCX: 00007fffffffe05a [29030906.948299] RDX: 0000000000000000 RSI: 000000c00069c000 RDI: 0000000000012f00 [29030906.948300] RBP: 000000c00069bc28 R08: 000000c000328010 R09: 0000000000000000 [29030906.948301] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00069bc18 [29030906.948302] R13: 000000c00012da70 R14: 000000c000174e00 R15: 000000000004475e [29030906.948302] FS: 000000c0005b8098 GS: 0000000000000000 [29030907.050116] CPU: 36 PID: 284569 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29030907.062121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29030907.071760] RIP: 0033:0x7fffffffe062 [29030907.075752] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29030907.094931] RSP: 002b:000000c00069bb90 EFLAGS: 00000297 [29030907.101927] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29030907.109465] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29030907.118383] RBP: 000000c00069bc28 R08: 0000000000000000 R09: 0000000000000000 [29030907.127305] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00069bc18 [29030907.136213] R13: 000000c00012da70 R14: 000000c000174e00 R15: 000000000004475e [29030907.145136] FS: 000000c0005b8098 GS: 0000000000000000 [29031992.017880] exe[369488] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56124af25337 cs:33 sp:7f4767f36ef8 ax:4be00000 si:56124afa44be di:ffffffffff600000 [29033332.560163] potentially unexpected fatal signal 5. [29033332.565386] CPU: 23 PID: 443382 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29033332.577387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29033332.587050] RIP: 0033:0x7fffffffe062 [29033332.591052] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29033332.610266] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [29033332.617313] RAX: 00000000000718f9 RBX: 0000000000000000 RCX: 00007fffffffe05a [29033332.624870] RDX: 0000000000000000 RSI: 000000c00004e000 RDI: 0000000000012f00 [29033332.632395] RBP: 000000c00004db30 R08: 000000c0002a43d0 R09: 0000000000000000 [29033332.641342] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00004d9c8 [29033332.650292] R13: 000000c000588008 R14: 000000c00058a700 R15: 000000000006c3df [29033332.659255] FS: 00007f10352fe6c0 GS: 0000000000000000 [29034503.053192] potentially unexpected fatal signal 5. [29034503.058409] CPU: 90 PID: 533751 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29034503.070390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29034503.080101] RIP: 0033:0x7fffffffe062 [29034503.084078] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29034503.103384] RSP: 002b:000000c0005f3b90 EFLAGS: 00000297 [29034503.110373] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29034503.117943] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29034503.126847] RBP: 000000c0005f3c28 R08: 0000000000000000 R09: 0000000000000000 [29034503.135778] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005f3c18 [29034503.144713] R13: 000000c0006040c0 R14: 000000c00023f500 R15: 0000000000082063 [29034503.153617] FS: 000000c000180898 GS: 0000000000000000 [29036896.924758] potentially unexpected fatal signal 5. [29036896.929993] CPU: 28 PID: 711973 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29036896.942132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29036896.951855] RIP: 0033:0x7fffffffe062 [29036896.955865] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29036896.976427] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [29036896.983445] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29036896.990997] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29036896.999904] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [29036897.008824] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000029c18 [29036897.017737] R13: 000000c00062ba70 R14: 000000c000183a40 R15: 00000000000a6515 [29036897.026666] FS: 000000c0002f8098 GS: 0000000000000000 [29037291.062767] exe[743476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641872b3bb9 cs:33 sp:7eac5fbfa858 ax:0 si:56418731e34f di:ffffffffff600000 [29037460.927386] exe[754338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9eadfe337 cs:33 sp:7f61c0294ef8 ax:4be00000 si:55f9eae7d4be di:ffffffffff600000 [29038557.989766] potentially unexpected fatal signal 5. [29038557.995078] CPU: 53 PID: 831836 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29038558.007231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29038558.016905] RIP: 0033:0x7fffffffe062 [29038558.020980] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29038558.041679] RSP: 002b:000000c00004db08 EFLAGS: 00000297 [29038558.048623] RAX: 00007f3dde4c9000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29038558.057533] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007f3dde4c9000 [29038558.066456] RBP: 000000c00004db90 R08: 0000000000000009 R09: 0000000000dfb000 [29038558.075366] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004da50 [29038558.084318] R13: 0000000002d50280 R14: 000000c0003d3c00 R15: 00000000000caed2 [29038558.093245] FS: 0000000005c543c0 GS: 0000000000000000 [29038704.713552] exe[840463] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f952590bb9 cs:33 sp:7fda2ebcf858 ax:0 si:55f9525fb31a di:ffffffffff600000 [29039859.678137] exe[732322] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df096cfbb9 cs:33 sp:7eb29c0ed858 ax:0 si:55df0973a34f di:ffffffffff600000 [29040738.449883] exe[964072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb5b61cbb9 cs:33 sp:7fc8b7e5d858 ax:0 si:55bb5b68731a di:ffffffffff600000 [29041065.929030] exe[980341] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d16e0337 cs:33 sp:7f41496aaef8 ax:4be00000 si:5587d175f4be di:ffffffffff600000 [29041598.715371] exe[947752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564aeb04ebb9 cs:33 sp:7f7de9aebef8 ax:0 si:200003c0 di:ffffffffff600000 [29042850.952501] exe[86553] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a06ad8abb9 cs:33 sp:7f37e02b6858 ax:0 si:55a06adf531a di:ffffffffff600000 [29054359.638871] exe[516251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a375f35bb9 cs:33 sp:7f135898f858 ax:0 si:55a375fa031a di:ffffffffff600000 [29054397.837707] exe[532022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562392788bb9 cs:33 sp:7f22c9b37858 ax:0 si:5623927f331a di:ffffffffff600000 [29058146.314465] exe[578926] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f24568b0b38 ax:0 si:7f24568b0c70 di:19 [29058630.323548] exe[564566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b916a92bb9 cs:33 sp:7f86023a8858 ax:0 si:55b916afd328 di:ffffffffff600000 [29058631.234518] exe[564069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e68fd4bb9 cs:33 sp:7f4a25fe3858 ax:0 si:560e6903f328 di:ffffffffff600000 [29058631.803980] exe[675919] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650ac2e1bb9 cs:33 sp:7fd562f1f858 ax:0 si:5650ac34c328 di:ffffffffff600000 [29058632.479526] exe[565695] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650ac2e1bb9 cs:33 sp:7fd562f1f858 ax:0 si:5650ac34c328 di:ffffffffff600000 [29058633.059644] exe[565648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e37d875bb9 cs:33 sp:7fe989dfe858 ax:0 si:55e37d8e0328 di:ffffffffff600000 [29059287.076719] exe[717696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f803b42bb9 cs:33 sp:7fe45b85fef8 ax:0 si:20003380 di:ffffffffff600000 [29059855.238677] exe[717900] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f8d4c5ddb38 ax:0 si:7f8d4c5ddc70 di:19 [29060136.900824] exe[730553] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fcdb3dc9b38 ax:0 si:7fcdb3dc9c70 di:19 [29060289.703401] exe[708495] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fca37b44b38 ax:0 si:7fca37b44c70 di:19 [29061608.910844] exe[763728] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648b924abb9 cs:33 sp:7fd59cdfe858 ax:0 si:5648b92b534f di:ffffffffff600000 [29062234.186299] potentially unexpected fatal signal 5. [29062234.191514] CPU: 25 PID: 824993 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29062234.203495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29062234.213130] RIP: 0033:0x7fffffffe062 [29062234.217091] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29062234.236323] RSP: 002b:000000c00079fbe8 EFLAGS: 00000297 [29062234.241956] RAX: 00000000000c984d RBX: 0000000000000000 RCX: 00007fffffffe05a [29062234.250880] RDX: 0000000000000000 RSI: 000000c0007a0000 RDI: 0000000000012f00 [29062234.258428] RBP: 000000c00079fc80 R08: 000000c000b04100 R09: 0000000000000000 [29062234.266029] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00079fc70 [29062234.274932] R13: 000000c0007c0800 R14: 000000c00038f340 R15: 00000000000c968b [29062234.283886] FS: 000000000231aaf0 GS: 0000000000000000 [29062660.511864] potentially unexpected fatal signal 5. [29062660.517102] CPU: 60 PID: 838676 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29062660.529094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29062660.538730] RIP: 0033:0x7fffffffe062 [29062660.542759] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29062660.562043] RSP: 002b:000000c00069bb90 EFLAGS: 00000297 [29062660.569048] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29062660.577993] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29062660.586943] RBP: 000000c00069bc28 R08: 0000000000000000 R09: 0000000000000000 [29062660.596029] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00069bc18 [29062660.604956] R13: 000000c0006a4c00 R14: 000000c00047ddc0 R15: 00000000000cc5c6 [29062660.613896] FS: 000000c000180098 GS: 0000000000000000 [29065539.329356] exe[895555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620b16d9bb9 cs:33 sp:7efb813f3ef8 ax:0 si:20000080 di:ffffffffff600000 [29065645.249818] exe[984148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55db9d2b7bb9 cs:33 sp:7f45be449ef8 ax:0 si:20000400 di:ffffffffff600000 [29065661.677621] exe[937576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb239b0bb9 cs:33 sp:7ea1b1ab7ef8 ax:0 si:20000080 di:ffffffffff600000 [29065661.709978] exe[936417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb239b0bb9 cs:33 sp:7ea1b1ab7ef8 ax:0 si:20000080 di:ffffffffff600000 [29065661.743502] exe[990076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb239b0bb9 cs:33 sp:7ea1b1ab7ef8 ax:0 si:20000080 di:ffffffffff600000 [29065661.786610] exe[990076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb239b0bb9 cs:33 sp:7ea1b1ab7ef8 ax:0 si:20000080 di:ffffffffff600000 [29065661.827170] exe[935992] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb239b0bb9 cs:33 sp:7ea1b1ab7ef8 ax:0 si:20000080 di:ffffffffff600000 [29065661.868398] exe[990076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb239b0bb9 cs:33 sp:7ea1b1ab7ef8 ax:0 si:20000080 di:ffffffffff600000 [29065661.901313] exe[934780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb239b0bb9 cs:33 sp:7ea1b1ab7ef8 ax:0 si:20000080 di:ffffffffff600000 [29065661.935248] exe[936417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb239b0bb9 cs:33 sp:7ea1b1ab7ef8 ax:0 si:20000080 di:ffffffffff600000 [29065661.964212] exe[936417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb239b0bb9 cs:33 sp:7ea1b1ab7ef8 ax:0 si:20000080 di:ffffffffff600000 [29065661.995418] exe[990076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb239b0bb9 cs:33 sp:7ea1b1ab7ef8 ax:0 si:20000080 di:ffffffffff600000 [29071405.818016] warn_bad_vsyscall: 29 callbacks suppressed [29071405.818020] exe[242193] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561554a13bb9 cs:33 sp:7f65d8fd2858 ax:0 si:561554a7e34f di:ffffffffff600000 [29074660.489493] potentially unexpected fatal signal 5. [29074660.494739] CPU: 32 PID: 402304 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29074660.506710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29074660.516349] RIP: 0033:0x7fffffffe062 [29074660.520325] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29074660.539602] RSP: 002b:000000c000021b90 EFLAGS: 00000297 [29074660.545253] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29074660.552845] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29074660.561820] RBP: 000000c000021c28 R08: 0000000000000000 R09: 0000000000000000 [29074660.570745] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000021c18 [29074660.579665] R13: 000000c000026c00 R14: 000000c00059a8c0 R15: 0000000000061d04 [29074660.588601] FS: 000000000205bbb0 GS: 0000000000000000 [29074702.914058] exe[417645] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d0a448bb9 cs:33 sp:7f327db61858 ax:0 si:563d0a4b3328 di:ffffffffff600000 [29075108.876614] exe[389191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565413e7cbb9 cs:33 sp:7fde8edfe858 ax:0 si:565413ee731a di:ffffffffff600000 [29075495.036432] exe[449391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561210449bb9 cs:33 sp:7f14ebd0aef8 ax:0 si:200040c0 di:ffffffffff600000 [29075894.153291] exe[475772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ee86c7bb9 cs:33 sp:7ecd2e1fe858 ax:0 si:564ee873231a di:ffffffffff600000 [29079177.381931] exe[667596] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca13e1dbb9 cs:33 sp:7f828bb2d858 ax:0 si:55ca13e8831a di:ffffffffff600000 [29080019.776915] exe[709579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f2dc4f337 cs:33 sp:7ff6ba13def8 ax:4be00000 si:559f2dcce4be di:ffffffffff600000 [29080545.977097] exe[745684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e2e6f4bb9 cs:33 sp:7fb876a92858 ax:0 si:564e2e75f34f di:ffffffffff600000 [29081474.084169] exe[796024] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610e53f5bb9 cs:33 sp:7eb443c8e858 ax:0 si:5610e546031a di:ffffffffff600000 [29083828.490278] exe[913071] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f0bfa6bb9 cs:33 sp:7fb04e0c0858 ax:0 si:558f0c011328 di:ffffffffff600000 [29083841.169172] exe[809260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b1da43bb9 cs:33 sp:7ef958f6e858 ax:0 si:555b1daae328 di:ffffffffff600000 [29083868.938063] exe[843829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b96aefbb9 cs:33 sp:7ed02929c858 ax:0 si:560b96b5a328 di:ffffffffff600000 [29083869.863535] exe[935059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc84bd1bb9 cs:33 sp:7f66eae48858 ax:0 si:55bc84c3c328 di:ffffffffff600000 [29083879.390359] exe[938820] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d159a37bb9 cs:33 sp:7f7a3050d858 ax:0 si:55d159aa2328 di:ffffffffff600000 [29083883.592277] exe[921905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b856202bb9 cs:33 sp:7f41779fe858 ax:0 si:55b85626d328 di:ffffffffff600000 [29083914.923675] exe[923774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55866e33cbb9 cs:33 sp:7fd68e5e0858 ax:0 si:55866e3a7328 di:ffffffffff600000 [29084177.700428] exe[809357] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651a8265bb9 cs:33 sp:7ec7095b2858 ax:0 si:5651a82d031a di:ffffffffff600000 [29084184.170038] exe[922484] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b151d9dbb9 cs:33 sp:7f2995f44858 ax:0 si:55b151e08328 di:ffffffffff600000 [29085467.765490] exe[3259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556649499bb9 cs:33 sp:7f3a01cbc858 ax:0 si:556649504328 di:ffffffffff600000 [29085469.002190] exe[994159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630ed585bb9 cs:33 sp:7fadc65bc858 ax:0 si:5630ed5f0328 di:ffffffffff600000 [29085472.191534] exe[994441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5594dbfffbb9 cs:33 sp:7fb83f8b9858 ax:0 si:5594dc06a328 di:ffffffffff600000 [29085574.691809] potentially unexpected fatal signal 5. [29085574.697058] CPU: 14 PID: 10275 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29085574.708988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29085574.718650] RIP: 0033:0x7fffffffe062 [29085574.722645] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29085574.741838] RSP: 002b:000000c00002bb90 EFLAGS: 00000297 [29085574.747498] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29085574.756428] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29085574.765349] RBP: 000000c00002bc28 R08: 0000000000000000 R09: 0000000000000000 [29085574.774273] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00002bc18 [29085574.783174] R13: 000000c00016ba70 R14: 000000c000166540 R15: 0000000000002055 [29085574.792111] FS: 000000c000180898 GS: 0000000000000000 [29086170.503248] exe[60848] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fb1daee0b38 ax:0 si:7fb1daee0c70 di:19 [29086222.098159] exe[43864] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fbf546ecb38 ax:0 si:7fbf546ecc70 di:19 [29086227.216775] exe[45605] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648d66c4bb9 cs:33 sp:7f745369f858 ax:0 si:5648d672f328 di:ffffffffff600000 [29086247.670050] exe[63403] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ea61b783b38 ax:0 si:7ea61b783c70 di:19 [29086255.110239] exe[61817] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f1b36966b38 ax:0 si:7f1b36966c70 di:19 [29086256.689494] exe[43217] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7face8aa3b38 ax:0 si:7face8aa3c70 di:19 [29086265.976131] exe[61144] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ed03993eb38 ax:0 si:7ed03993ec70 di:19 [29086571.636909] exe[73173] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fcdcba2cb38 ax:0 si:7fcdcba2cc70 di:19 [29086683.685850] exe[30885] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fc189234b38 ax:0 si:7fc189234c70 di:19 [29087727.102507] potentially unexpected fatal signal 11. [29087727.107807] CPU: 93 PID: 224996 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29087727.119808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29087727.129458] RIP: 0033:0x5617473a4b8b [29087727.133439] Code: ea 12 00 48 8d 34 19 48 39 d5 48 89 75 60 0f 95 c2 48 29 d8 48 83 c1 10 0f b6 d2 48 83 c8 01 48 c1 e2 02 48 09 da 48 83 ca 01 <48> 89 51 f8 48 89 46 08 eb 80 48 8d 0d 01 5e 09 00 48 8d 15 05 70 [29087727.152669] RSP: 002b:00007f67107fa2f0 EFLAGS: 00010206 [29087727.159668] RAX: 00000000000187f1 RBX: 0000000000008040 RCX: 00005617480397e0 [29087727.168602] RDX: 0000000000008041 RSI: 0000561748041810 RDI: 0000000000000004 [29087727.177555] RBP: 00005617474d3660 R08: 00000000319cf32c R09: 0000000000000018 [29087727.186508] R10: 0000000000001000 R11: 0000000000000802 R12: 0000000000008030 [29087727.195435] R13: 0000000000000076 R14: 00005617474d36c0 R15: 0000000000000000 [29087727.204346] FS: 0000561748038480 GS: 0000000000000000 [29090209.201068] potentially unexpected fatal signal 5. [29090209.206860] CPU: 21 PID: 283526 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29090209.219041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29090209.228689] RIP: 0033:0x7fffffffe062 [29090209.232657] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29090209.251850] RSP: 002b:000000c0006dfbe8 EFLAGS: 00000297 [29090209.257549] RAX: 0000562490512000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29090209.266453] RDX: 0000000000000001 RSI: 000000000006e000 RDI: 0000562490512000 [29090209.275360] RBP: 000000c0006dfc80 R08: 0000000000000009 R09: 0000000008400000 [29090209.282925] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0006dfc70 [29090209.291884] R13: 000000c0002a9800 R14: 000000c00059cc40 R15: 0000000000045218 [29090209.300789] FS: 000000000231aaf0 GS: 0000000000000000 [29091202.520910] potentially unexpected fatal signal 5. [29091202.526212] CPU: 80 PID: 200194 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29091202.538191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29091202.547809] RIP: 0033:0x7fffffffe062 [29091202.551917] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29091202.571149] RSP: 002b:000000c0005e3b90 EFLAGS: 00000297 [29091202.578153] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29091202.585697] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29091202.594608] RBP: 000000c0005e3c28 R08: 0000000000000000 R09: 0000000000000000 [29091202.602180] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005e3c18 [29091202.609730] R13: 000000c0005fa0c0 R14: 000000c000502700 R15: 00000000000304c5 [29091202.617367] FS: 000000000205bbb0 GS: 0000000000000000 [29095296.267954] potentially unexpected fatal signal 11. [29095296.273290] CPU: 58 PID: 409627 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29095296.285483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29095296.295124] RIP: 0033:0x555d928f9b8b [29095296.299090] Code: ea 12 00 48 8d 34 19 48 39 d5 48 89 75 60 0f 95 c2 48 29 d8 48 83 c1 10 0f b6 d2 48 83 c8 01 48 c1 e2 02 48 09 da 48 83 ca 01 <48> 89 51 f8 48 89 46 08 eb 80 48 8d 0d 01 5e 09 00 48 8d 15 05 70 [29095296.318315] RSP: 002b:00007f73e8ba22f0 EFLAGS: 00010206 [29095296.325339] RAX: 00000000000187f1 RBX: 0000000000008040 RCX: 0000555d9358e7e0 [29095296.334368] RDX: 0000000000008041 RSI: 0000555d93596810 RDI: 0000000000000004 [29095296.343304] RBP: 0000555d92a28660 R08: 0000000019c3de6e R09: 0000000000000012 [29095296.352271] R10: 0000000000001000 R11: 0000000000000802 R12: 0000000000008030 [29095296.361271] R13: 0000000000000076 R14: 0000555d92a286c0 R15: 0000000000000000 [29095296.370190] FS: 0000555d9358d480 GS: 0000000000000000 [29098476.157523] potentially unexpected fatal signal 5. [29098476.162770] CPU: 63 PID: 479799 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29098476.174856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29098476.184536] RIP: 0033:0x7fffffffe062 [29098476.188530] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29098476.207756] RSP: 002b:000000c0005c7b90 EFLAGS: 00000297 [29098476.214800] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29098476.223736] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29098476.233682] RBP: 000000c0005c7c28 R08: 0000000000000000 R09: 0000000000000000 [29098476.242617] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005c7c18 [29098476.251696] R13: 000000c0005ce0c0 R14: 000000c00017e540 R15: 0000000000075160 [29098476.260597] FS: 000000c00013b898 GS: 0000000000000000 [29098848.056369] exe[494755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624f4369bb9 cs:33 sp:7f819572c858 ax:0 si:5624f43d431a di:ffffffffff600000 [29099676.133957] potentially unexpected fatal signal 5. [29099676.139205] CPU: 61 PID: 536965 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29099676.151195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29099676.160849] RIP: 0033:0x7fffffffe062 [29099676.164887] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29099676.185525] RSP: 002b:000000c0005b5b90 EFLAGS: 00000297 [29099676.191197] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29099676.198772] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29099676.206859] RBP: 000000c0005b5c28 R08: 0000000000000000 R09: 0000000000000000 [29099676.216403] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005b5c18 [29099676.223992] R13: 000000c0005c20c0 R14: 000000c000166c40 R15: 000000000007f4a5 [29099676.232894] FS: 000000000205bbb0 GS: 0000000000000000 [29101061.420117] exe[541055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640a407dbb9 cs:33 sp:7fd11a36e858 ax:0 si:5640a40e8328 di:ffffffffff600000 [29101061.911890] exe[536678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56256ce6cbb9 cs:33 sp:7faf4729e858 ax:0 si:56256ced7328 di:ffffffffff600000 [29101062.334430] exe[491198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55746ba8ebb9 cs:33 sp:7fe5aa777858 ax:0 si:55746baf9328 di:ffffffffff600000 [29101062.796355] exe[499722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56256ce6cbb9 cs:33 sp:7faf4729e858 ax:0 si:56256ced7328 di:ffffffffff600000 [29101063.475206] exe[495456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640a407dbb9 cs:33 sp:7fd11a36e858 ax:0 si:5640a40e8328 di:ffffffffff600000 [29102311.784879] exe[635310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e875eeb337 cs:33 sp:7fbcb4e65ef8 ax:4be00000 si:55e875f6a4be di:ffffffffff600000 [29104236.188139] potentially unexpected fatal signal 5. [29104236.193382] CPU: 87 PID: 725026 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29104236.205378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29104236.215012] RIP: 0033:0x7fffffffe062 [29104236.219016] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29104236.239606] RSP: 002b:000000c000759be8 EFLAGS: 00000297 [29104236.246873] RAX: 0000560321000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29104236.255803] RDX: 0000000000000001 RSI: 0000000000012000 RDI: 0000560321000000 [29104236.264718] RBP: 000000c000759c80 R08: 0000000000000009 R09: 0000000008200000 [29104236.272290] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000759c70 [29104236.279899] R13: 000000c000459800 R14: 000000c000592a80 R15: 00000000000b0b99 [29104236.288830] FS: 000000c00013b098 GS: 0000000000000000 [29104727.714248] exe[737593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f981b1bb9 cs:33 sp:7efff39fe858 ax:0 si:558f9821c31a di:ffffffffff600000 [29104856.413282] exe[747306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56198bbc0bb9 cs:33 sp:7f759cca7858 ax:0 si:56198bc2b31a di:ffffffffff600000 [29104856.440226] exe[737678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56198bbc0bb9 cs:33 sp:7f759cca7858 ax:0 si:56198bc2b31a di:ffffffffff600000 [29105154.620438] exe[746767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa927b7337 cs:33 sp:7f9050d31ef8 ax:4be00000 si:55aa928364be di:ffffffffff600000 [29108069.670163] potentially unexpected fatal signal 5. [29108069.675390] CPU: 26 PID: 870085 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29108069.687399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29108069.697086] RIP: 0033:0x7fffffffe062 [29108069.701084] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29108069.720341] RSP: 002b:000000c000673b90 EFLAGS: 00000297 [29108069.727366] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29108069.734998] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29108069.743923] RBP: 000000c000673c28 R08: 0000000000000000 R09: 0000000000000000 [29108069.752852] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000673c18 [29108069.761780] R13: 000000c000014150 R14: 000000c00015f500 R15: 00000000000cfa71 [29108069.770681] FS: 000000c00013b098 GS: 0000000000000000 [29108309.003712] exe[932799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d64f2cd337 cs:33 sp:7f8ffe966ef8 ax:4be00000 si:55d64f34c4be di:ffffffffff600000 [29108525.721271] exe[866647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3a3a72337 cs:33 sp:7ed2210baef8 ax:4be00000 si:55f3a3af14be di:ffffffffff600000 [29109095.284804] exe[935352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e91750bb9 cs:33 sp:7ffb7cd17858 ax:0 si:561e917bb34f di:ffffffffff600000 [29110476.201321] potentially unexpected fatal signal 5. [29110476.201932] potentially unexpected fatal signal 5. [29110476.206539] CPU: 93 PID: 40052 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29110476.211704] CPU: 95 PID: 40150 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29110476.211705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29110476.211709] RIP: 0033:0x7fffffffe062 [29110476.211711] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29110476.211712] RSP: 002b:000000c0005fdb90 EFLAGS: 00000297 [29110476.211714] RAX: 000000000000bfee RBX: 0000000000000000 RCX: 00007fffffffe05a [29110476.211714] RDX: 0000000000000000 RSI: 000000c0005fe000 RDI: 0000000000012f00 [29110476.211715] RBP: 000000c0005fdc28 R08: 000000c0001fe5b0 R09: 0000000000000000 [29110476.211715] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005fdc18 [29110476.211716] R13: 000000c0006240c0 R14: 000000c000508a80 R15: 0000000000009c61 [29110476.211717] FS: 000000c00013a898 GS: 0000000000000000 [29110476.321518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29110476.332586] RIP: 0033:0x7fffffffe062 [29110476.337960] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29110476.358643] RSP: 002b:000000c0005fdb90 EFLAGS: 00000297 [29110476.365761] RAX: 000000000000bfec RBX: 0000000000000000 RCX: 00007fffffffe05a [29110476.374678] RDX: 0000000000000000 RSI: 000000c0005fe000 RDI: 0000000000012f00 [29110476.382242] RBP: 000000c0005fdc28 R08: 000000c0006d4010 R09: 0000000000000000 [29110476.391211] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005fdc18 [29110476.400140] R13: 000000c0006240c0 R14: 000000c000508a80 R15: 0000000000009c61 [29110476.409092] FS: 000000c00013a898 GS: 0000000000000000 [29111676.430760] potentially unexpected fatal signal 5. [29111676.432760] potentially unexpected fatal signal 5. [29111676.433517] potentially unexpected fatal signal 5. [29111676.433524] CPU: 63 PID: 113441 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29111676.433526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29111676.433532] RIP: 0033:0x7fffffffe062 [29111676.433536] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29111676.433537] RSP: 002b:000000c000209b90 EFLAGS: 00000297 [29111676.433539] RAX: 000000000001c647 RBX: 0000000000000000 RCX: 00007fffffffe05a [29111676.433540] RDX: 0000000000000000 RSI: 000000c00020a000 RDI: 0000000000012f00 [29111676.433541] RBP: 000000c000209c28 R08: 000000c00012c970 R09: 0000000000000000 [29111676.433542] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000209c18 [29111676.433543] R13: 000000c0001aac00 R14: 000000c00016a8c0 R15: 000000000001bac2 [29111676.433544] FS: 000000c00013b898 GS: 0000000000000000 [29111676.436006] CPU: 61 PID: 113467 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29111676.436011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29111676.437532] potentially unexpected fatal signal 5. [29111676.437540] CPU: 17 PID: 113431 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29111676.437542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29111676.437550] RIP: 0033:0x7fffffffe062 [29111676.437556] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29111676.437558] RSP: 002b:000000c000209b90 EFLAGS: 00000297 [29111676.437561] RAX: 000000000001c649 RBX: 0000000000000000 RCX: 00007fffffffe05a [29111676.437562] RDX: 0000000000000000 RSI: 000000c00020a000 RDI: 0000000000012f00 [29111676.437563] RBP: 000000c000209c28 R08: 000000c000574970 R09: 0000000000000000 [29111676.437565] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000209c18 [29111676.437566] R13: 000000c0001aac00 R14: 000000c00016a8c0 R15: 000000000001bac2 [29111676.437567] FS: 000000c00013b898 GS: 0000000000000000 [29111676.441234] CPU: 55 PID: 113404 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29111676.441236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29111676.441243] RIP: 0033:0x7fffffffe062 [29111676.441246] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29111676.441248] RSP: 002b:000000c000209b90 EFLAGS: 00000297 [29111676.441251] RAX: 000000000001c648 RBX: 0000000000000000 RCX: 00007fffffffe05a [29111676.441251] RDX: 0000000000000000 RSI: 000000c00020a000 RDI: 0000000000012f00 [29111676.441255] RBP: 000000c000209c28 R08: 000000c00012c1f0 R09: 0000000000000000 [29111676.446458] RIP: 0033:0x7fffffffe062 [29111676.446463] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29111676.446465] RSP: 002b:000000c000209b90 EFLAGS: 00000297 [29111676.446467] RAX: 000000000001c646 RBX: 0000000000000000 RCX: 00007fffffffe05a [29111676.446468] RDX: 0000000000000000 RSI: 000000c00020a000 RDI: 0000000000012f00 [29111676.446469] RBP: 000000c000209c28 R08: 000000c00012cd30 R09: 0000000000000000 [29111676.446470] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000209c18 [29111676.446471] R13: 000000c0001aac00 R14: 000000c00016a8c0 R15: 000000000001bac2 [29111676.446472] FS: 000000c00013b898 GS: 0000000000000000 [29111676.463026] potentially unexpected fatal signal 5. [29111676.468116] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000209c18 [29111676.468120] R13: 000000c0001aac00 R14: 000000c00016a8c0 R15: 000000000001bac2 [29111676.472139] CPU: 26 PID: 113360 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29111676.472142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29111676.472147] RIP: 0033:0x7fffffffe062 [29111676.472150] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29111676.472151] RSP: 002b:000000c000209b90 EFLAGS: 00000297 [29111676.472153] RAX: 000000000001c641 RBX: 0000000000000000 RCX: 00007fffffffe05a [29111676.472154] RDX: 0000000000000000 RSI: 000000c00020a000 RDI: 0000000000012f00 [29111676.472155] RBP: 000000c000209c28 R08: 000000c0001ac010 R09: 0000000000000000 [29111676.472156] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000209c18 [29111676.472157] R13: 000000c0001aac00 R14: 000000c00016a8c0 R15: 000000000001bac2 [29111676.472158] FS: 000000c00013b898 GS: 0000000000000000 [29111676.952735] FS: 000000c00013b898 GS: 0000000000000000 [29115259.784817] potentially unexpected fatal signal 5. [29115259.790028] CPU: 86 PID: 299298 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29115259.802019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29115259.811683] RIP: 0033:0x7fffffffe062 [29115259.815707] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29115259.834926] RSP: 002b:000000c0005e5b90 EFLAGS: 00000297 [29115259.842027] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29115259.850911] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29115259.859845] RBP: 000000c0005e5c28 R08: 0000000000000000 R09: 0000000000000000 [29115259.868788] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005e5c18 [29115259.877680] R13: 000000c0005eec00 R14: 000000c00025f340 R15: 000000000003f83f [29115259.886619] FS: 000000c00013a898 GS: 0000000000000000 [29115276.027146] potentially unexpected fatal signal 5. [29115276.032418] CPU: 63 PID: 267823 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29115276.044425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29115276.054283] RIP: 0033:0x7fffffffe062 [29115276.058563] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29115276.079218] RSP: 002b:000000c0005f1b90 EFLAGS: 00000297 [29115276.086277] RAX: 0000000000049867 RBX: 0000000000000000 RCX: 00007fffffffe05a [29115276.095663] RDX: 0000000000000000 RSI: 000000c0005f2000 RDI: 0000000000012f00 [29115276.104669] RBP: 000000c0005f1c28 R08: 000000c0006206a0 R09: 0000000000000000 [29115276.113605] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005f1c18 [29115276.122513] R13: 000000c0006220c0 R14: 000000c000168c40 R15: 0000000000041601 [29115276.131532] FS: 000000c000180098 GS: 0000000000000000 [29116475.973402] potentially unexpected fatal signal 5. [29116475.978617] CPU: 11 PID: 355158 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29116475.990619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29116476.000246] RIP: 0033:0x7fffffffe062 [29116476.004277] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29116476.024926] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [29116476.031872] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29116476.040795] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29116476.048381] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [29116476.057318] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000029c18 [29116476.066334] R13: 000000c000033320 R14: 000000c000215340 R15: 0000000000056a5b [29116476.073912] FS: 000000c000580098 GS: 0000000000000000 [29116960.553746] exe[398104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e01329bb9 cs:33 sp:7f85b3245858 ax:0 si:562e0139431a di:ffffffffff600000 [29117194.573692] exe[353401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4d1b007c1 cs:33 sp:7ed8c18c6578 ax:8 si:1 di:7ed8c18c6670 [29117444.541694] exe[424615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651c5ca17c1 cs:33 sp:7ebbb2ff4578 ax:8 si:1 di:7ebbb2ff4670 [29120781.435571] potentially unexpected fatal signal 5. [29120781.440814] CPU: 33 PID: 572025 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29120781.452813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29120781.462671] RIP: 0033:0x7fffffffe062 [29120781.466674] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29120781.486251] RSP: 002b:000000c00085db08 EFLAGS: 00000297 [29120781.491892] RAX: 0000555d61a00000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29120781.499481] RDX: 0000000000000001 RSI: 0000000000091000 RDI: 0000555d61a00000 [29120781.508408] RBP: 000000c00085db90 R08: 0000000000000009 R09: 00000000080d8000 [29120781.517337] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00085da50 [29120781.526529] R13: 000000c00020c808 R14: 000000c000215a40 R15: 000000000008b92a [29120781.534099] FS: 00007f03619fe6c0 GS: 0000000000000000 [29121533.975398] potentially unexpected fatal signal 5. [29121533.980699] CPU: 31 PID: 557352 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29121533.992677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29121534.002333] RIP: 0033:0x7fffffffe062 [29121534.006376] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29121534.028572] RSP: 002b:000000c00062fb90 EFLAGS: 00000297 [29121534.035569] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29121534.044467] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29121534.053411] RBP: 000000c00062fc28 R08: 0000000000000000 R09: 0000000000000000 [29121534.062323] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00062fc18 [29121534.071240] R13: 000000c0004e24e0 R14: 000000c0001836c0 R15: 0000000000079554 [29121534.078777] FS: 000000c000180098 GS: 0000000000000000 [29126369.939017] potentially unexpected fatal signal 5. [29126369.944457] CPU: 64 PID: 727296 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29126369.956456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29126369.966266] RIP: 0033:0x7fffffffe062 [29126369.970220] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29126369.989403] RSP: 002b:000000c0005f1b90 EFLAGS: 00000297 [29126369.995069] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29126370.002633] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29126370.010189] RBP: 000000c0005f1c28 R08: 0000000000000000 R09: 0000000000000000 [29126370.019123] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005f1c18 [29126370.026710] R13: 000000c0005fe0c0 R14: 000000c0001a3dc0 R15: 00000000000afe90 [29126370.035768] FS: 000000c00013b098 GS: 0000000000000000 [29128999.267345] exe[790209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aee3f08bb9 cs:33 sp:7f711af81858 ax:0 si:55aee3f73328 di:ffffffffff600000 [29129000.317018] exe[794613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56050200bbb9 cs:33 sp:7f0570c87858 ax:0 si:560502076328 di:ffffffffff600000 [29129001.904200] exe[785157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be7fc26bb9 cs:33 sp:7fcf6cf58858 ax:0 si:55be7fc91328 di:ffffffffff600000 [29129002.672259] exe[798675] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aee3f08bb9 cs:33 sp:7f711af81858 ax:0 si:55aee3f73328 di:ffffffffff600000 [29129003.232379] exe[786894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55856bc66bb9 cs:33 sp:7fa20dfba858 ax:0 si:55856bcd1328 di:ffffffffff600000 [29129762.106165] exe[838708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cb6d2cbb9 cs:33 sp:7fd7c47aa858 ax:0 si:560cb6d9734f di:ffffffffff600000 [29134487.844158] potentially unexpected fatal signal 5. [29134487.849484] CPU: 57 PID: 892759 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29134487.856465] potentially unexpected fatal signal 5. [29134487.861550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29134487.866759] CPU: 9 PID: 903522 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29134487.866761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29134487.866768] RIP: 0033:0x7fffffffe062 [29134487.866772] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29134487.866775] RSP: 002b:000000c0006a7b90 EFLAGS: 00000297 [29134487.876420] RIP: 0033:0x7fffffffe062 [29134487.876423] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29134487.876425] RSP: 002b:000000c0006a7b90 EFLAGS: 00000297 [29134487.876428] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29134487.876429] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29134487.876432] RBP: 000000c0006a7c28 R08: 0000000000000000 R09: 0000000000000000 [29134487.888374] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29134487.888375] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29134487.888376] RBP: 000000c0006a7c28 R08: 0000000000000000 R09: 0000000000000000 [29134487.888377] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0006a7c18 [29134487.888378] R13: 000000c00070ba70 R14: 000000c000490540 R15: 00000000000d9b89 [29134487.888379] FS: 000000c00013b098 GS: 0000000000000000 [29134488.031540] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0006a7c18 [29134488.039100] R13: 000000c00070ba70 R14: 000000c000490540 R15: 00000000000d9b89 [29134488.048009] FS: 000000c00013b098 GS: 0000000000000000 [29138046.920619] exe[64370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3a8a16bb9 cs:33 sp:7efe65ed7858 ax:0 si:55a3a8a8131a di:ffffffffff600000 [29138098.180774] potentially unexpected fatal signal 5. [29138098.186260] CPU: 1 PID: 26307 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29138098.198158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29138098.207830] RIP: 0033:0x7fffffffe062 [29138098.211875] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29138098.217594] potentially unexpected fatal signal 5. [29138098.232535] RSP: 002b:000000c0006a1b90 EFLAGS: 00000297 [29138098.239353] CPU: 57 PID: 43931 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29138098.239356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29138098.239363] RIP: 0033:0x7fffffffe062 [29138098.239366] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29138098.239368] RSP: 002b:000000c00066db90 EFLAGS: 00000297 [29138098.239370] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29138098.239371] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29138098.239372] RBP: 000000c00066dc28 R08: 0000000000000000 R09: 0000000000000000 [29138098.239372] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00066dc18 [29138098.239374] R13: 000000c00016ba70 R14: 000000c0002cc8c0 R15: 00000000000f333f [29138098.239378] FS: 000000c00013b098 GS: 0000000000000000 [29138098.246352] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29138098.246352] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29138098.246353] RBP: 000000c0006a1c28 R08: 0000000000000000 R09: 0000000000000000 [29138098.246354] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0006a1c18 [29138098.246354] R13: 000000c0004e3a70 R14: 000000c000495dc0 R15: 00000000000f334b [29138098.246356] FS: 000000c00013b898 GS: 0000000000000000 [29138098.285732] potentially unexpected fatal signal 5. [29138098.412407] CPU: 16 PID: 73282 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29138098.425685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29138098.436676] RIP: 0033:0x7fffffffe062 [29138098.442041] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29138098.462611] RSP: 002b:000000c0006a1b90 EFLAGS: 00000297 [29138098.469597] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29138098.478505] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29138098.487776] RBP: 000000c0006a1c28 R08: 0000000000000000 R09: 0000000000000000 [29138098.496660] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0006a1c18 [29138098.505559] R13: 000000c0004e3a70 R14: 000000c000495dc0 R15: 00000000000f334b [29138098.514484] FS: 000000c00013b898 GS: 0000000000000000 [29138210.534536] exe[83817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55823c3b6bb9 cs:33 sp:7fdc873b0858 ax:0 si:55823c421328 di:ffffffffff600000 [29138210.974794] exe[100984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a76da9bb9 cs:33 sp:7eff1f516858 ax:0 si:562a76e14328 di:ffffffffff600000 [29138211.263967] exe[83898] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565505275bb9 cs:33 sp:7f966f3d5858 ax:0 si:5655052e0328 di:ffffffffff600000 [29138211.504414] exe[86869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a76da9bb9 cs:33 sp:7eff1f516858 ax:0 si:562a76e14328 di:ffffffffff600000 [29138212.105706] exe[99395] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55823c3b6bb9 cs:33 sp:7fdc873b0858 ax:0 si:55823c421328 di:ffffffffff600000 [29139523.167217] exe[108617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af5c557bb9 cs:33 sp:7ebd004a6858 ax:0 si:55af5c5c231a di:ffffffffff600000 [29144068.093914] exe[259236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561050293bb9 cs:33 sp:7eb5f9e1fef8 ax:0 si:200050c0 di:ffffffffff600000 [29144156.447972] exe[277631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba215d1bb9 cs:33 sp:7fc80ad5c858 ax:0 si:55ba2163c34f di:ffffffffff600000 [29144170.394170] exe[201652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564261228bb9 cs:33 sp:7fdb39b75858 ax:0 si:56426129334f di:ffffffffff600000 [29144222.108727] exe[183023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56186eae5bb9 cs:33 sp:7f5b19b1c858 ax:0 si:56186eb5034f di:ffffffffff600000 [29144234.142329] exe[206184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56186eae5bb9 cs:33 sp:7f5b19afb858 ax:0 si:56186eb5034f di:ffffffffff600000 [29145311.239230] exe[315993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5594c9beebb9 cs:33 sp:7f59f469c858 ax:0 si:5594c9c5931a di:ffffffffff600000 [29147396.509767] exe[428742] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd02323bb9 cs:33 sp:7f6eaeecc858 ax:0 si:55bd0238e31a di:ffffffffff600000 [29147706.019026] exe[428881] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5559ea824bb9 cs:33 sp:7f6f0e12c858 ax:0 si:5559ea88f31a di:ffffffffff600000 [29147854.315645] exe[447415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561485ec1bb9 cs:33 sp:7eb16e3ab858 ax:0 si:561485f2c31a di:ffffffffff600000 [29150450.912004] exe[565847] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8f0b78bb9 cs:33 sp:7f92cdad3858 ax:0 si:55c8f0be334f di:ffffffffff600000 [29150643.188419] exe[577904] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dba86b5bb9 cs:33 sp:7f523d474858 ax:0 si:55dba872034f di:ffffffffff600000 [29150643.189001] exe[577955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dba86b5bb9 cs:33 sp:7f523d453858 ax:0 si:55dba872034f di:ffffffffff600000 [29151691.623045] exe[611865] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56223ebefbb9 cs:33 sp:7f40adbae858 ax:0 si:56223ec5a31a di:ffffffffff600000 [29153758.312855] potentially unexpected fatal signal 5. [29153758.318067] CPU: 77 PID: 728184 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29153758.330044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29153758.339671] RIP: 0033:0x7fffffffe062 [29153758.343643] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29153758.362866] RSP: 002b:000000c000021b90 EFLAGS: 00000297 [29153758.369877] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29153758.378798] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29153758.387758] RBP: 000000c000021c28 R08: 0000000000000000 R09: 0000000000000000 [29153758.396686] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000021c18 [29153758.405624] R13: 000000c000024c00 R14: 000000c000471880 R15: 00000000000b145d [29153758.414583] FS: 000000c000181098 GS: 0000000000000000 [29156513.041925] exe[875998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b60087bb9 cs:33 sp:7f4431922ef8 ax:0 si:20000340 di:ffffffffff600000 [29157027.903472] exe[830281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b967337 cs:33 sp:7eb05790def8 ax:4be00000 si:56414b9e64be di:ffffffffff600000 [29157641.559607] exe[934251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591e1024bb9 cs:33 sp:7fddf5cc1858 ax:0 si:5591e108f31a di:ffffffffff600000 [29160958.115348] potentially unexpected fatal signal 5. [29160958.120568] CPU: 65 PID: 151524 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29160958.132575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29160958.142225] RIP: 0033:0x7fffffffe062 [29160958.146246] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29160958.166799] RSP: 002b:000000c000209b90 EFLAGS: 00000297 [29160958.173811] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29160958.182728] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29160958.191651] RBP: 000000c000209c28 R08: 0000000000000000 R09: 0000000000000000 [29160958.200593] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000209c18 [29160958.209510] R13: 000000c000174c00 R14: 000000c00051a700 R15: 00000000000245b9 [29160958.218455] FS: 000000c000518898 GS: 0000000000000000 [29165204.622036] exe[405889] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b839f8bb9 cs:33 sp:7ecc5a073858 ax:0 si:559b83a63328 di:ffffffffff600000 [29165560.669370] exe[420549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564048bfc337 cs:33 sp:7f8a53fefef8 ax:4be00000 si:564048c7b4be di:ffffffffff600000 [29165847.489629] exe[435176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645ab274bb9 cs:33 sp:7f72077cd858 ax:0 si:5645ab2df31a di:ffffffffff600000 [29166938.719207] potentially unexpected fatal signal 5. [29166938.724462] CPU: 88 PID: 505317 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29166938.736448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29166938.746085] RIP: 0033:0x7fffffffe062 [29166938.750116] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29166938.769342] RSP: 002b:000000c000031b90 EFLAGS: 00000297 [29166938.776328] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29166938.785253] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29166938.792814] RBP: 000000c000031c28 R08: 0000000000000000 R09: 0000000000000000 [29166938.801726] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000031c18 [29166938.810710] R13: 000000c0001a94d0 R14: 000000c000177dc0 R15: 000000000007b406 [29166938.819628] FS: 000000c0002da098 GS: 0000000000000000 [29166951.704457] potentially unexpected fatal signal 5. [29166951.709690] CPU: 43 PID: 447309 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29166951.721677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29166951.731317] RIP: 0033:0x7fffffffe062 [29166951.735306] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29166951.754512] RSP: 002b:000000c00026db90 EFLAGS: 00000297 [29166951.761528] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29166951.770424] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29166951.777993] RBP: 000000c00026dc28 R08: 0000000000000000 R09: 0000000000000000 [29166951.786960] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00026dc18 [29166951.795843] R13: 000000c0001e4c00 R14: 000000c000473a40 R15: 000000000006cd13 [29166951.804756] FS: 000000000205bbb0 GS: 0000000000000000 [29168157.863306] potentially unexpected fatal signal 5. [29168157.868508] CPU: 80 PID: 537810 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29168157.880480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29168157.890116] RIP: 0033:0x7fffffffe062 [29168157.894120] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29168157.914706] RSP: 002b:000000c0005f5b90 EFLAGS: 00000297 [29168157.921710] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29168157.930782] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29168157.939716] RBP: 000000c0005f5c28 R08: 0000000000000000 R09: 0000000000000000 [29168157.947261] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005f5c18 [29168157.956172] R13: 000000c000014c00 R14: 000000c0001b3880 R15: 000000000008347f [29168157.963732] FS: 000000000205bbb0 GS: 0000000000000000 [29172945.258591] potentially unexpected fatal signal 5. [29172945.263813] CPU: 6 PID: 881260 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29172945.275700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29172945.285378] RIP: 0033:0x7fffffffe062 [29172945.289439] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29172945.309990] RSP: 002b:000000c000021b90 EFLAGS: 00000297 [29172945.316996] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29172945.325918] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29172945.334823] RBP: 000000c000021c28 R08: 0000000000000000 R09: 0000000000000000 [29172945.343731] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000021c18 [29172945.352645] R13: 000000c0004b3a70 R14: 000000c00049f500 R15: 00000000000d6f3d [29172945.361549] FS: 000000c00050c098 GS: 0000000000000000 [29172950.389275] exe[857733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b0ec9d2bb9 cs:33 sp:7eccf0bcc858 ax:0 si:55b0eca3d34f di:ffffffffff600000 [29173123.311072] exe[900454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55818cb54bb9 cs:33 sp:7edfa07ed858 ax:0 si:55818cbbf34f di:ffffffffff600000 [29173257.280923] exe[900449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b25a61bb9 cs:33 sp:7eb2c9c85858 ax:0 si:557b25acc328 di:ffffffffff600000 [29174106.918164] exe[946780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ffdd3bbb9 cs:33 sp:7fb450ad9858 ax:0 si:561ffdda631a di:ffffffffff600000 [29175352.420352] potentially unexpected fatal signal 5. [29175352.425681] CPU: 2 PID: 28536 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29175352.437506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29175352.447162] RIP: 0033:0x7fffffffe062 [29175352.451248] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29175352.471800] RSP: 002b:000000c0006adb90 EFLAGS: 00000297 [29175352.478905] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29175352.487819] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29175352.497139] RBP: 000000c0006adc28 R08: 0000000000000000 R09: 0000000000000000 [29175352.506048] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0006adc18 [29175352.514960] R13: 000000c0006bc0c0 R14: 000000c00049f180 R15: 0000000000006f36 [29175352.523907] FS: 000000000205bbb0 GS: 0000000000000000 [29176125.091265] exe[15102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557820373bb9 cs:33 sp:7ed33c16bef8 ax:0 si:20002540 di:ffffffffff600000 [29176764.395419] exe[90820] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7325d3bb9 cs:33 sp:7ef169025858 ax:0 si:55a73263e31a di:ffffffffff600000 [29176803.650674] exe[126807] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f5e92f3fb38 ax:0 si:7f5e92f3fc70 di:19 [29176813.148240] exe[86175] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ee862667b38 ax:0 si:7ee862667c70 di:19 [29177032.795466] exe[82269] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ebf73e5db38 ax:0 si:7ebf73e5dc70 di:19 [29177042.365096] exe[140173] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd9db3c1b38 ax:0 si:7fd9db3c1c70 di:19 [29177080.121778] exe[148720] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f94e0289b38 ax:0 si:7f94e0289c70 di:19 [29177093.441899] exe[140381] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f9a72328b38 ax:0 si:7f9a72328c70 di:19 [29177135.126977] exe[131933] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6022e29b38 ax:0 si:7f6022e29c70 di:19 [29177203.337295] exe[150187] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f1071ff7b38 ax:0 si:7f1071ff7c70 di:19 [29184356.954539] exe[344280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55900386bbb9 cs:33 sp:7f4f4b68b858 ax:0 si:5590038d6328 di:ffffffffff600000 [29184360.593857] exe[337505] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7feb57bbdb38 ax:0 si:7feb57bbdc70 di:19 [29186338.859804] potentially unexpected fatal signal 5. [29186338.865042] CPU: 53 PID: 436597 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29186338.877033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29186338.886756] RIP: 0033:0x7fffffffe062 [29186338.890730] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29186338.909908] RSP: 002b:000000c00004db08 EFLAGS: 00000297 [29186338.915725] RAX: 000056100831d000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29186338.924621] RDX: 0000000000000003 RSI: 00000000000c2000 RDI: 000056100831d000 [29186338.933550] RBP: 000000c00004db90 R08: 0000000000000009 R09: 00000000081fc000 [29186338.942463] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00004da50 [29186338.951379] R13: 0000000002d50280 R14: 000000c00037cc40 R15: 000000000006a80f [29186338.960322] FS: 00000000044973c0 GS: 0000000000000000 [29186636.775720] exe[421999] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2b37d6bb9 cs:33 sp:7edcd0a55858 ax:0 si:55e2b3841328 di:ffffffffff600000 [29186655.593350] exe[413380] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7edcd0a55b38 ax:0 si:7edcd0a55c70 di:19 [29187576.657923] exe[421780] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fe39a387b38 ax:0 si:7fe39a387c70 di:19 [29187582.175250] exe[405983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561941868bb9 cs:33 sp:7f92da541858 ax:0 si:5619418d3328 di:ffffffffff600000 [29187728.625057] exe[463172] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f21e6cdab38 ax:0 si:7f21e6cdac70 di:19 [29187729.909228] exe[397539] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed3c44cbb9 cs:33 sp:7fd942cba858 ax:0 si:55ed3c4b7328 di:ffffffffff600000 [29188183.478985] exe[469351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb304f6bb9 cs:33 sp:7fdfbb965ef8 ax:0 si:20000300 di:ffffffffff600000 [29188411.766853] exe[415606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0a3eabb9 cs:33 sp:7ff0ab797858 ax:0 si:562e0a455328 di:ffffffffff600000 [29188425.252733] exe[395890] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6c083deb38 ax:0 si:7f6c083dec70 di:19 [29188593.105135] exe[424593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c99d6f5bb9 cs:33 sp:7f50a0d10ef8 ax:0 si:20000180 di:ffffffffff600000 [29188601.636661] exe[399195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560234cefbb9 cs:33 sp:7f0b16dbcef8 ax:0 si:20000180 di:ffffffffff600000 [29190609.355229] exe[570244] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591d8d65bb9 cs:33 sp:7ea7b54b1858 ax:0 si:5591d8dd031a di:ffffffffff600000 [29192021.750207] exe[514124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592be65cbb9 cs:33 sp:7f8d1c108858 ax:0 si:5592be6c7328 di:ffffffffff600000 [29192022.430738] exe[501922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ae0991bb9 cs:33 sp:7f1a9497a858 ax:0 si:563ae09fc328 di:ffffffffff600000 [29192023.276217] exe[517854] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ae0991bb9 cs:33 sp:7f1a9497a858 ax:0 si:563ae09fc328 di:ffffffffff600000 [29192023.766560] exe[497166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ae0991bb9 cs:33 sp:7f1a9497a858 ax:0 si:563ae09fc328 di:ffffffffff600000 [29192024.639309] exe[514124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592be65cbb9 cs:33 sp:7f8d1c108858 ax:0 si:5592be6c7328 di:ffffffffff600000 [29193375.790467] exe[633546] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7edf6d2d1b38 ax:0 si:7edf6d2d1c70 di:19 [29193380.020184] exe[645365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559187160bb9 cs:33 sp:7eb4961a4858 ax:0 si:5591871cb328 di:ffffffffff600000 [29193892.416234] exe[673865] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56055de42bb9 cs:33 sp:7ff244c7b858 ax:0 si:56055dead328 di:ffffffffff600000 [29193924.168451] exe[626537] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f48540efb38 ax:0 si:7f48540efc70 di:19 [29194889.317933] exe[642320] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b92946bb9 cs:33 sp:7f9ae1f6b858 ax:0 si:558b929b1328 di:ffffffffff600000 [29194908.417001] exe[703162] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f28edcb7b38 ax:0 si:7f28edcb7c70 di:19 [29196844.075074] exe[835446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55574b4c8337 cs:33 sp:7f3dbfaf3ef8 ax:4be00000 si:55574b5474be di:ffffffffff600000 [29196916.151901] exe[830607] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56496c06f337 cs:33 sp:7f394cd59ef8 ax:4be00000 si:56496c0ee4be di:ffffffffff600000 [29196916.175201] exe[830606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56496c06f337 cs:33 sp:7f394cd59ef8 ax:4be00000 si:56496c0ee4be di:ffffffffff600000 [29199518.281133] exe[943939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558aa92fe337 cs:33 sp:7f46d67cfef8 ax:4be00000 si:558aa937d4be di:ffffffffff600000 [29199624.184533] exe[951903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557771124337 cs:33 sp:7f9a91dbcef8 ax:4be00000 si:5577711a34be di:ffffffffff600000 [29200118.667474] exe[997049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b639fbbb9 cs:33 sp:7eee4691f858 ax:0 si:564b63a6631a di:ffffffffff600000 [29200178.902380] exe[997430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645007a77c1 cs:33 sp:7efca35324c8 ax:8 si:1 di:7efca35325c0 [29200909.115232] potentially unexpected fatal signal 5. [29200909.120476] CPU: 6 PID: 57828 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29200909.132272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29200909.141931] RIP: 0033:0x7fffffffe062 [29200909.146218] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29200909.165439] RSP: 002b:000000c00059fb90 EFLAGS: 00000297 [29200909.172461] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29200909.181378] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29200909.190290] RBP: 000000c00059fc28 R08: 0000000000000000 R09: 0000000000000000 [29200909.197842] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00059fc18 [29200909.206870] R13: 000000c0005a8c00 R14: 000000c000682700 R15: 0000000000005257 [29200909.214448] FS: 000000c000180098 GS: 0000000000000000 [29200931.982248] exe[58882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562761c4fbb9 cs:33 sp:7f4739ef2858 ax:0 si:562761cba31a di:ffffffffff600000 [29202696.927031] exe[134712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555803dd0bb9 cs:33 sp:7f092d6c7858 ax:0 si:555803e3b31a di:ffffffffff600000 [29206431.515354] exe[311880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555951d8abb9 cs:33 sp:7efb458eeef8 ax:0 si:20000200 di:ffffffffff600000 [29209735.003240] exe[534665] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e82a1b7c1 cs:33 sp:7fc9989a54c8 ax:8 si:1 di:7fc9989a55c0 [29209874.478380] exe[528205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b8911e7c1 cs:33 sp:7f427162c4c8 ax:8 si:1 di:7f427162c5c0 [29211556.714369] exe[632376] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c704cc3bb9 cs:33 sp:7f26c0983858 ax:0 si:55c704d2e328 di:ffffffffff600000 [29212311.195189] exe[678642] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561df9f80bb9 cs:33 sp:7f06bb7bd858 ax:0 si:561df9feb31a di:ffffffffff600000 [29212396.841025] exe[620915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca4fbe27c1 cs:33 sp:7eca4f2c54c8 ax:8 si:1 di:7eca4f2c55c0 [29212692.243324] exe[690993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d535c897c1 cs:33 sp:7ecced5624c8 ax:8 si:1 di:7ecced5625c0 [29212802.129938] potentially unexpected fatal signal 5. [29212802.135231] CPU: 38 PID: 672360 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29212802.147247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29212802.156870] RIP: 0033:0x7fffffffe062 [29212802.160859] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29212802.180073] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [29212802.185810] RAX: 00000000000acca0 RBX: 0000000000000000 RCX: 00007fffffffe05a [29212802.194810] RDX: 0000000000000000 RSI: 000000c00004e000 RDI: 0000000000012f00 [29212802.203724] RBP: 000000c00004db30 R08: 000000c0008046a0 R09: 0000000000000000 [29212802.212652] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00004d9c8 [29212802.221621] R13: 000000c000181008 R14: 000000c0004d0c40 R15: 00000000000a41be [29212802.230495] FS: 00007f0808ff96c0 GS: 0000000000000000 [29215586.323254] potentially unexpected fatal signal 5. [29215586.328462] CPU: 49 PID: 853847 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29215586.340430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29215586.350143] RIP: 0033:0x7fffffffe062 [29215586.354120] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29215586.373311] RSP: 002b:000000c000021b90 EFLAGS: 00000297 [29215586.378962] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29215586.386568] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29215586.394170] RBP: 000000c000021c28 R08: 0000000000000000 R09: 0000000000000000 [29215586.403088] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000021c18 [29215586.412080] R13: 000000c000026c00 R14: 000000c00015e700 R15: 00000000000cb331 [29215586.420981] FS: 000000c00048e098 GS: 0000000000000000 [29216465.360575] exe[899412] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f790a37eb38 ax:0 si:7f790a37ec70 di:19 [29216533.442905] exe[910460] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f9a1d867b38 ax:0 si:7f9a1d867c70 di:19 [29216595.039179] exe[908354] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f428f553b38 ax:0 si:7f428f553c70 di:19 [29216603.999367] exe[900735] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7feecf33bb38 ax:0 si:7feecf33bc70 di:19 [29216649.753084] exe[901032] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ff707485b38 ax:0 si:7ff707485c70 di:19 [29216684.508855] exe[924943] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ebe0aeefb38 ax:0 si:7ebe0aeefc70 di:19 [29216746.225934] exe[881366] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eb756ebab38 ax:0 si:7eb756ebac70 di:19 [29216787.960225] exe[920626] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7efc1c322b38 ax:0 si:7efc1c322c70 di:19 [29218436.566979] exe[14440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55920e2b1337 cs:33 sp:7eb978694ef8 ax:4be00000 si:55920e3304be di:ffffffffff600000 [29219995.948789] exe[99108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636c1fc0bb9 cs:33 sp:7fd2f29ac858 ax:0 si:5636c202b31a di:ffffffffff600000 [29223555.291326] potentially unexpected fatal signal 5. [29223555.296735] CPU: 54 PID: 271598 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29223555.309348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29223555.318988] RIP: 0033:0x7fffffffe062 [29223555.322973] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29223555.342170] RSP: 002b:000000c0005fbb90 EFLAGS: 00000297 [29223555.349309] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29223555.358260] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29223555.367212] RBP: 000000c0005fbc28 R08: 0000000000000000 R09: 0000000000000000 [29223555.376158] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005fbc18 [29223555.385056] R13: 000000c00060c0c0 R14: 000000c0001b3500 R15: 00000000000420dc [29223555.394074] FS: 000000000205cbb0 GS: 0000000000000000 [29223855.125372] exe[306112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d081f57bb9 cs:33 sp:7ea69cc41858 ax:0 si:55d081fc231a di:ffffffffff600000 [29226109.123204] potentially unexpected fatal signal 5. [29226109.128421] CPU: 50 PID: 407065 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29226109.140384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29226109.150011] RIP: 0033:0x7fffffffe062 [29226109.153979] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29226109.173218] RSP: 002b:000000c000031b90 EFLAGS: 00000297 [29226109.178855] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29226109.186400] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29226109.195341] RBP: 000000c000031c28 R08: 0000000000000000 R09: 0000000000000000 [29226109.202917] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000031c18 [29226109.210466] R13: 000000c0001a4c00 R14: 000000c0002f0700 R15: 0000000000063441 [29226109.218008] FS: 000000c000552098 GS: 0000000000000000 [29227155.409538] potentially unexpected fatal signal 5. [29227155.414752] CPU: 13 PID: 438760 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29227155.426786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29227155.436585] RIP: 0033:0x7fffffffe062 [29227155.440577] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29227155.459794] RSP: 002b:000000c000019b90 EFLAGS: 00000297 [29227155.466822] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29227155.475774] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29227155.484674] RBP: 000000c000019c28 R08: 0000000000000000 R09: 0000000000000000 [29227155.493896] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000019c18 [29227155.502808] R13: 000000c000031a70 R14: 000000c000164a80 R15: 00000000000698a0 [29227155.511735] FS: 000000c00013b098 GS: 0000000000000000 [29227161.638226] potentially unexpected fatal signal 5. [29227161.643475] CPU: 87 PID: 501544 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29227161.655587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29227161.665371] RIP: 0033:0x7fffffffe062 [29227161.669354] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29227161.688584] RSP: 002b:000000c0005c3b90 EFLAGS: 00000297 [29227161.695630] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29227161.704561] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29227161.713507] RBP: 000000c0005c3c28 R08: 0000000000000000 R09: 0000000000000000 [29227161.722630] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005c3c18 [29227161.731798] R13: 000000c0005d40c0 R14: 000000c000602700 R15: 0000000000079d5e [29227161.740910] FS: 000000c0004ba098 GS: 0000000000000000 [29227190.592190] exe[441416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571065afbb9 cs:33 sp:7f6919eb8858 ax:0 si:55710661a328 di:ffffffffff600000 [29228351.742905] exe[514846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557593b77337 cs:33 sp:7fbc919b7ef8 ax:4be00000 si:557593bf64be di:ffffffffff600000 [29229638.045514] exe[633702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc0d810bb9 cs:33 sp:7f3353ae6858 ax:0 si:55fc0d87b31a di:ffffffffff600000 [29230403.704337] exe[628345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ace00fbbb9 cs:33 sp:7fdf7def7858 ax:0 si:55ace016631a di:ffffffffff600000 [29230816.248826] exe[651079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560893d0bbb9 cs:33 sp:7f32795dbef8 ax:0 si:200001c0 di:ffffffffff600000 [29232697.634466] potentially unexpected fatal signal 5. [29232697.639714] CPU: 33 PID: 651375 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29232697.651914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29232697.661594] RIP: 0033:0x7fffffffe062 [29232697.665627] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29232697.686229] RSP: 002b:000000c0006efb90 EFLAGS: 00000297 [29232697.693231] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29232697.702180] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29232697.711120] RBP: 000000c0006efc28 R08: 0000000000000000 R09: 0000000000000000 [29232697.720075] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0006efc18 [29232697.729002] R13: 000000c0006f8c00 R14: 000000c00015dc00 R15: 000000000009ee71 [29232697.737930] FS: 000000c000590098 GS: 0000000000000000 [29236011.177713] potentially unexpected fatal signal 5. [29236011.182922] CPU: 73 PID: 990016 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29236011.194930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29236011.204668] RIP: 0033:0x7fffffffe062 [29236011.208767] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29236011.229436] RSP: 002b:000000c000019b90 EFLAGS: 00000297 [29236011.236424] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29236011.245399] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29236011.254673] RBP: 000000c000019c28 R08: 0000000000000000 R09: 0000000000000000 [29236011.263609] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000019c18 [29236011.273711] R13: 000000c00001cc00 R14: 000000c0002d1c00 R15: 00000000000f0b03 [29236011.282710] FS: 000000c00013b098 GS: 0000000000000000 [29236569.644053] exe[14580] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564769cbb337 cs:33 sp:7f89b81a1ef8 ax:4be00000 si:564769d3a4be di:ffffffffff600000 [29237713.131604] exe[68326] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6eefc0bb9 cs:33 sp:7f9287bc1858 ax:0 si:55f6ef02b31a di:ffffffffff600000 [29237725.218350] exe[86435] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55edabf4ebb9 cs:33 sp:7ece5afcc858 ax:0 si:55edabfb931a di:ffffffffff600000 [29237792.794443] exe[61594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d040d30bb9 cs:33 sp:7ea47169a858 ax:0 si:55d040d9b31a di:ffffffffff600000 [29237815.369853] exe[97135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559eb8f84bb9 cs:33 sp:7ff16c3fb858 ax:0 si:559eb8fef31a di:ffffffffff600000 [29238133.719407] exe[122275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561770b08bb9 cs:33 sp:7f66f0452858 ax:0 si:561770b7331a di:ffffffffff600000 [29238197.332583] exe[127619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0b2a89bb9 cs:33 sp:7f1e3fe5c858 ax:0 si:55f0b2af431a di:ffffffffff600000 [29238218.844429] exe[128083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1898d4bb9 cs:33 sp:7f2b1259d858 ax:0 si:55c18993f31a di:ffffffffff600000 [29238223.607733] exe[110595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56030ebffbb9 cs:33 sp:7fb4a89ca858 ax:0 si:56030ec6a31a di:ffffffffff600000 [29238803.444654] exe[155027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611ed0a6bb9 cs:33 sp:7f0383bd6858 ax:0 si:5611ed11131a di:ffffffffff600000 [29239309.309450] potentially unexpected fatal signal 5. [29239309.309971] potentially unexpected fatal signal 5. [29239309.310540] potentially unexpected fatal signal 5. [29239309.310545] CPU: 72 PID: 191206 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29239309.310546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29239309.310551] RIP: 0033:0x7fffffffe062 [29239309.310554] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29239309.310556] RSP: 002b:000000c0005fdb90 EFLAGS: 00000297 [29239309.310558] RAX: 000000000002f809 RBX: 0000000000000000 RCX: 00007fffffffe05a [29239309.310558] RDX: 0000000000000000 RSI: 000000c0005fe000 RDI: 0000000000012f00 [29239309.310559] RBP: 000000c0005fdc28 R08: 000000c0001646a0 R09: 0000000000000000 [29239309.310560] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005fdc18 [29239309.310561] R13: 000000c000644150 R14: 000000c00051ec40 R15: 000000000002ea73 [29239309.310563] FS: 000000000205cbb0 GS: 0000000000000000 [29239309.314685] potentially unexpected fatal signal 5. [29239309.314694] CPU: 78 PID: 191141 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29239309.314697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29239309.314702] RIP: 0033:0x7fffffffe062 [29239309.314706] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29239309.314708] RSP: 002b:000000c0005fdb90 EFLAGS: 00000297 [29239309.314711] RAX: 000000000002f80e RBX: 0000000000000000 RCX: 00007fffffffe05a [29239309.314712] RDX: 0000000000000000 RSI: 000000c0005fe000 RDI: 0000000000012f00 [29239309.314713] RBP: 000000c0005fdc28 R08: 000000c000760100 R09: 0000000000000000 [29239309.314714] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005fdc18 [29239309.314715] R13: 000000c000644150 R14: 000000c00051ec40 R15: 000000000002ea73 [29239309.314717] FS: 000000000205cbb0 GS: 0000000000000000 [29239309.319155] potentially unexpected fatal signal 5. [29239309.319161] CPU: 51 PID: 191238 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29239309.319163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29239309.319170] RIP: 0033:0x7fffffffe062 [29239309.319174] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29239309.319175] RSP: 002b:000000c0005fdb90 EFLAGS: 00000297 [29239309.319178] RAX: 000000000002f80b RBX: 0000000000000000 RCX: 00007fffffffe05a [29239309.319179] RDX: 0000000000000000 RSI: 000000c0005fe000 RDI: 0000000000012f00 [29239309.319181] RBP: 000000c0005fdc28 R08: 000000c0007d85b0 R09: 0000000000000000 [29239309.319182] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005fdc18 [29239309.319183] R13: 000000c000644150 R14: 000000c00051ec40 R15: 000000000002ea73 [29239309.319184] FS: 000000000205cbb0 GS: 0000000000000000 [29239309.319964] CPU: 21 PID: 191183 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29239309.326547] CPU: 68 PID: 191192 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29239309.326548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29239309.326552] RIP: 0033:0x7fffffffe062 [29239309.326554] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29239309.326555] RSP: 002b:000000c0005fdb90 EFLAGS: 00000297 [29239309.326557] RAX: 000000000002f80a RBX: 0000000000000000 RCX: 00007fffffffe05a [29239309.326557] RDX: 0000000000000000 RSI: 000000c0005fe000 RDI: 0000000000012f00 [29239309.326558] RBP: 000000c0005fdc28 R08: 000000c00081a5b0 R09: 0000000000000000 [29239309.326559] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005fdc18 [29239309.326559] R13: 000000c000644150 R14: 000000c00051ec40 R15: 000000000002ea73 [29239309.326560] FS: 000000000205cbb0 GS: 0000000000000000 [29239309.762285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29239309.771965] RIP: 0033:0x7fffffffe062 [29239309.777349] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29239309.797935] RSP: 002b:000000c0005fdb90 EFLAGS: 00000297 [29239309.804958] RAX: 000000000002f80d RBX: 0000000000000000 RCX: 00007fffffffe05a [29239309.813894] RDX: 0000000000000000 RSI: 000000c0005fe000 RDI: 0000000000012f00 [29239309.822823] RBP: 000000c0005fdc28 R08: 000000c0007603d0 R09: 0000000000000000 [29239309.831764] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005fdc18 [29239309.840681] R13: 000000c000644150 R14: 000000c00051ec40 R15: 000000000002ea73 [29239309.849591] FS: 000000000205cbb0 GS: 0000000000000000 [29239324.597912] exe[125694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfd0cd1bb9 cs:33 sp:7f5543e4f858 ax:0 si:55dfd0d3c31a di:ffffffffff600000 [29239433.290732] exe[199347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c611a8bb9 cs:33 sp:7fb49453f858 ax:0 si:561c6121331a di:ffffffffff600000 [29239450.107867] exe[171903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f553c7ebb9 cs:33 sp:7f7584ea4858 ax:0 si:55f553ce931a di:ffffffffff600000 [29239510.476732] exe[193874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8ce7bebb9 cs:33 sp:7fa1d20b8858 ax:0 si:55c8ce82931a di:ffffffffff600000 [29239525.351956] exe[167561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556748f28bb9 cs:33 sp:7eacd7c46858 ax:0 si:556748f9331a di:ffffffffff600000 [29239525.756141] exe[189244] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558427cfabb9 cs:33 sp:7f91a713d858 ax:0 si:558427d6531a di:ffffffffff600000 [29239590.862990] exe[202565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604b957abb9 cs:33 sp:7ec2450bc858 ax:0 si:5604b95e531a di:ffffffffff600000 [29239615.875985] exe[207833] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ba85ccbb9 cs:33 sp:7f2917995858 ax:0 si:559ba863731a di:ffffffffff600000 [29240008.445530] exe[228849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ead77a337 cs:33 sp:7f6d2d29fef8 ax:4be00000 si:555ead7f94be di:ffffffffff600000 [29240248.742964] exe[230270] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575a9740bb9 cs:33 sp:7f23421fe858 ax:0 si:5575a97ab31a di:ffffffffff600000 [29240790.324036] exe[250089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5a47eb337 cs:33 sp:7f9df8668ef8 ax:4be00000 si:55f5a486a4be di:ffffffffff600000 [29241850.867101] exe[307574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563630b9fbb9 cs:33 sp:7fd97effe858 ax:0 si:563630c0a34f di:ffffffffff600000 [29242833.772523] exe[338105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a461a7bb9 cs:33 sp:7ea23209d858 ax:0 si:563a4621231a di:ffffffffff600000 [29245146.655617] exe[499032] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55771bdb9bb9 cs:33 sp:7f6e558ee858 ax:0 si:55771be2431a di:ffffffffff600000 [29247087.877459] exe[622830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1a8393bb9 cs:33 sp:7eed89d5e858 ax:0 si:55c1a83fe31a di:ffffffffff600000 [29247295.286486] exe[654723] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56329c7a2bb9 cs:33 sp:7f1c6249d858 ax:0 si:56329c80d31a di:ffffffffff600000 [29247350.442847] exe[635530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562eb8411bb9 cs:33 sp:7eb908998858 ax:0 si:562eb847c31a di:ffffffffff600000 [29247356.162120] exe[657503] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f054574bb9 cs:33 sp:7fd84934d858 ax:0 si:55f0545df31a di:ffffffffff600000 [29247409.275970] exe[614708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654236a8bb9 cs:33 sp:7eafa9cb9858 ax:0 si:56542371331a di:ffffffffff600000 [29247426.336168] exe[655584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564458693bb9 cs:33 sp:7f27d09b3858 ax:0 si:5644586fe31a di:ffffffffff600000 [29247469.339188] exe[648315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a393d0bb9 cs:33 sp:7efa427ce858 ax:0 si:555a3943b31a di:ffffffffff600000 [29247704.581600] exe[678733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4e4080bb9 cs:33 sp:7f267d5feef8 ax:0 si:20000a00 di:ffffffffff600000 [29247726.221221] exe[688163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e616d7fbb9 cs:33 sp:7f3091dd6858 ax:0 si:55e616dea31a di:ffffffffff600000 [29247814.403375] exe[690404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f1cb1bbb9 cs:33 sp:7f1327e49858 ax:0 si:557f1cb8631a di:ffffffffff600000 [29247828.942379] exe[685283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ff033bbb9 cs:33 sp:7f98040dd858 ax:0 si:559ff03a631a di:ffffffffff600000 [29248943.717738] exe[687791] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f23bef7db38 ax:0 si:7f23bef7dc70 di:19 [29249034.685789] exe[760370] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f3ae65d5b38 ax:0 si:7f3ae65d5c70 di:19 [29249048.451080] exe[760134] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6cd2c3ab38 ax:0 si:7f6cd2c3ac70 di:19 [29249050.122876] exe[762554] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f44fc043b38 ax:0 si:7f44fc043c70 di:19 [29249153.872763] exe[723228] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ef5835abb38 ax:0 si:7ef5835abc70 di:19 [29249155.337160] exe[750098] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fec01d39b38 ax:0 si:7fec01d39c70 di:19 [29249194.583444] exe[747182] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ecfb91f9b38 ax:0 si:7ecfb91f9c70 di:19 [29249222.300546] exe[779412] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f1cdd6bdb38 ax:0 si:7f1cdd6bdc70 di:19 [29249264.660489] exe[764529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ca1b9abb9 cs:33 sp:7f1d3d558ef8 ax:0 si:20000880 di:ffffffffff600000 [29251028.968904] potentially unexpected fatal signal 5. [29251028.974142] CPU: 20 PID: 904701 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29251028.986292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29251028.995959] RIP: 0033:0x7fffffffe062 [29251029.000018] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29251029.020614] RSP: 002b:000000c000591b90 EFLAGS: 00000297 [29251029.027588] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29251029.036515] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29251029.045438] RBP: 000000c000591c28 R08: 0000000000000000 R09: 0000000000000000 [29251029.054365] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000591c18 [29251029.063267] R13: 000000c0005a80c0 R14: 000000c0004dca80 R15: 00000000000d9807 [29251029.072200] FS: 000000c00013b098 GS: 0000000000000000 [29254834.854274] exe[956157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc38cd8bb9 cs:33 sp:7eb18458c858 ax:0 si:55dc38d4331a di:ffffffffff600000 [29254941.134758] exe[138757] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56153a5fcbb9 cs:33 sp:7f4468d16ef8 ax:0 si:20000180 di:ffffffffff600000 [29261423.237777] exe[548309] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aea3d1abb9 cs:33 sp:7f7996358ef8 ax:0 si:20000340 di:ffffffffff600000 [29263140.533905] exe[582055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556352f55bb9 cs:33 sp:7f6986861858 ax:0 si:556352fc031a di:ffffffffff600000 [29263642.908648] exe[642615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a359deabb9 cs:33 sp:7fe5b3f3f858 ax:0 si:55a359e5531a di:ffffffffff600000 [29265635.450202] exe[815819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac8535d337 cs:33 sp:7fee72d0fef8 ax:4be00000 si:55ac853dc4be di:ffffffffff600000 [29266239.345183] potentially unexpected fatal signal 11. [29266239.350517] CPU: 70 PID: 849843 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29266239.362487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29266239.372128] RIP: 0033:0x55ad6863bea7 [29266239.376130] Code: 00 00 e9 8f e7 ff ff ba 01 00 00 00 e9 a9 ee ff ff 66 90 41 57 41 56 41 55 49 89 d5 41 54 55 53 48 89 fb 48 81 ec 18 05 00 00 <48> 89 74 24 08 89 4c 24 48 64 48 8b 04 25 28 00 00 00 48 89 84 24 [29266239.396718] RSP: 002b:00007fea7e43bc90 EFLAGS: 00010206 [29266239.403798] RAX: 00007fea7e43c500 RBX: 00007fea7e43c1f0 RCX: 0000000000000000 [29266239.412774] RDX: 00007fea7e43c370 RSI: 000055ad686cf655 RDI: 00007fea7e43c1f0 [29266239.421658] RBP: 00007fea7e43c2e0 R08: 0000000000000000 R09: 0000000000000000 [29266239.430612] R10: 0000000000001000 R11: 0000000000000293 R12: 000055ad686cf655 [29266239.439499] R13: 00007fea7e43c370 R14: 0000000000000000 R15: 00007fea7e43c1f0 [29266239.448443] FS: 000055ad692e2480 GS: 0000000000000000 [29266909.256295] potentially unexpected fatal signal 5. [29266909.261515] CPU: 85 PID: 860205 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29266909.273546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29266909.283724] RIP: 0033:0x7fffffffe062 [29266909.287705] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29266909.306886] RSP: 002b:000000c00065fb90 EFLAGS: 00000297 [29266909.312569] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29266909.321858] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29266909.329419] RBP: 000000c00065fc28 R08: 0000000000000000 R09: 0000000000000000 [29266909.338333] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00065fc18 [29266909.345939] R13: 000000c000668c00 R14: 000000c00015ea80 R15: 00000000000d1c27 [29266909.354818] FS: 000000c000600098 GS: 0000000000000000 [29268258.433166] exe[971519] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e82b1c7bb9 cs:33 sp:7f1cdf557ef8 ax:0 si:20002180 di:ffffffffff600000 [29269969.955218] exe[23327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5583ab041bb9 cs:33 sp:7f244b2cb858 ax:0 si:5583ab0ac31a di:ffffffffff600000 [29270906.808751] exe[126712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643703cebb9 cs:33 sp:7f34680dd858 ax:0 si:56437043934f di:ffffffffff600000 [29273471.425558] exe[309507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e75d66bb9 cs:33 sp:7f57c4ba4858 ax:0 si:564e75dd134f di:ffffffffff600000 [29273565.864875] exe[310323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bda44c3bb9 cs:33 sp:7f54eb8c1858 ax:0 si:55bda452e328 di:ffffffffff600000 [29274164.664434] exe[342367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7dcb2fbb9 cs:33 sp:7ef1ce08eef8 ax:0 si:20006100 di:ffffffffff600000 [29275233.410147] exe[351614] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d63dff3bb9 cs:33 sp:7f4feda93858 ax:0 si:55d63e05e31a di:ffffffffff600000 [29277555.365697] potentially unexpected fatal signal 5. [29277555.371083] CPU: 40 PID: 475670 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29277555.383092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29277555.392725] RIP: 0033:0x7fffffffe062 [29277555.396709] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29277555.416049] RSP: 002b:000000c000635b90 EFLAGS: 00000297 [29277555.423032] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29277555.431980] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29277555.440904] RBP: 000000c000635c28 R08: 0000000000000000 R09: 0000000000000000 [29277555.449815] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000635c18 [29277555.458769] R13: 000000c00063ec00 R14: 000000c0001748c0 R15: 0000000000073046 [29277555.467676] FS: 000000c00013a898 GS: 0000000000000000 [29277655.653052] exe[537169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e83f31ebb9 cs:33 sp:7f8f605feef8 ax:0 si:20002980 di:ffffffffff600000 [29277709.153075] potentially unexpected fatal signal 5. [29277709.158294] CPU: 32 PID: 537766 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29277709.170451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29277709.180072] RIP: 0033:0x7fffffffe062 [29277709.184061] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29277709.203283] RSP: 002b:000000c0005f1b90 EFLAGS: 00000297 [29277709.210316] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29277709.219330] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29277709.228286] RBP: 000000c0005f1c28 R08: 0000000000000000 R09: 0000000000000000 [29277709.237179] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005f1c18 [29277709.246201] R13: 000000c0005cd890 R14: 000000c000522380 R15: 0000000000083050 [29277709.255242] FS: 000000c000600098 GS: 0000000000000000 [29278868.549474] exe[613275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562133cf4bb9 cs:33 sp:7fd8e1a75858 ax:0 si:562133d5f31a di:ffffffffff600000 [29279599.833848] exe[629503] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a455365bb9 cs:33 sp:7f299b057858 ax:0 si:55a4553d031a di:ffffffffff600000 [29279848.989151] exe[648332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557affc45bb9 cs:33 sp:7f9081cd9ef8 ax:0 si:20004100 di:ffffffffff600000 [29280255.584515] exe[701060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bbdb74bb9 cs:33 sp:7fd7f43c9858 ax:0 si:555bbdbdf31a di:ffffffffff600000 [29282690.893438] exe[834953] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d698a4bb9 cs:33 sp:7f74aef90858 ax:0 si:558d6990f31a di:ffffffffff600000 [29282955.461775] exe[840028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568f1a38bb9 cs:33 sp:7f0f09145858 ax:0 si:5568f1aa331a di:ffffffffff600000 [29282977.610443] exe[856162] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d4fb00cbb9 cs:33 sp:7ed77df9c858 ax:0 si:55d4fb07731a di:ffffffffff600000 [29282994.414860] exe[783605] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555f08c7ebb9 cs:33 sp:7ed3c3dfc858 ax:0 si:555f08ce931a di:ffffffffff600000 [29283207.760494] exe[853555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebb7f15bb9 cs:33 sp:7f42e853d858 ax:0 si:55ebb7f8031a di:ffffffffff600000 [29283261.133865] exe[849402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562433af2bb9 cs:33 sp:7ed08c788ef8 ax:0 si:20002700 di:ffffffffff600000 [29283290.451071] exe[878262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f6615ebb9 cs:33 sp:7fe39b1fe858 ax:0 si:563f661c931a di:ffffffffff600000 [29283298.928213] exe[873828] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2c0e9ebb9 cs:33 sp:7f7c5e0f6858 ax:0 si:55f2c0f0931a di:ffffffffff600000 [29283327.021297] exe[851317] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb32c68bb9 cs:33 sp:7f9e19855858 ax:0 si:55bb32cd331a di:ffffffffff600000 [29283404.229564] exe[884199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bf3461cbb9 cs:33 sp:7fc57d07e858 ax:0 si:55bf3468731a di:ffffffffff600000 [29284188.075097] exe[949004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d4ae39bb9 cs:33 sp:7fb383f8eef8 ax:0 si:20000140 di:ffffffffff600000 [29284612.060914] exe[957848] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650720f6337 cs:33 sp:7f9f1b4a6ef8 ax:4be00000 si:5650721754be di:ffffffffff600000 [29284927.219150] exe[988853] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56194aa37bb9 cs:33 sp:7f03cf554858 ax:0 si:56194aaa2328 di:ffffffffff600000 [29286727.551089] potentially unexpected fatal signal 5. [29286727.551616] potentially unexpected fatal signal 5. [29286727.552664] potentially unexpected fatal signal 5. [29286727.552669] CPU: 29 PID: 91839 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29286727.552670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29286727.552675] RIP: 0033:0x7fffffffe062 [29286727.552678] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29286727.552679] RSP: 002b:000000c000535b90 EFLAGS: 00000297 [29286727.552680] RAX: 000000000001b7e4 RBX: 0000000000000000 RCX: 00007fffffffe05a [29286727.552681] RDX: 0000000000000000 RSI: 000000c000536000 RDI: 0000000000012f00 [29286727.552682] RBP: 000000c000535c28 R08: 000000c00077ce20 R09: 0000000000000000 [29286727.552683] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000535c18 [29286727.552684] R13: 000000c0005420c0 R14: 000000c00015fdc0 R15: 0000000000015b29 [29286727.552685] FS: 000000c000180898 GS: 0000000000000000 [29286727.553358] potentially unexpected fatal signal 5. [29286727.553363] CPU: 35 PID: 91630 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29286727.553364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29286727.553369] RIP: 0033:0x7fffffffe062 [29286727.553372] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29286727.553373] RSP: 002b:000000c000535b90 EFLAGS: 00000297 [29286727.553375] RAX: 000000000001b7e5 RBX: 0000000000000000 RCX: 00007fffffffe05a [29286727.553377] RDX: 0000000000000000 RSI: 000000c000536000 RDI: 0000000000012f00 [29286727.553378] RBP: 000000c000535c28 R08: 000000c00001e4c0 R09: 0000000000000000 [29286727.553379] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000535c18 [29286727.553379] R13: 000000c0005420c0 R14: 000000c00015fdc0 R15: 0000000000015b29 [29286727.553380] FS: 000000c000180898 GS: 0000000000000000 [29286727.555354] potentially unexpected fatal signal 5. [29286727.555360] CPU: 1 PID: 88949 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29286727.555362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29286727.555369] RIP: 0033:0x7fffffffe062 [29286727.555373] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29286727.555375] RSP: 002b:000000c000535b90 EFLAGS: 00000297 [29286727.555377] RAX: 000000000001b7e2 RBX: 0000000000000000 RCX: 00007fffffffe05a [29286727.555378] RDX: 0000000000000000 RSI: 000000c000536000 RDI: 0000000000012f00 [29286727.555379] RBP: 000000c000535c28 R08: 000000c0001781f0 R09: 0000000000000000 [29286727.555380] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000535c18 [29286727.555381] R13: 000000c0005420c0 R14: 000000c00015fdc0 R15: 0000000000015b29 [29286727.555382] FS: 000000c000180898 GS: 0000000000000000 [29286727.556310] CPU: 55 PID: 91798 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29286727.556312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29286727.556317] RIP: 0033:0x7fffffffe062 [29286727.556320] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29286727.556322] RSP: 002b:000000c000535b90 EFLAGS: 00000297 [29286727.556324] RAX: 000000000001b7e3 RBX: 0000000000000000 RCX: 00007fffffffe05a [29286727.556324] RDX: 0000000000000000 RSI: 000000c000536000 RDI: 0000000000012f00 [29286727.556326] RBP: 000000c000535c28 R08: 000000c0008365b0 R09: 0000000000000000 [29286727.556330] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000535c18 [29286727.561784] CPU: 85 PID: 91699 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29286727.566956] R13: 000000c0005420c0 R14: 000000c00015fdc0 R15: 0000000000015b29 [29286727.566958] FS: 000000c000180898 GS: 0000000000000000 [29286728.020445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29286728.031492] RIP: 0033:0x7fffffffe062 [29286728.036895] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29286728.057509] RSP: 002b:000000c000535b90 EFLAGS: 00000297 [29286728.064532] RAX: 000000000001b7e6 RBX: 0000000000000000 RCX: 00007fffffffe05a [29286728.073536] RDX: 0000000000000000 RSI: 000000c000536000 RDI: 0000000000012f00 [29286728.082432] RBP: 000000c000535c28 R08: 000000c0009881f0 R09: 0000000000000000 [29286728.091349] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000535c18 [29286728.100284] R13: 000000c0005420c0 R14: 000000c00015fdc0 R15: 0000000000015b29 [29286728.109211] FS: 000000c000180898 GS: 0000000000000000 [29287652.181442] exe[174655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c12582ebb9 cs:33 sp:7faa96dbbef8 ax:0 si:20001b80 di:ffffffffff600000 [29288119.902952] exe[178673] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55708eab8bb9 cs:33 sp:7ecb6ecd3858 ax:0 si:55708eb23328 di:ffffffffff600000 [29289564.047864] exe[204809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bc3982bb9 cs:33 sp:7ef99795cef8 ax:0 si:20000700 di:ffffffffff600000 [29289904.960523] exe[212350] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fa53442337 cs:33 sp:7ebb0176eef8 ax:4be00000 si:55fa534c14be di:ffffffffff600000 [29290345.941113] exe[323237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56309ed03bb9 cs:33 sp:7f4ffeda8858 ax:0 si:56309ed6e31a di:ffffffffff600000 [29290703.869262] exe[323922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557be7bd3bb9 cs:33 sp:7fe71feab858 ax:0 si:557be7c3e31a di:ffffffffff600000 [29290902.688669] potentially unexpected fatal signal 5. [29290902.693924] CPU: 8 PID: 322749 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29290902.696289] potentially unexpected fatal signal 5. [29290902.700388] potentially unexpected fatal signal 5. [29290902.700394] CPU: 79 PID: 341912 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29290902.700396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29290902.700400] RIP: 0033:0x7fffffffe062 [29290902.700403] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29290902.700405] RSP: 002b:000000c000623b90 EFLAGS: 00000297 [29290902.700407] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29290902.700408] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29290902.700408] RBP: 000000c000623c28 R08: 0000000000000000 R09: 0000000000000000 [29290902.700409] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000623c18 [29290902.700410] R13: 000000c0006320c0 R14: 000000c000503340 R15: 000000000004ec69 [29290902.700412] FS: 000000c000180098 GS: 0000000000000000 [29290902.705809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29290902.705815] RIP: 0033:0x7fffffffe062 [29290902.705818] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29290902.705819] RSP: 002b:000000c000623b90 EFLAGS: 00000297 [29290902.705824] RAX: 000000000005ffcf RBX: 0000000000000000 RCX: 00007fffffffe05a [29290902.711088] CPU: 64 PID: 322685 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29290902.717622] RDX: 0000000000000000 RSI: 000000c000624000 RDI: 0000000000012f00 [29290902.717623] RBP: 000000c000623c28 R08: 000000c0004b8100 R09: 0000000000000000 [29290902.717624] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000623c18 [29290902.717624] R13: 000000c0006320c0 R14: 000000c000503340 R15: 000000000004ec69 [29290902.717625] FS: 000000c000180098 GS: 0000000000000000 [29290902.921703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29290902.932831] RIP: 0033:0x7fffffffe062 [29290902.938204] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29290902.958969] RSP: 002b:000000c000623b90 EFLAGS: 00000297 [29290902.965989] RAX: 000000000005ffce RBX: 0000000000000000 RCX: 00007fffffffe05a [29290902.974922] RDX: 0000000000000000 RSI: 000000c000624000 RDI: 0000000000012f00 [29290902.983904] RBP: 000000c000623c28 R08: 000000c000630010 R09: 0000000000000000 [29290902.992833] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000623c18 [29290903.001740] R13: 000000c0006320c0 R14: 000000c000503340 R15: 000000000004ec69 [29290903.010687] FS: 000000c000180098 GS: 0000000000000000 [29291609.561884] exe[406416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a41af5bb9 cs:33 sp:7fac87f61858 ax:0 si:555a41b6031a di:ffffffffff600000 [29291805.963644] exe[451126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558db827d337 cs:33 sp:7eb19e300ef8 ax:4be00000 si:558db82fc4be di:ffffffffff600000 [29291808.542210] exe[451928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55894ff79bb9 cs:33 sp:7f0b65a7e858 ax:0 si:55894ffe434f di:ffffffffff600000 [29291809.330210] exe[425886] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a796f7bb9 cs:33 sp:7ffac95dd858 ax:0 si:555a7976234f di:ffffffffff600000 [29291962.233283] potentially unexpected fatal signal 5. [29291962.238526] CPU: 65 PID: 432305 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29291962.250518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29291962.260249] RIP: 0033:0x7fffffffe062 [29291962.264297] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29291962.284863] RSP: 002b:000000c000667b90 EFLAGS: 00000297 [29291962.291905] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29291962.300830] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29291962.309766] RBP: 000000c000667c28 R08: 0000000000000000 R09: 0000000000000000 [29291962.318730] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000667c18 [29291962.327604] R13: 000000c00067a0c0 R14: 000000c00048ca80 R15: 00000000000696c1 [29291962.336528] FS: 000000000205cbb0 GS: 0000000000000000 [29293174.316882] potentially unexpected fatal signal 5. [29293174.322110] CPU: 4 PID: 546027 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29293174.334020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29293174.343663] RIP: 0033:0x7fffffffe062 [29293174.347674] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29293174.368253] RSP: 002b:000000c00004db08 EFLAGS: 00000297 [29293174.375208] RAX: 000056309d31f000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29293174.382744] RDX: 0000000000000001 RSI: 0000000000021000 RDI: 000056309d31f000 [29293174.391813] RBP: 000000c00004db90 R08: 0000000000000009 R09: 0000000007e6e000 [29293174.400688] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00004da50 [29293174.409595] R13: 000000c000172808 R14: 000000c00036f500 R15: 0000000000084dcf [29293174.418482] FS: 00007f56fbdff6c0 GS: 0000000000000000 [29293498.299084] exe[564387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641eef7dbb9 cs:33 sp:7fd5ad67fef8 ax:0 si:200000c0 di:ffffffffff600000 [29294841.412620] exe[648343] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55db4c258bb9 cs:33 sp:7ff74c5f5858 ax:0 si:55db4c2c334f di:ffffffffff600000 [29295312.062264] exe[666834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd52a07bb9 cs:33 sp:7ff8ac06a858 ax:0 si:55cd52a7231a di:ffffffffff600000 [29295627.005576] exe[691593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560461908bb9 cs:33 sp:7fb9b24e0858 ax:0 si:56046197331a di:ffffffffff600000 [29295767.452518] exe[713975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56443737cbb9 cs:33 sp:7f734d254ef8 ax:0 si:200052c0 di:ffffffffff600000 [29295892.680365] exe[725250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55579d864bb9 cs:33 sp:7eb852ac1ef8 ax:0 si:20002580 di:ffffffffff600000 [29296261.541494] exe[737692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571af775bb9 cs:33 sp:7fe98f94a858 ax:0 si:5571af7e0328 di:ffffffffff600000 [29296689.541259] potentially unexpected fatal signal 5. [29296689.546499] CPU: 82 PID: 774191 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29296689.558486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29296689.568136] RIP: 0033:0x7fffffffe062 [29296689.573714] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29296689.594333] RSP: 002b:000000c000815be8 EFLAGS: 00000297 [29296689.601331] RAX: 00000000000bd5ff RBX: 0000000000000000 RCX: 00007fffffffe05a [29296689.610229] RDX: 0000000000000000 RSI: 000000c000816000 RDI: 0000000000012f00 [29296689.619169] RBP: 000000c000815c80 R08: 000000c000284880 R09: 0000000000000000 [29296689.628081] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000815c70 [29296689.637001] R13: 000000c000830800 R14: 000000c0002456c0 R15: 00000000000bd019 [29296689.645954] FS: 000000c000180098 GS: 0000000000000000 [29299385.580471] exe[937228] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558792b9fbb9 cs:33 sp:7f596f371ef8 ax:0 si:20002440 di:ffffffffff600000 [29299452.284334] exe[940107] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ec3e39bb9 cs:33 sp:7f0975ae2858 ax:0 si:558ec3ea431a di:ffffffffff600000 [29299887.219144] exe[943957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b95c5cbb9 cs:33 sp:7f6c04c89858 ax:0 si:555b95cc731a di:ffffffffff600000 [29300144.242436] exe[934379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56238ee1bbb9 cs:33 sp:7ea9b80c8858 ax:0 si:56238ee8634f di:ffffffffff600000 [29300950.501312] exe[17987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e8835cbb9 cs:33 sp:7fb93ac2d858 ax:0 si:558e883c731a di:ffffffffff600000 [29301013.034394] exe[34785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5563a5cc8337 cs:33 sp:7fa8c53c8ef8 ax:4be00000 si:5563a5d474be di:ffffffffff600000 [29301702.928639] potentially unexpected fatal signal 5. [29301702.933923] CPU: 52 PID: 33990 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29301702.946327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29301702.956147] RIP: 0033:0x7fffffffe062 [29301702.960211] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29301702.980813] RSP: 002b:000000c000641b90 EFLAGS: 00000297 [29301702.987935] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29301702.997150] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29301703.006170] RBP: 000000c000641c28 R08: 0000000000000000 R09: 0000000000000000 [29301703.015347] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000641c18 [29301703.024285] R13: 000000c00064bbc0 R14: 000000c000490e00 R15: 000000000000821d [29301703.033194] FS: 000000c000180898 GS: 0000000000000000 [29302075.334244] exe[113309] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c75f12337 cs:33 sp:7f36b5b03ef8 ax:4be00000 si:564c75f914be di:ffffffffff600000 [29302426.060678] exe[140686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556372623bb9 cs:33 sp:7f9bb9130ef8 ax:0 si:20002d00 di:ffffffffff600000 [29302755.415500] potentially unexpected fatal signal 5. [29302755.420731] CPU: 34 PID: 144801 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29302755.432756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29302755.442428] RIP: 0033:0x7fffffffe062 [29302755.446555] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29302755.465913] RSP: 002b:000000c00066fb90 EFLAGS: 00000297 [29302755.472850] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29302755.481821] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29302755.489425] RBP: 000000c00066fc28 R08: 0000000000000000 R09: 0000000000000000 [29302755.498485] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00066fc18 [29302755.507445] R13: 000000c000525a70 R14: 000000c00050d6c0 R15: 0000000000023476 [29302755.516492] FS: 000000000205cbb0 GS: 0000000000000000 [29302762.010986] potentially unexpected fatal signal 5. [29302762.016221] CPU: 82 PID: 159459 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29302762.028218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29302762.037884] RIP: 0033:0x7fffffffe062 [29302762.041907] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29302762.062511] RSP: 002b:000000c000019b90 EFLAGS: 00000297 [29302762.069541] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29302762.078546] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29302762.087491] RBP: 000000c000019c28 R08: 0000000000000000 R09: 0000000000000000 [29302762.095056] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000019c18 [29302762.103997] R13: 000000c000002c00 R14: 000000c0004b7500 R15: 00000000000255eb [29302762.113183] FS: 000000c00013b898 GS: 0000000000000000 [29303758.502686] potentially unexpected fatal signal 5. [29303758.507926] CPU: 93 PID: 193140 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29303758.519928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29303758.529562] RIP: 0033:0x7fffffffe062 [29303758.533571] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29303758.553021] RSP: 002b:000000c000615b90 EFLAGS: 00000297 [29303758.558824] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29303758.566386] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29303758.573947] RBP: 000000c000615c28 R08: 0000000000000000 R09: 0000000000000000 [29303758.581500] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000615c18 [29303758.589042] R13: 000000c00061e0c0 R14: 000000c000174fc0 R15: 000000000002e41a [29303758.596578] FS: 000000c00013a898 GS: 0000000000000000 [29303965.539156] potentially unexpected fatal signal 5. [29303965.544384] CPU: 20 PID: 230801 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29303965.556709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29303965.566442] RIP: 0033:0x7fffffffe062 [29303965.570447] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29303965.589804] RSP: 002b:000000c00057db90 EFLAGS: 00000297 [29303965.596831] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29303965.604386] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29303965.611958] RBP: 000000c00057dc28 R08: 0000000000000000 R09: 0000000000000000 [29303965.619537] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00057dc18 [29303965.628479] R13: 000000c0007020c0 R14: 000000c000494380 R15: 0000000000035843 [29303965.636035] FS: 000000000205cbb0 GS: 0000000000000000 [29304164.328108] exe[246379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f549e6a337 cs:33 sp:7f4ece8c4ef8 ax:4be00000 si:55f549ee94be di:ffffffffff600000 [29304591.678554] exe[272676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e346a87c1 cs:33 sp:7f5e3f7c4578 ax:8 si:1 di:7f5e3f7c4670 [29304761.374851] exe[285416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8c7d68337 cs:33 sp:7fcc7a7ddef8 ax:4be00000 si:55f8c7de74be di:ffffffffff600000 [29305162.041922] potentially unexpected fatal signal 5. [29305162.047275] CPU: 40 PID: 316184 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29305162.059280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29305162.068967] RIP: 0033:0x7fffffffe062 [29305162.072982] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29305162.092230] RSP: 002b:000000c000471b90 EFLAGS: 00000297 [29305162.099258] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29305162.108191] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29305162.117124] RBP: 000000c000471c28 R08: 0000000000000000 R09: 0000000000000000 [29305162.126118] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000471c18 [29305162.135088] R13: 000000c00047a0c0 R14: 000000c000517880 R15: 000000000004cea0 [29305162.144009] FS: 000000c00013b098 GS: 0000000000000000 [29305311.983360] exe[326127] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e85e5827c1 cs:33 sp:7faf1d0a9578 ax:8 si:1 di:7faf1d0a9670 [29306361.976720] potentially unexpected fatal signal 5. [29306361.981966] CPU: 62 PID: 388969 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29306361.993984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29306362.003594] RIP: 0033:0x7fffffffe062 [29306362.007560] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29306362.026862] RSP: 002b:000000c000287b90 EFLAGS: 00000297 [29306362.032509] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29306362.040075] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29306362.047650] RBP: 000000c000287c28 R08: 0000000000000000 R09: 0000000000000000 [29306362.056586] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000287c18 [29306362.065732] R13: 000000c0001a6c00 R14: 000000c000479340 R15: 000000000005e34a [29306362.074640] FS: 000000c00013a898 GS: 0000000000000000 [29306610.370831] exe[410699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613bd99cbb9 cs:33 sp:7f5b9d1fe858 ax:0 si:5613bda0734f di:ffffffffff600000 [29306699.230043] exe[412917] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc39bedbb9 cs:33 sp:7f5946bf2858 ax:0 si:55dc39c5834f di:ffffffffff600000 [29306823.869085] exe[428873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614c8143bb9 cs:33 sp:7f3d480d6858 ax:0 si:5614c81ae31a di:ffffffffff600000 [29307155.035850] exe[427942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ade8657c1 cs:33 sp:7fc1170fc4c8 ax:8 si:1 di:7fc1170fc5c0 [29307305.414939] exe[278136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c7dd29cbb9 cs:33 sp:7ea61d042858 ax:0 si:55c7dd30731a di:ffffffffff600000 [29307489.401437] exe[349288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd3d6fd337 cs:33 sp:7ea7892fcef8 ax:4be00000 si:55dd3d77c4be di:ffffffffff600000 [29308808.566848] exe[550970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55846c29ebb9 cs:33 sp:7ee6e9257858 ax:0 si:55846c30931a di:ffffffffff600000 [29308987.604647] exe[526399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc765e7bb9 cs:33 sp:7ebf51623ef8 ax:0 si:200032c0 di:ffffffffff600000 [29309140.606815] potentially unexpected fatal signal 5. [29309140.612012] CPU: 73 PID: 575227 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29309140.624011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29309140.633636] RIP: 0033:0x7fffffffe062 [29309140.637600] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29309140.656843] RSP: 002b:000000c00004db08 EFLAGS: 00000297 [29309140.663856] RAX: 0000561cce207000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29309140.672774] RDX: 0000000000000003 RSI: 000000000006e000 RDI: 0000561cce207000 [29309140.681735] RBP: 000000c00004db90 R08: 0000000000000009 R09: 0000000008092000 [29309140.690687] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004da50 [29309140.699626] R13: 0000000002d50280 R14: 000000c000361c00 R15: 000000000008c238 [29309140.708556] FS: 00000000044f23c0 GS: 0000000000000000 [29309691.247005] exe[571153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8ca280337 cs:33 sp:7f4019ffeef8 ax:4be00000 si:55e8ca2ff4be di:ffffffffff600000 [29309978.761993] exe[592262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560540ca9bb9 cs:33 sp:7f2a7ae6f858 ax:0 si:560540d1431a di:ffffffffff600000 [29311128.546477] exe[696488] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e71fc8bb9 cs:33 sp:7f57489fe858 ax:0 si:556e72033328 di:ffffffffff600000 [29312365.559516] exe[736581] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636e6d89bb9 cs:33 sp:7ed2fe98eef8 ax:0 si:20000fc0 di:ffffffffff600000 [29312502.633699] potentially unexpected fatal signal 5. [29312502.639021] CPU: 3 PID: 763739 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29312502.650924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29312502.660577] RIP: 0033:0x7fffffffe062 [29312502.664554] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29312502.683761] RSP: 002b:000000c0006ebb90 EFLAGS: 00000297 [29312502.689414] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29312502.697032] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29312502.706010] RBP: 000000c0006ebc28 R08: 0000000000000000 R09: 0000000000000000 [29312502.714902] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0006ebc18 [29312502.723911] R13: 000000c0000192f0 R14: 000000c00047ee00 R15: 00000000000b9edf [29312502.732821] FS: 000000c000500098 GS: 0000000000000000 [29312811.646315] exe[798883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb9cf99bb9 cs:33 sp:7ffacf195858 ax:0 si:55eb9d00431a di:ffffffffff600000 [29313786.948654] exe[870161] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d88de79bb9 cs:33 sp:7f2df5aae858 ax:0 si:55d88dee431a di:ffffffffff600000 [29314909.161929] potentially unexpected fatal signal 5. [29314909.167164] CPU: 20 PID: 949393 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29314909.179139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29314909.188763] RIP: 0033:0x7fffffffe062 [29314909.192732] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29314909.211944] RSP: 002b:000000c00064bb90 EFLAGS: 00000297 [29314909.217594] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29314909.225159] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29314909.234082] RBP: 000000c00064bc28 R08: 0000000000000000 R09: 0000000000000000 [29314909.241642] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00064bc18 [29314909.250582] R13: 000000c0006560c0 R14: 000000c0005828c0 R15: 00000000000e14d4 [29314909.259511] FS: 000000c000608098 GS: 0000000000000000 [29316109.219965] potentially unexpected fatal signal 5. [29316109.225158] CPU: 47 PID: 998560 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29316109.237138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29316109.246814] RIP: 0033:0x7fffffffe062 [29316109.250820] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29316109.270063] RSP: 002b:000000c0001a9b90 EFLAGS: 00000297 [29316109.277083] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29316109.285990] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29316109.294917] RBP: 000000c0001a9c28 R08: 0000000000000000 R09: 0000000000000000 [29316109.303842] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0001a9c18 [29316109.312766] R13: 000000c00015cc00 R14: 000000c000500c40 R15: 00000000000f38b8 [29316109.321685] FS: 000000c00013b898 GS: 0000000000000000 [29316253.437312] exe[22877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af87206bb9 cs:33 sp:7f3f6f5cc858 ax:0 si:55af8727131a di:ffffffffff600000 [29316257.203044] potentially unexpected fatal signal 5. [29316257.208283] CPU: 7 PID: 48286 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29316257.220078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29316257.229692] RIP: 0033:0x7fffffffe062 [29316257.233673] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29316257.252974] RSP: 002b:000000c0005f5b90 EFLAGS: 00000297 [29316257.259971] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29316257.268915] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29316257.277863] RBP: 000000c0005f5c28 R08: 0000000000000000 R09: 0000000000000000 [29316257.286792] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005f5c18 [29316257.295683] R13: 000000c00072da70 R14: 000000c00025efc0 R15: 000000000000b8bf [29316257.304606] FS: 000000c000514098 GS: 0000000000000000 [29317770.319433] exe[153236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56430d7f0bb9 cs:33 sp:7fb112edf858 ax:0 si:56430d85b34f di:ffffffffff600000 [29319549.368388] exe[255159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614cd626bb9 cs:33 sp:7ff57eb42858 ax:0 si:5614cd69134f di:ffffffffff600000 [29319671.133613] exe[233042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b23f11dbb9 cs:33 sp:7ee0af3feef8 ax:0 si:20000380 di:ffffffffff600000 [29320377.384152] exe[316254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5617706c1337 cs:33 sp:7f8b6724fef8 ax:4be00000 si:5617707404be di:ffffffffff600000 [29321767.252655] exe[401009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55831ee8cbb9 cs:33 sp:7f6da59bc858 ax:0 si:55831eef734f di:ffffffffff600000 [29322515.913956] exe[461378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653e42febb9 cs:33 sp:7f846c68f858 ax:0 si:5653e436931a di:ffffffffff600000 [29323619.397227] exe[552534] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fe745a75b38 ax:0 si:7fe745a75c70 di:19 [29323620.395050] exe[508753] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f90badfeb38 ax:0 si:7f90badfec70 di:19 [29323629.677677] exe[553412] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7facbfabab38 ax:0 si:7facbfabac70 di:19 [29323665.482946] exe[558140] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f8191868b38 ax:0 si:7f8191868c70 di:19 [29323792.683120] exe[551624] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd6309feb38 ax:0 si:7fd6309fec70 di:19 [29323891.353547] exe[510416] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ee580e43b38 ax:0 si:7ee580e43c70 di:19 [29323892.365392] exe[513193] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7eeca3927b38 ax:0 si:7eeca3927c70 di:19 [29324060.510902] exe[582983] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f1ed795eb38 ax:0 si:7f1ed795ec70 di:19 [29325877.207810] exe[695131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564957f33bb9 cs:33 sp:7f54cf975858 ax:0 si:564957f9e31a di:ffffffffff600000 [29327348.475661] exe[736269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd8ee00bb9 cs:33 sp:7ed0b062e858 ax:0 si:55dd8ee6b31a di:ffffffffff600000 [29327611.995016] exe[791676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a66f51bb9 cs:33 sp:7f67bb0a1858 ax:0 si:564a66fbc31a di:ffffffffff600000 [29327937.326735] exe[844658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619ac3f7337 cs:33 sp:7f63c07a7ef8 ax:4be00000 si:5619ac4764be di:ffffffffff600000 [29327955.406778] potentially unexpected fatal signal 5. [29327955.411983] CPU: 87 PID: 821317 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29327955.423966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29327955.433594] RIP: 0033:0x7fffffffe062 [29327955.437576] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29327955.456846] RSP: 002b:000000c000671b90 EFLAGS: 00000297 [29327955.463934] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29327955.472822] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29327955.480381] RBP: 000000c000671c28 R08: 0000000000000000 R09: 0000000000000000 [29327955.489301] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000671c18 [29327955.498210] R13: 000000c00067ac00 R14: 000000c000494a80 R15: 00000000000c78ab [29327955.507135] FS: 000000c00013a898 GS: 0000000000000000 [29328715.838942] exe[897304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ccede77c1 cs:33 sp:7f588f2b74c8 ax:8 si:1 di:7f588f2b75c0 [29329161.915923] potentially unexpected fatal signal 5. [29329161.921162] CPU: 13 PID: 926849 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29329161.933150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29329161.942798] RIP: 0033:0x7fffffffe062 [29329161.946759] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29329161.965944] RSP: 002b:000000c000563b90 EFLAGS: 00000297 [29329161.971619] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29329161.980572] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29329161.989485] RBP: 000000c000563c28 R08: 0000000000000000 R09: 0000000000000000 [29329161.998410] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000563c18 [29329162.007323] R13: 000000c0005740c0 R14: 000000c000175dc0 R15: 00000000000dfab5 [29329162.016257] FS: 000000c00013b098 GS: 0000000000000000 [29333792.509802] exe[138821] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a983e78c39 cs:33 sp:7fe01a0af858 ax:0 si:55a983ee33b8 di:ffffffffff600000 [29333792.752254] exe[137028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a983e78c39 cs:33 sp:7fe01a0af858 ax:0 si:55a983ee33b8 di:ffffffffff600000 [29333793.071369] exe[142435] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649c3e0ec39 cs:33 sp:7f8127a7f858 ax:0 si:5649c3e793b8 di:ffffffffff600000 [29333793.391356] exe[132680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56305eef0c39 cs:33 sp:7f91ba3d2858 ax:0 si:56305ef5b3b8 di:ffffffffff600000 [29333793.656148] exe[147314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a983e78c39 cs:33 sp:7fe01a0af858 ax:0 si:55a983ee33b8 di:ffffffffff600000 [29341473.714616] exe[294905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5593eb068c39 cs:33 sp:7eec062eaef8 ax:0 si:20002380 di:ffffffffff600000 [29341693.142662] potentially unexpected fatal signal 5. [29341693.147877] CPU: 44 PID: 328000 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29341693.159872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29341693.169498] RIP: 0033:0x7fffffffe062 [29341693.173468] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29341693.192680] RSP: 002b:000000c00059db90 EFLAGS: 00000297 [29341693.199697] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29341693.207272] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29341693.216206] RBP: 000000c00059dc28 R08: 0000000000000000 R09: 0000000000000000 [29341693.223849] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00059dc18 [29341693.231402] R13: 000000c00035cb40 R14: 000000c0005a2700 R15: 00000000000499fd [29341693.240325] FS: 000000000205cbb0 GS: 0000000000000000 [29342769.036942] exe[388882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d70bf49c39 cs:33 sp:7ea9519ac858 ax:0 si:55d70bfb43aa di:ffffffffff600000 [29342791.069756] exe[388532] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555f467a0c39 cs:33 sp:7ea163c35858 ax:0 si:555f4680b3aa di:ffffffffff600000 [29343506.504340] exe[435959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b06cadc39 cs:33 sp:7f0c5d3b5858 ax:0 si:563b06d183aa di:ffffffffff600000 [29343637.089680] exe[415485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f05dff5c39 cs:33 sp:7f7f09a6c858 ax:0 si:55f05e0603aa di:ffffffffff600000 [29343875.184953] exe[448401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56126c36cc39 cs:33 sp:7f8553898858 ax:0 si:56126c3d73aa di:ffffffffff600000 [29344011.204542] exe[409135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ba7a28c39 cs:33 sp:7edf319d6858 ax:0 si:561ba7a933aa di:ffffffffff600000 [29344057.442598] exe[419011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c19446c39 cs:33 sp:7f0a8669c858 ax:0 si:563c194b13aa di:ffffffffff600000 [29345016.942955] exe[433435] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d86091f3b7 cs:33 sp:7ec435f42ef8 ax:54e00000 si:55d86099e54e di:ffffffffff600000 [29347897.077573] potentially unexpected fatal signal 5. [29347897.082806] CPU: 39 PID: 571593 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29347897.094786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29347897.104417] RIP: 0033:0x7fffffffe062 [29347897.108423] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29347897.127629] RSP: 002b:000000c0001a5b90 EFLAGS: 00000297 [29347897.133801] RAX: 00000000000961db RBX: 0000000000000000 RCX: 00007fffffffe05a [29347897.142716] RDX: 0000000000000000 RSI: 000000c0001a6000 RDI: 0000000000012f00 [29347897.151630] RBP: 000000c0001a5c28 R08: 000000c0001a81f0 R09: 0000000000000000 [29347897.160561] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0001a5c18 [29347897.169502] R13: 000000c000194c00 R14: 000000c00050a700 R15: 000000000008b8c1 [29347897.178437] FS: 000000c000508898 GS: 0000000000000000 [29348068.748400] exe[599581] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5667e2c39 cs:33 sp:7f94402a2858 ax:0 si:55a56684d3aa di:ffffffffff600000 [29348880.950696] exe[603911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4e7c08c39 cs:33 sp:7f3f35068858 ax:0 si:55f4e7c733aa di:ffffffffff600000 [29349004.814306] exe[640126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56456ada9c39 cs:33 sp:7f29f6138858 ax:0 si:56456ae143aa di:ffffffffff600000 [29349298.148439] exe[633351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e112dd8c39 cs:33 sp:7ec7121a3858 ax:0 si:55e112e433aa di:ffffffffff600000 [29350285.834812] potentially unexpected fatal signal 5. [29350285.840064] CPU: 53 PID: 698797 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29350285.852032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29350285.861694] RIP: 0033:0x7fffffffe062 [29350285.865658] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29350285.884848] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [29350285.890544] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29350285.899527] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29350285.908510] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [29350285.917517] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000029c18 [29350285.926423] R13: 000000c00002fa70 R14: 000000c000170a80 R15: 00000000000aa7b4 [29350285.935331] FS: 000000c000180098 GS: 0000000000000000 [29352692.065633] potentially unexpected fatal signal 5. [29352692.070856] CPU: 78 PID: 871242 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29352692.082936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29352692.092567] RIP: 0033:0x7fffffffe062 [29352692.096647] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29352692.117244] RSP: 002b:000000c00066bb90 EFLAGS: 00000297 [29352692.124247] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29352692.131806] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29352692.140781] RBP: 000000c00066bc28 R08: 0000000000000000 R09: 0000000000000000 [29352692.149896] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00066bc18 [29352692.158844] R13: 000000c000787a70 R14: 000000c000511dc0 R15: 00000000000d47f2 [29352692.166395] FS: 000000000205cbb0 GS: 0000000000000000 [29355170.768279] exe[16926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ca0977c39 cs:33 sp:7f8eabcd0858 ax:0 si:562ca09e23aa di:ffffffffff600000 [29355390.545892] potentially unexpected fatal signal 5. [29355390.551114] CPU: 81 PID: 32122 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29355390.563014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29355390.572661] RIP: 0033:0x7fffffffe062 [29355390.576627] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29355390.595868] RSP: 002b:000000c0007efb08 EFLAGS: 00000297 [29355390.602878] RAX: 000055c6e2b2f000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29355390.611798] RDX: 0000000000000003 RSI: 000000000006e000 RDI: 000055c6e2b2f000 [29355390.620711] RBP: 000000c0007efb90 R08: 0000000000000009 R09: 0000000008381000 [29355390.629637] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0007efa50 [29355390.638565] R13: 000000c000143008 R14: 000000c000239180 R15: 0000000000007796 [29355390.647516] FS: 00007f9205c9e6c0 GS: 0000000000000000 [29356481.264558] exe[86875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1507b3c39 cs:33 sp:7ff29efe1ef8 ax:0 si:200023c0 di:ffffffffff600000 [29357414.065800] exe[49846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563534881c39 cs:33 sp:7fa38be34858 ax:0 si:5635348ec3aa di:ffffffffff600000 [29357438.715423] exe[112638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f12fd2fc39 cs:33 sp:7f58266d2858 ax:0 si:55f12fd9a3aa di:ffffffffff600000 [29357476.005904] exe[122155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555812ea9c39 cs:33 sp:7f4545b9a858 ax:0 si:555812f143aa di:ffffffffff600000 [29357492.372285] potentially unexpected fatal signal 5. [29357492.377504] CPU: 11 PID: 137870 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29357492.389499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29357492.399141] RIP: 0033:0x7fffffffe062 [29357492.403161] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29357492.422974] RSP: 002b:000000c000647b90 EFLAGS: 00000297 [29357492.430012] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29357492.438908] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29357492.447849] RBP: 000000c000647c28 R08: 0000000000000000 R09: 0000000000000000 [29357492.456804] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000647c18 [29357492.465759] R13: 000000c000014150 R14: 000000c000179180 R15: 00000000000214f0 [29357492.473333] FS: 000000c000180898 GS: 0000000000000000 [29357590.749754] exe[145722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5556407dbc39 cs:33 sp:7ea314c39858 ax:0 si:5556408463aa di:ffffffffff600000 [29357731.746459] exe[159386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5556bd2f3c39 cs:33 sp:7f18b3b24858 ax:0 si:5556bd35e3aa di:ffffffffff600000 [29357731.769807] exe[153268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3f01bcc39 cs:33 sp:7ed629630858 ax:0 si:55e3f02273aa di:ffffffffff600000 [29357734.075572] exe[156608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b25ecfbc39 cs:33 sp:7ff0a7caa858 ax:0 si:55b25ed663aa di:ffffffffff600000 [29357884.650751] exe[166966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561363bebc39 cs:33 sp:7f21823fe858 ax:0 si:561363c563aa di:ffffffffff600000 [29359831.818758] exe[252339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f81f8dc39 cs:33 sp:7fc2cc6f3858 ax:0 si:562f81ff83df di:ffffffffff600000 [29359951.960716] exe[289962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630f231a3b7 cs:33 sp:7f4f85777ef8 ax:54e00000 si:5630f239954e di:ffffffffff600000 [29360846.412135] exe[296459] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55765c669c39 cs:33 sp:7f3836b58858 ax:0 si:55765c6d43aa di:ffffffffff600000 [29361081.667502] exe[346982] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562413d16c39 cs:33 sp:7f4dc68e8858 ax:0 si:562413d813aa di:ffffffffff600000 [29364226.139648] exe[409303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613ba1e53b7 cs:33 sp:7ea1742daef8 ax:54e00000 si:5613ba26454e di:ffffffffff600000 [29364966.251737] exe[555694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555809f057c1 cs:33 sp:7fd0fa5534c8 ax:8 si:1 di:7fd0fa5535c0 [29365779.948986] potentially unexpected fatal signal 5. [29365779.954199] CPU: 41 PID: 626762 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29365779.966293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29365779.975952] RIP: 0033:0x7fffffffe062 [29365779.979963] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29365780.000519] RSP: 002b:000000c0008b7b08 EFLAGS: 00000297 [29365780.007552] RAX: 0000563d6cfc7000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29365780.016453] RDX: 0000000000000001 RSI: 0000000000021000 RDI: 0000563d6cfc7000 [29365780.025427] RBP: 000000c0008b7b90 R08: 0000000000000009 R09: 00000000083a0000 [29365780.034370] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0008b7a50 [29365780.043300] R13: 000000c000180008 R14: 000000c0001b01c0 R15: 0000000000098987 [29365780.052344] FS: 00007fd7d6b9c6c0 GS: 0000000000000000 [29365946.493744] exe[643385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614a69d07c1 cs:33 sp:7f8f2bad94c8 ax:8 si:1 di:7f8f2bad95c0 [29368288.626493] exe[725508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1ec33fc39 cs:33 sp:7ef785bfe858 ax:0 si:55f1ec3aa3df di:ffffffffff600000 [29372003.752001] exe[958823] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b825403b7 cs:33 sp:7fad75bfdef8 ax:54e00000 si:561b825bf54e di:ffffffffff600000 [29372257.661527] exe[958844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559099a98c39 cs:33 sp:7f4720f2b858 ax:0 si:559099b033df di:ffffffffff600000 [29373137.212178] potentially unexpected fatal signal 11. [29373137.217485] CPU: 6 PID: 21101 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29373137.220714] potentially unexpected fatal signal 11. [29373137.229346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29373137.234644] CPU: 32 PID: 28117 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29373137.234648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29373137.244285] RIP: 0033:0x556673844a47 [29373137.247136] potentially unexpected fatal signal 5. [29373137.247142] CPU: 1 PID: 21967 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29373137.247144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29373137.247150] RIP: 0033:0x7fffffffe062 [29373137.247153] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29373137.247154] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [29373137.247156] RAX: 0000560123600000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29373137.247157] RDX: 0000000000000003 RSI: 0000000000198000 RDI: 0000560123600000 [29373137.247158] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000000fa00000 [29373137.247159] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00004d9c8 [29373137.247159] R13: 000000c000143808 R14: 000000c0001c7dc0 R15: 000000000000376a [29373137.247161] FS: 00007fbf2339d6c0 GS: 0000000000000000 [29373137.256202] RIP: 0033:0x555ddbd31a47 [29373137.256207] Code: 44 00 00 48 83 ec 08 48 89 fa 48 89 f1 31 ff 31 f6 e8 9d e8 02 00 85 c0 75 09 48 83 c4 08 c3 0f 1f 40 00 48 c7 c2 b0 ff ff ff <64> 89 02 b8 ff ff ff ff eb e6 66 2e 0f 1f 84 00 00 00 00 00 0f 1f [29373137.256209] RSP: 002b:00007fe3fda20500 EFLAGS: 00010202 [29373137.256210] RAX: 0000000000000004 RBX: 0000000000002dc0 RCX: 0000555ddbd602f3 [29373137.256211] RDX: ffffffffffffffb0 RSI: 0000000000000000 RDI: 0000000000000000 [29373137.256213] RBP: 00007fe3fda2058c R08: 0000000019f83393 R09: 00000000000001bc [29373137.256216] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000032 [29373137.260021] potentially unexpected fatal signal 5. [29373137.260026] CPU: 75 PID: 78388 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29373137.260028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29373137.260033] RIP: 0033:0x7fffffffe062 [29373137.260036] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29373137.260038] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [29373137.260040] RAX: 000055816ba00000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29373137.260041] RDX: 0000000000000001 RSI: 0000000000159000 RDI: 000055816ba00000 [29373137.260042] RBP: 000000c00004db30 R08: 0000000000000009 R09: 0000000008a7d000 [29373137.260043] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00004d9c8 [29373137.260044] R13: 000000c000180008 R14: 000000c00017d340 R15: 000000000000b9e3 [29373137.260046] FS: 00007f942effd6c0 GS: 0000000000000000 [29373137.265871] Code: 44 00 00 48 83 ec 08 48 89 fa 48 89 f1 31 ff 31 f6 e8 9d e8 02 00 85 c0 75 09 48 83 c4 08 c3 0f 1f 40 00 48 c7 c2 b0 ff ff ff <64> 89 02 b8 ff ff ff ff eb e6 66 2e 0f 1f 84 00 00 00 00 00 0f 1f [29373137.265873] RSP: 002b:00007f4ccb742500 EFLAGS: 00010202 [29373137.265875] RAX: 0000000000000004 RBX: 0000000000002bc4 RCX: 00005566738732f3 [29373137.265876] RDX: ffffffffffffffb0 RSI: 0000000000000000 RDI: 0000000000000000 [29373137.265877] RBP: 00007f4ccb74258c R08: 000000002fe2f7d4 R09: 00000000000002a2 [29373137.265877] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000032 [29373137.265878] R13: 00000000000523a3 R14: 000000000005236c R15: 0000000000000003 [29373137.265879] FS: 00005566744b7480 GS: 0000000000000000 [29373137.267397] potentially unexpected fatal signal 5. [29373137.267883] potentially unexpected fatal signal 11. [29373137.267887] CPU: 35 PID: 78901 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29373137.267889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29373137.267893] RIP: 0033:0x55c54d953f8f [29373137.267896] Code: 25 10 00 00 00 be 18 00 00 00 48 8d b8 e0 02 00 00 66 48 0f 6e c7 66 0f 6c c0 0f 11 80 d8 02 00 00 b8 11 01 00 00 0f 05 89 d0 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 ba ff ff ff ff 89 d0 c3 66 [29373137.267898] RSP: 002b:00007f82950c1438 EFLAGS: 00010246 [29373137.267900] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000055c54d953f8d [29373137.267901] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 000055c54e5c6760 [29373137.267902] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [29373137.267903] R10: 000055c54e5c6750 R11: 0000000000000246 R12: 0000000000000001 [29373137.267904] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [29373137.267905] FS: 000055c54e5c6480 GS: 0000000000000000 [29373137.269908] R13: 00000000000360fb R14: 00000000000360dc R15: 0000000000000004 [29373137.269912] FS: 0000555ddc9a4480 GS: 0000000000000000 [29373137.275140] CPU: 3 PID: 79384 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29373137.275165] potentially unexpected fatal signal 5. [29373137.275169] CPU: 44 PID: 78959 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29373137.275170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29373137.275173] RIP: 0033:0x7fffffffe062 [29373137.275176] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29373137.275177] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [29373137.275179] RAX: 00007f82950c0000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29373137.275180] RDX: 0000000000000001 RSI: 0000000000002000 RDI: 00007f82950c0000 [29373137.275181] RBP: 000000c00004db30 R08: 0000000000000009 R09: 00000000057f7000 [29373137.275183] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00004d9c8 [29373137.275184] R13: 000000c000180008 R14: 000000c00017d340 R15: 000000000000b9e3 [29373137.275185] FS: 00007f942effd6c0 GS: 0000000000000000 [29373137.889949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29373137.901001] RIP: 0033:0x7fffffffe062 [29373137.906354] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29373137.927013] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [29373137.934014] RAX: 0000560666782000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29373137.942917] RDX: 0000000000000003 RSI: 0000000000001000 RDI: 0000560666782000 [29373137.951833] RBP: 000000c00004db30 R08: 0000000000000009 R09: 00000000057f0000 [29373137.960864] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [29373137.969822] R13: 000000c000180008 R14: 000000c00017d340 R15: 000000000000b9e3 [29373137.978789] FS: 00007f942effd6c0 GS: 0000000000000000 [29376779.350980] potentially unexpected fatal signal 5. [29376779.356204] CPU: 6 PID: 167658 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29376779.368141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29376779.377899] RIP: 0033:0x7fffffffe062 [29376779.381909] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29376779.402510] RSP: 002b:000000c000021b90 EFLAGS: 00000297 [29376779.409504] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29376779.418401] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29376779.427529] RBP: 000000c000021c28 R08: 0000000000000000 R09: 0000000000000000 [29376779.429086] potentially unexpected fatal signal 5. [29376779.436445] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000021c18 [29376779.443032] CPU: 94 PID: 133229 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29376779.443034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29376779.443038] RIP: 0033:0x7fffffffe062 [29376779.443041] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29376779.443042] RSP: 002b:000000c000021b90 EFLAGS: 00000297 [29376779.443044] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29376779.443044] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29376779.443045] RBP: 000000c000021c28 R08: 0000000000000000 R09: 0000000000000000 [29376779.443046] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000021c18 [29376779.443047] R13: 000000c000028c00 R14: 000000c000467a40 R15: 0000000000015885 [29376779.443047] FS: 000000c000588098 GS: 0000000000000000 [29376779.554066] R13: 000000c000028c00 R14: 000000c000467a40 R15: 0000000000015885 [29376779.563013] FS: 000000c000588098 GS: 0000000000000000 [29376779.624326] potentially unexpected fatal signal 5. [29376779.630187] CPU: 75 PID: 153491 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29376779.643586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29376779.654550] RIP: 0033:0x7fffffffe062 [29376779.659915] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29376779.680467] RSP: 002b:000000c000021b90 EFLAGS: 00000297 [29376779.687502] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29376779.696375] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29376779.705288] RBP: 000000c000021c28 R08: 0000000000000000 R09: 0000000000000000 [29376779.714282] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000021c18 [29376779.723231] R13: 000000c000028c00 R14: 000000c000467a40 R15: 0000000000015885 [29376779.732127] FS: 000000c000588098 GS: 0000000000000000 [29376784.453128] potentially unexpected fatal signal 5. [29376784.458370] CPU: 51 PID: 193658 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29376784.463444] potentially unexpected fatal signal 5. [29376784.470397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29376784.475605] CPU: 52 PID: 112420 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29376784.475608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29376784.475616] RIP: 0033:0x7fffffffe062 [29376784.485253] RIP: 0033:0x7fffffffe062 [29376784.485258] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29376784.485259] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [29376784.485261] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29376784.485262] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29376784.485262] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [29376784.485263] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000029c18 [29376784.485264] R13: 000000c00016a150 R14: 000000c00047b340 R15: 0000000000016df3 [29376784.485264] FS: 000000c000468098 GS: 0000000000000000 [29376784.492346] potentially unexpected fatal signal 5. [29376784.497265] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29376784.497270] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [29376784.506941] CPU: 87 PID: 193659 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29376784.506943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29376784.506948] RIP: 0033:0x7fffffffe062 [29376784.506950] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29376784.506951] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [29376784.506954] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29376784.506954] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29376784.506955] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [29376784.506956] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000029c18 [29376784.506956] R13: 000000c00016a150 R14: 000000c00047b340 R15: 0000000000016df3 [29376784.506957] FS: 000000c000468098 GS: 0000000000000000 [29376784.713014] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29376784.721985] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29376784.729542] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [29376784.737098] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000029c18 [29376784.746059] R13: 000000c00016a150 R14: 000000c00047b340 R15: 0000000000016df3 [29376784.754985] FS: 000000c000468098 GS: 0000000000000000 [29377498.278350] exe[228316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7038c4c39 cs:33 sp:7f396eb7d858 ax:0 si:55b70392f3b8 di:ffffffffff600000 [29377499.005981] exe[228169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558758e28c39 cs:33 sp:7f0f431a1858 ax:0 si:558758e933b8 di:ffffffffff600000 [29377499.582600] exe[228282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7038c4c39 cs:33 sp:7f396eb7d858 ax:0 si:55b70392f3b8 di:ffffffffff600000 [29377500.198703] exe[222579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7038c4c39 cs:33 sp:7f396eb7d858 ax:0 si:55b70392f3b8 di:ffffffffff600000 [29377500.851639] exe[205429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558758e28c39 cs:33 sp:7f0f431a1858 ax:0 si:558758e933b8 di:ffffffffff600000 [29384005.882353] potentially unexpected fatal signal 5. [29384005.887565] CPU: 25 PID: 278720 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29384005.899552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29384005.909264] RIP: 0033:0x7fffffffe062 [29384005.913235] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29384005.932466] RSP: 002b:000000c0005b7b90 EFLAGS: 00000297 [29384005.938103] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29384005.947035] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29384005.956077] RBP: 000000c0005b7c28 R08: 0000000000000000 R09: 0000000000000000 [29384005.964977] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005b7c18 [29384005.973863] R13: 000000c0005ada70 R14: 000000c00059a700 R15: 000000000004359e [29384005.982852] FS: 000000000205cbb0 GS: 0000000000000000 [29384016.840915] potentially unexpected fatal signal 5. [29384016.841585] potentially unexpected fatal signal 5. [29384016.846187] CPU: 76 PID: 283565 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29384016.851462] CPU: 61 PID: 283117 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29384016.851466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29384016.863431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29384016.863436] RIP: 0033:0x7fffffffe062 [29384016.863440] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29384016.863441] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [29384016.863442] RAX: 0000000000059793 RBX: 0000000000000000 RCX: 00007fffffffe05a [29384016.863446] RDX: 0000000000000000 RSI: 000000c00004e000 RDI: 0000000000012f00 [29384016.875427] RIP: 0033:0x7fffffffe062 [29384016.885051] RBP: 000000c00004db30 R08: 000000c00026c5b0 R09: 0000000000000000 [29384016.885053] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00004d9c8 [29384016.885053] R13: 0000000002bd1a00 R14: 000000c000182a80 R15: 0000000000045067 [29384016.885054] FS: 000000000508e3c0 GS: 0000000000000000 [29384016.974182] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29384016.994740] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [29384017.001751] RAX: 0000000000059790 RBX: 0000000000000000 RCX: 00007fffffffe05a [29384017.010671] RDX: 0000000000000000 RSI: 000000c00004e000 RDI: 0000000000012f00 [29384017.019584] RBP: 000000c00004db30 R08: 000000c00026c3d0 R09: 0000000000000000 [29384017.028511] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00004d9c8 [29384017.036131] R13: 0000000002bd1a00 R14: 000000c000182a80 R15: 0000000000045067 [29384017.045055] FS: 000000000508e3c0 GS: 0000000000000000 [29384076.519890] exe[361000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f99c23b7 cs:33 sp:7eacc8c73ef8 ax:54e00000 si:5631f9a4154e di:ffffffffff600000 [29385245.504371] potentially unexpected fatal signal 5. [29385245.509600] CPU: 52 PID: 418973 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29385245.521594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29385245.531245] RIP: 0033:0x7fffffffe062 [29385245.535240] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29385245.554441] RSP: 002b:000000c0004cdb90 EFLAGS: 00000297 [29385245.561449] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29385245.570374] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29385245.579366] RBP: 000000c0004cdc28 R08: 0000000000000000 R09: 0000000000000000 [29385245.588279] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0004cdc18 [29385245.597224] R13: 000000c0004849f0 R14: 000000c0001ce8c0 R15: 000000000006615a [29385245.606231] FS: 000000000205cbb0 GS: 0000000000000000 [29386459.099560] potentially unexpected fatal signal 5. [29386459.104936] CPU: 95 PID: 460613 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29386459.117006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29386459.126766] RIP: 0033:0x7fffffffe062 [29386459.130810] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29386459.151656] RSP: 002b:000000c00062bb90 EFLAGS: 00000297 [29386459.158663] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29386459.167600] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29386459.176577] RBP: 000000c00062bc28 R08: 0000000000000000 R09: 0000000000000000 [29386459.185533] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00062bc18 [29386459.194525] R13: 000000c000635bc0 R14: 000000c000518a80 R15: 000000000006e210 [29386459.203432] FS: 000000c000180898 GS: 0000000000000000 [29386983.966187] exe[420068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f050dcc39 cs:33 sp:7ff629728858 ax:0 si:557f051473aa di:ffffffffff600000 [29390059.121636] potentially unexpected fatal signal 5. [29390059.126849] CPU: 30 PID: 621855 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29390059.138831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29390059.148504] RIP: 0033:0x7fffffffe062 [29390059.152484] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29390059.171702] RSP: 002b:000000c000161b90 EFLAGS: 00000297 [29390059.177354] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29390059.185106] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29390059.192698] RBP: 000000c000161c28 R08: 0000000000000000 R09: 0000000000000000 [29390059.200457] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000161c18 [29390059.208028] R13: 000000c00012dbc0 R14: 000000c0005116c0 R15: 0000000000090c19 [29390059.217262] FS: 000000000205cbb0 GS: 0000000000000000 [29393744.976553] exe[726866] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f6b82dc39 cs:33 sp:7eb8be17d858 ax:0 si:559f6b8983aa di:ffffffffff600000 [29394845.148182] potentially unexpected fatal signal 5. [29394845.148615] potentially unexpected fatal signal 5. [29394845.153425] CPU: 94 PID: 830552 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29394845.153427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29394845.153431] RIP: 0033:0x7fffffffe062 [29394845.153434] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29394845.153435] RSP: 002b:000000c0001bfb90 EFLAGS: 00000297 [29394845.153437] RAX: 00000000000d1691 RBX: 0000000000000000 RCX: 00007fffffffe05a [29394845.153437] RDX: 0000000000000000 RSI: 000000c0001c0000 RDI: 0000000000012f00 [29394845.153438] RBP: 000000c0001bfc28 R08: 000000c0005de4c0 R09: 0000000000000000 [29394845.153438] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0001bfc18 [29394845.153439] R13: 000000c0001eea20 R14: 000000c000183880 R15: 00000000000cac2f [29394845.153440] FS: 000000c00013b098 GS: 0000000000000000 [29394845.256667] CPU: 27 PID: 830523 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29394845.270331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29394845.281540] RIP: 0033:0x7fffffffe062 [29394845.287043] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29394845.307615] RSP: 002b:000000c0001bfb90 EFLAGS: 00000297 [29394845.314686] RAX: 00000000000d1690 RBX: 0000000000000000 RCX: 00007fffffffe05a [29394845.323643] RDX: 0000000000000000 RSI: 000000c0001c0000 RDI: 0000000000012f00 [29394845.332665] RBP: 000000c0001bfc28 R08: 000000c000316010 R09: 0000000000000000 [29394845.341625] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0001bfc18 [29394845.350580] R13: 000000c0001eea20 R14: 000000c000183880 R15: 00000000000cac2f [29394845.359819] FS: 000000c00013b098 GS: 0000000000000000 [29397437.514777] exe[911066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ce8adcc39 cs:33 sp:7fe318064858 ax:0 si:562ce8b473b8 di:ffffffffff600000 [29397438.443929] exe[897688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ce8adcc39 cs:33 sp:7fe318064858 ax:0 si:562ce8b473b8 di:ffffffffff600000 [29397439.245861] exe[908301] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5652a6990c39 cs:33 sp:7f8ce37fe858 ax:0 si:5652a69fb3b8 di:ffffffffff600000 [29397439.804043] exe[4203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5652a6990c39 cs:33 sp:7f8ce37fe858 ax:0 si:5652a69fb3b8 di:ffffffffff600000 [29397440.372879] exe[955580] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5652a6990c39 cs:33 sp:7f8ce37fe858 ax:0 si:5652a69fb3b8 di:ffffffffff600000 [29404565.430295] exe[164699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628a109a3b7 cs:33 sp:7f36ee1feef8 ax:54e00000 si:5628a111954e di:ffffffffff600000 [29408653.680329] potentially unexpected fatal signal 5. [29408653.685234] potentially unexpected fatal signal 5. [29408653.685650] CPU: 78 PID: 304507 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29408653.689916] potentially unexpected fatal signal 5. [29408653.689921] CPU: 74 PID: 309550 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29408653.689923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29408653.689927] RIP: 0033:0x7fffffffe062 [29408653.689930] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29408653.689932] RSP: 002b:000000c0005c9b90 EFLAGS: 00000297 [29408653.689934] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29408653.689935] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29408653.689936] RBP: 000000c0005c9c28 R08: 0000000000000000 R09: 0000000000000000 [29408653.689937] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005c9c18 [29408653.689938] R13: 000000c0005d2c00 R14: 000000c000183340 R15: 000000000004a473 [29408653.689939] FS: 000000000205cbb0 GS: 0000000000000000 [29408653.690851] CPU: 1 PID: 308885 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29408653.690853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29408653.690859] RIP: 0033:0x7fffffffe062 [29408653.690862] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29408653.690863] RSP: 002b:000000c0005c9b90 EFLAGS: 00000297 [29408653.695218] potentially unexpected fatal signal 5. [29408653.695221] CPU: 86 PID: 306729 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29408653.695222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29408653.695225] RIP: 0033:0x7fffffffe062 [29408653.695227] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29408653.695228] RSP: 002b:000000c0005c9b90 EFLAGS: 00000297 [29408653.695229] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29408653.695230] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29408653.695231] RBP: 000000c0005c9c28 R08: 0000000000000000 R09: 0000000000000000 [29408653.695232] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005c9c18 [29408653.695233] R13: 000000c0005d2c00 R14: 000000c000183340 R15: 000000000004a473 [29408653.695234] FS: 000000000205cbb0 GS: 0000000000000000 [29408653.696729] potentially unexpected fatal signal 5. [29408653.696734] CPU: 64 PID: 305498 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29408653.696736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29408653.696742] RIP: 0033:0x7fffffffe062 [29408653.696744] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29408653.696746] RSP: 002b:000000c0005c9b90 EFLAGS: 00000297 [29408653.696748] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29408653.696749] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29408653.696750] RBP: 000000c0005c9c28 R08: 0000000000000000 R09: 0000000000000000 [29408653.696751] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005c9c18 [29408653.696752] R13: 000000c0005d2c00 R14: 000000c000183340 R15: 000000000004a473 [29408653.696753] FS: 000000000205cbb0 GS: 0000000000000000 [29408653.702814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29408653.702819] RIP: 0033:0x7fffffffe062 [29408653.702822] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29408653.702824] RSP: 002b:000000c0005c9b90 EFLAGS: 00000297 [29408653.702826] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29408653.702827] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29408653.702827] RBP: 000000c0005c9c28 R08: 0000000000000000 R09: 0000000000000000 [29408653.702828] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005c9c18 [29408653.702829] R13: 000000c0005d2c00 R14: 000000c000183340 R15: 000000000004a473 [29408653.702830] FS: 000000000205cbb0 GS: 0000000000000000 [29408653.716466] potentially unexpected fatal signal 5. [29408653.720068] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29408653.729716] CPU: 11 PID: 305016 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29408653.729718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29408653.729725] RIP: 0033:0x7fffffffe062 [29408653.729729] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29408653.729730] RSP: 002b:000000c0005c9b90 EFLAGS: 00000297 [29408653.733120] potentially unexpected fatal signal 5. [29408653.733123] CPU: 6 PID: 304772 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29408653.733124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29408653.733127] RIP: 0033:0x7fffffffe062 [29408653.733130] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29408653.733131] RSP: 002b:000000c0005c9b90 EFLAGS: 00000297 [29408653.733133] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29408653.733134] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29408653.733135] RBP: 000000c0005c9c28 R08: 0000000000000000 R09: 0000000000000000 [29408653.733135] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005c9c18 [29408653.733136] R13: 000000c0005d2c00 R14: 000000c000183340 R15: 000000000004a473 [29408653.733137] FS: 000000000205cbb0 GS: 0000000000000000 [29408653.735076] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29408653.735077] RBP: 000000c0005c9c28 R08: 0000000000000000 R09: 0000000000000000 [29408653.735078] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005c9c18 [29408653.735079] R13: 000000c0005d2c00 R14: 000000c000183340 R15: 000000000004a473 [29408653.735080] FS: 000000000205cbb0 GS: 0000000000000000 [29408653.736208] potentially unexpected fatal signal 5. [29408653.748271] potentially unexpected fatal signal 5. [29408653.748276] CPU: 57 PID: 307168 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29408653.748278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29408653.748283] RIP: 0033:0x7fffffffe062 [29408653.748287] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29408653.748288] RSP: 002b:000000c0005c9b90 EFLAGS: 00000297 [29408653.748291] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29408653.748293] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29408653.748294] RBP: 000000c0005c9c28 R08: 0000000000000000 R09: 0000000000000000 [29408653.748295] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005c9c18 [29408653.748296] R13: 000000c0005d2c00 R14: 000000c000183340 R15: 000000000004a473 [29408653.748298] FS: 000000000205cbb0 GS: 0000000000000000 [29408653.755624] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29408653.755625] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29408653.755626] RBP: 000000c0005c9c28 R08: 0000000000000000 R09: 0000000000000000 [29408653.755626] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005c9c18 [29408653.755627] R13: 000000c0005d2c00 R14: 000000c000183340 R15: 000000000004a473 [29408653.755628] FS: 000000000205cbb0 GS: 0000000000000000 [29408654.543350] CPU: 4 PID: 305351 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29408654.555279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29408654.566319] RIP: 0033:0x7fffffffe062 [29408654.571683] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29408654.592255] RSP: 002b:000000c0005c9b90 EFLAGS: 00000297 [29408654.599304] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29408654.606892] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29408654.615829] RBP: 000000c0005c9c28 R08: 0000000000000000 R09: 0000000000000000 [29408654.624756] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005c9c18 [29408654.633742] R13: 000000c0005d2c00 R14: 000000c000183340 R15: 000000000004a473 [29408654.642662] FS: 000000000205cbb0 GS: 0000000000000000 [29409925.931326] exe[367139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ce302d3b7 cs:33 sp:7ef79e42eef8 ax:54e00000 si:559ce30ac54e di:ffffffffff600000 [29410830.814924] exe[400582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f76d027c39 cs:33 sp:7f996e575858 ax:0 si:55f76d0923aa di:ffffffffff600000 [29411648.040111] potentially unexpected fatal signal 5. [29411648.045324] CPU: 79 PID: 438197 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29411648.057321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29411648.066971] RIP: 0033:0x7fffffffe062 [29411648.070961] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29411648.090193] RSP: 002b:000000c000785be8 EFLAGS: 00000297 [29411648.097236] RAX: 000000000006b149 RBX: 0000000000000000 RCX: 00007fffffffe05a [29411648.104778] RDX: 0000000000000000 RSI: 000000c000786000 RDI: 0000000000012f00 [29411648.113706] RBP: 000000c000785c80 R08: 000000c000834010 R09: 0000000000000000 [29411648.121277] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000785c70 [29411648.130216] R13: 000000c0006af000 R14: 000000c00032d880 R15: 000000000006af9f [29411648.139203] FS: 000000c00013a898 GS: 0000000000000000 [29411659.090197] exe[426908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e8feb6c39 cs:33 sp:7f4bd66bc858 ax:0 si:560e8ff213df di:ffffffffff600000 [29413193.726725] exe[507269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589cea95c39 cs:33 sp:7fc8ceb4d858 ax:0 si:5589ceb003aa di:ffffffffff600000 [29413203.228444] exe[502073] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d26bddec39 cs:33 sp:7ef26e9a3858 ax:0 si:55d26be493aa di:ffffffffff600000 [29413406.862593] exe[528819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5c84bdc39 cs:33 sp:7fe49afe8858 ax:0 si:55a5c85283aa di:ffffffffff600000 [29413452.195924] exe[513623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c17500c39 cs:33 sp:7f5f21d29858 ax:0 si:562c1756b3aa di:ffffffffff600000 [29413594.657493] exe[534240] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633fbf63c39 cs:33 sp:7f66c9fc1858 ax:0 si:5633fbfce3aa di:ffffffffff600000 [29414786.052654] exe[513290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56185efdbc39 cs:33 sp:7eb082af0858 ax:0 si:56185f0463aa di:ffffffffff600000 [29415770.348822] potentially unexpected fatal signal 5. [29415770.354051] CPU: 7 PID: 643941 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29415770.365930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29415770.375538] RIP: 0033:0x7fffffffe062 [29415770.379514] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29415770.398765] RSP: 002b:000000c000031b90 EFLAGS: 00000297 [29415770.405789] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29415770.414885] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29415770.423805] RBP: 000000c000031c28 R08: 0000000000000000 R09: 0000000000000000 [29415770.432806] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000031c18 [29415770.441707] R13: 000000c000162c00 R14: 000000c000372700 R15: 000000000009d074 [29415770.450643] FS: 000000c0002a8098 GS: 0000000000000000 [29416399.284581] exe[504966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557202792c39 cs:33 sp:7f2ed5674858 ax:0 si:5572027fd3aa di:ffffffffff600000 [29420082.996513] potentially unexpected fatal signal 5. [29420083.001720] CPU: 95 PID: 824456 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29420083.013728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29420083.023361] RIP: 0033:0x7fffffffe062 [29420083.027360] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29420083.046592] RSP: 002b:000000c00066db90 EFLAGS: 00000297 [29420083.052259] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29420083.059815] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29420083.067369] RBP: 000000c00066dc28 R08: 0000000000000000 R09: 0000000000000000 [29420083.074912] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00066dc18 [29420083.082465] R13: 000000c000676c00 R14: 000000c00058a700 R15: 00000000000b1f94 [29420083.090008] FS: 000000000205cbb0 GS: 0000000000000000 [29420236.313826] exe[838768] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8a64d6c39 cs:33 sp:7f8ab3547858 ax:0 si:55a8a65413b8 di:ffffffffff600000 [29420237.093419] exe[839816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8a64d6c39 cs:33 sp:7f8ab3547858 ax:0 si:55a8a65413b8 di:ffffffffff600000 [29420238.238075] exe[832141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5585a28e1c39 cs:33 sp:7f342156c858 ax:0 si:5585a294c3b8 di:ffffffffff600000 [29420372.375031] potentially unexpected fatal signal 5. [29420372.380261] CPU: 28 PID: 850287 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29420372.392248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29420372.401863] RIP: 0033:0x7fffffffe062 [29420372.405838] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29420372.425035] RSP: 002b:000000c000767be8 EFLAGS: 00000297 [29420372.431426] RAX: 000055b0c3eea000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29420372.440366] RDX: 0000000000000001 RSI: 000000000006e000 RDI: 000055b0c3eea000 [29420372.449319] RBP: 000000c000767c80 R08: 0000000000000009 R09: 0000000007f2e000 [29420372.458243] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000767c70 [29420372.467170] R13: 000000c000405800 R14: 000000c000177180 R15: 00000000000cf7bd [29420372.476093] FS: 000000000231aaf0 GS: 0000000000000000 [29423693.815299] potentially unexpected fatal signal 5. [29423693.820549] CPU: 68 PID: 902519 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29423693.832559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29423693.842205] RIP: 0033:0x7fffffffe062 [29423693.846253] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29423693.865480] RSP: 002b:000000c00066bb90 EFLAGS: 00000297 [29423693.871116] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29423693.878721] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29423693.886300] RBP: 000000c00066bc28 R08: 0000000000000000 R09: 0000000000000000 [29423693.895303] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00066bc18 [29423693.902887] R13: 000000c000155a70 R14: 000000c0005116c0 R15: 00000000000ca16e [29423693.910455] FS: 000000c000180098 GS: 0000000000000000 [29426142.015753] potentially unexpected fatal signal 5. [29426142.021149] CPU: 49 PID: 965969 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29426142.033333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29426142.042986] RIP: 0033:0x7fffffffe062 [29426142.046996] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29426142.067614] RSP: 002b:000000c0002f1b90 EFLAGS: 00000297 [29426142.074592] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29426142.083526] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29426142.092432] RBP: 000000c0002f1c28 R08: 0000000000000000 R09: 0000000000000000 [29426142.101351] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0002f1c18 [29426142.110276] R13: 000000c0002fac00 R14: 000000c0002d0e00 R15: 00000000000e79fb [29426142.119273] FS: 000000c000180098 GS: 0000000000000000 [29426289.538959] exe[971654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac63763b7 cs:33 sp:7f79c069eef8 ax:54e00000 si:55eac63f554e di:ffffffffff600000 [29430699.037597] exe[136949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d78d75cc39 cs:33 sp:7fe39372c858 ax:0 si:55d78d7c73aa di:ffffffffff600000 [29430935.182024] potentially unexpected fatal signal 5. [29430935.187339] CPU: 90 PID: 115107 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29430935.199323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29430935.208987] RIP: 0033:0x7fffffffe062 [29430935.213044] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29430935.233668] RSP: 002b:000000c0006e3b90 EFLAGS: 00000297 [29430935.239321] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29430935.248230] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29430935.257271] RBP: 000000c0006e3c28 R08: 0000000000000000 R09: 0000000000000000 [29430935.266177] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0006e3c18 [29430935.275075] R13: 000000c000753a70 R14: 000000c00017e700 R15: 000000000001ac7c [29430935.283989] FS: 000000c00013a898 GS: 0000000000000000 [29431432.768635] exe[102923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559724c0bc39 cs:33 sp:7ee5006b4ef8 ax:0 si:20000b80 di:ffffffffff600000 [29436356.214433] exe[395238] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55beb4910c39 cs:33 sp:7f2de41ce858 ax:0 si:55beb497b3aa di:ffffffffff600000 [29436832.712014] exe[395382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55905079ac39 cs:33 sp:7ff54b08d858 ax:0 si:5590508053df di:ffffffffff600000 [29437200.785835] exe[420198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55982c4bd3b7 cs:33 sp:7f2ddf932ef8 ax:54e00000 si:55982c53c54e di:ffffffffff600000 [29437605.437598] exe[442153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55adfcaf1c39 cs:33 sp:7f1d545fe858 ax:0 si:55adfcb5c3df di:ffffffffff600000 [29437761.812773] exe[442167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56533cfeac39 cs:33 sp:7f46496fe858 ax:0 si:56533d0553df di:ffffffffff600000 [29440050.066975] exe[470686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1f47edc39 cs:33 sp:7f7e32dfeef8 ax:0 si:20000140 di:ffffffffff600000 [29442093.535218] exe[677999] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f608605c39 cs:33 sp:7f242488c858 ax:0 si:55f6086703aa di:ffffffffff600000 [29442285.863430] exe[695201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56538b8c3c39 cs:33 sp:7f98b024e858 ax:0 si:56538b92e3aa di:ffffffffff600000 [29444801.258474] exe[831098] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1fa978c39 cs:33 sp:7f8da1eec858 ax:0 si:55f1fa9e33b8 di:ffffffffff600000 [29445002.769982] exe[839511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561215663c39 cs:33 sp:7fa095336858 ax:0 si:5612156ce3aa di:ffffffffff600000 [29445398.209030] exe[862565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e47a9793b7 cs:33 sp:7fd4e6f8eef8 ax:54e00000 si:55e47a9f854e di:ffffffffff600000 [29448278.439670] exe[20364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555c80e717c1 cs:33 sp:7fd6da9684c8 ax:8 si:1 di:7fd6da9685c0 [29448522.108748] exe[17823] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55881e9be7c1 cs:33 sp:7f4802ddd4c8 ax:8 si:1 di:7f4802ddd5c0 [29450149.162174] potentially unexpected fatal signal 5. [29450149.167396] CPU: 6 PID: 69509 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29450149.167411] potentially unexpected fatal signal 5. [29450149.179226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29450149.184483] CPU: 51 PID: 67330 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29450149.194085] RIP: 0033:0x7fffffffe062 [29450149.194091] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29450149.194093] RSP: 002b:000000c000679b90 EFLAGS: 00000297 [29450149.194095] RAX: 000000000001f296 RBX: 0000000000000000 RCX: 00007fffffffe05a [29450149.194096] RDX: 0000000000000000 RSI: 000000c00067a000 RDI: 0000000000012f00 [29450149.194097] RBP: 000000c000679c28 R08: 000000c0018812d0 R09: 0000000000000000 [29450149.194102] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000679c18 [29450149.206036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29450149.206044] RIP: 0033:0x7fffffffe062 [29450149.206048] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29450149.206049] RSP: 002b:000000c000679b90 EFLAGS: 00000297 [29450149.206052] RAX: 000000000001f297 RBX: 0000000000000000 RCX: 00007fffffffe05a [29450149.206053] RDX: 0000000000000000 RSI: 000000c00067a000 RDI: 0000000000012f00 [29450149.206054] RBP: 000000c000679c28 R08: 000000c0000166a0 R09: 0000000000000000 [29450149.206058] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000679c18 [29450149.210212] R13: 000000c000014c00 R14: 000000c000174700 R15: 0000000000010681 [29450149.229442] R13: 000000c000014c00 R14: 000000c000174700 R15: 0000000000010681 [29450149.229445] FS: 000000c000600098 GS: 0000000000000000 [29450149.368145] FS: 000000c000600098 GS: 0000000000000000 [29451805.643950] exe[195417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636f6b53c39 cs:33 sp:7eed15b0def8 ax:0 si:20001b00 di:ffffffffff600000 [29451964.845647] exe[237196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad5102fc39 cs:33 sp:7f5e15180858 ax:0 si:55ad5109a3df di:ffffffffff600000 [29452363.879086] exe[240363] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ecf8a37ab38 ax:0 si:7ecf8a37ac70 di:19 [29452375.458036] potentially unexpected fatal signal 5. [29452375.458846] potentially unexpected fatal signal 5. [29452375.459124] potentially unexpected fatal signal 5. [29452375.459129] CPU: 71 PID: 243872 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29452375.459131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29452375.459137] RIP: 0033:0x7fffffffe062 [29452375.459140] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29452375.459141] RSP: 002b:000000c000599b90 EFLAGS: 00000297 [29452375.459143] RAX: 0000000000040fe4 RBX: 0000000000000000 RCX: 00007fffffffe05a [29452375.459144] RDX: 0000000000000000 RSI: 000000c00059a000 RDI: 0000000000012f00 [29452375.459145] RBP: 000000c000599c28 R08: 000000c0007425b0 R09: 0000000000000000 [29452375.459146] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000599c18 [29452375.459147] R13: 000000c0005c00c0 R14: 000000c0004fd180 R15: 000000000003af95 [29452375.459148] FS: 000000c000180098 GS: 0000000000000000 [29452375.460982] potentially unexpected fatal signal 5. [29452375.460987] CPU: 34 PID: 243868 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29452375.460988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29452375.460993] RIP: 0033:0x7fffffffe062 [29452375.460996] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29452375.460998] RSP: 002b:000000c000599b90 EFLAGS: 00000297 [29452375.461000] RAX: 0000000000040fe3 RBX: 0000000000000000 RCX: 00007fffffffe05a [29452375.461001] RDX: 0000000000000000 RSI: 000000c00059a000 RDI: 0000000000012f00 [29452375.461002] RBP: 000000c000599c28 R08: 000000c0008283d0 R09: 0000000000000000 [29452375.461003] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000599c18 [29452375.461004] R13: 000000c0005c00c0 R14: 000000c0004fd180 R15: 000000000003af95 [29452375.461006] FS: 000000c000180098 GS: 0000000000000000 [29452375.463309] CPU: 52 PID: 241580 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29452375.468544] CPU: 57 PID: 243669 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29452375.468546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29452375.468553] RIP: 0033:0x7fffffffe062 [29452375.468556] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29452375.468558] RSP: 002b:000000c000599b90 EFLAGS: 00000297 [29452375.468561] RAX: 0000000000040fe6 RBX: 0000000000000000 RCX: 00007fffffffe05a [29452375.468565] RDX: 0000000000000000 RSI: 000000c00059a000 RDI: 0000000000012f00 [29452375.475098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29452375.475105] RIP: 0033:0x7fffffffe062 [29452375.475110] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29452375.475112] RSP: 002b:000000c000599b90 EFLAGS: 00000297 [29452375.475114] RAX: 0000000000040fe2 RBX: 0000000000000000 RCX: 00007fffffffe05a [29452375.475115] RDX: 0000000000000000 RSI: 000000c00059a000 RDI: 0000000000012f00 [29452375.475116] RBP: 000000c000599c28 R08: 000000c000234010 R09: 0000000000000000 [29452375.475117] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000599c18 [29452375.475118] R13: 000000c0005c00c0 R14: 000000c0004fd180 R15: 000000000003af95 [29452375.475123] FS: 000000c000180098 GS: 0000000000000000 [29452375.488475] RBP: 000000c000599c28 R08: 000000c0005be4c0 R09: 0000000000000000 [29452375.488477] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000599c18 [29452375.488478] R13: 000000c0005c00c0 R14: 000000c0004fd180 R15: 000000000003af95 [29452375.488481] FS: 000000c000180098 GS: 0000000000000000 [29452418.842615] exe[269054] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f7c47720b38 ax:0 si:7f7c47720c70 di:19 [29452422.930534] exe[265966] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f215f337b38 ax:0 si:7f215f337c70 di:19 [29452469.132926] exe[271278] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ed7779bdb38 ax:0 si:7ed7779bdc70 di:19 [29452533.539306] exe[277993] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f0ee7972b38 ax:0 si:7f0ee7972c70 di:19 [29452596.107538] exe[287646] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f59859d0b38 ax:0 si:7f59859d0c70 di:19 [29452659.248513] exe[290426] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fe86a6d6b38 ax:0 si:7fe86a6d6c70 di:19 [29452926.367272] exe[306634] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f0d0285fb38 ax:0 si:7f0d0285fc70 di:19 [29454315.341803] exe[385397] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c457c58c39 cs:33 sp:7fdb3edcf858 ax:0 si:55c457cc33b8 di:ffffffffff600000 [29454635.455849] exe[383837] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be879a1c39 cs:33 sp:7f1e11b09858 ax:0 si:55be87a0c3b8 di:ffffffffff600000 [29454764.454644] exe[359215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7a76da3b7 cs:33 sp:7f61dcbcfef8 ax:54e00000 si:55a7a775954e di:ffffffffff600000 [29454960.252484] exe[421904] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565511d803b7 cs:33 sp:7f2c9cd2cef8 ax:54e00000 si:565511dff54e di:ffffffffff600000 [29455412.619592] potentially unexpected fatal signal 5. [29455412.624804] CPU: 50 PID: 457018 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29455412.636788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29455412.646430] RIP: 0033:0x7fffffffe062 [29455412.650490] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29455412.669825] RSP: 002b:000000c000837b08 EFLAGS: 00000297 [29455412.676856] RAX: 00000000000700ac RBX: 0000000000000000 RCX: 00007fffffffe05a [29455412.685773] RDX: 0000000000000000 RSI: 000000c000838000 RDI: 0000000000012f00 [29455412.693320] RBP: 000000c000837b90 R08: 000000c0004a65b0 R09: 0000000000000000 [29455412.702384] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000837a50 [29455412.711340] R13: 0000000002d50280 R14: 000000c000183c00 R15: 000000000006f901 [29455412.720600] FS: 00000000042e33c0 GS: 0000000000000000 [29457515.407189] exe[517350] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56514ef98c39 cs:33 sp:7ed2e78a7858 ax:0 si:56514f0033aa di:ffffffffff600000 [29457651.232566] exe[585870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa0bed5c39 cs:33 sp:7fb6b8b18858 ax:0 si:55aa0bf403b8 di:ffffffffff600000 [29459735.168230] potentially unexpected fatal signal 5. [29459735.173443] CPU: 12 PID: 710715 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29459735.185414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29459735.195151] RIP: 0033:0x7fffffffe062 [29459735.199129] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29459735.218430] RSP: 002b:000000c000647b90 EFLAGS: 00000297 [29459735.225457] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29459735.234505] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29459735.243432] RBP: 000000c000647c28 R08: 0000000000000000 R09: 0000000000000000 [29459735.250981] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000647c18 [29459735.259918] R13: 000000c0006520c0 R14: 000000c00015f340 R15: 00000000000a6702 [29459735.267464] FS: 000000c00013a898 GS: 0000000000000000 [29469822.216289] exe[215412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae0a6f5c39 cs:33 sp:7ee899b60858 ax:0 si:55ae0a7603aa di:ffffffffff600000 [29470079.696147] exe[274896] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5555a1962c39 cs:33 sp:7f1a1b36d858 ax:0 si:5555a19cd3aa di:ffffffffff600000 [29470650.362585] potentially unexpected fatal signal 5. [29470650.367786] CPU: 26 PID: 293921 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29470650.379896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29470650.389540] RIP: 0033:0x7fffffffe062 [29470650.393582] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29470650.414155] RSP: 002b:000000c00004db08 EFLAGS: 00000297 [29470650.421220] RAX: 00007fd3d0e1b000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29470650.430088] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007fd3d0e1b000 [29470650.439021] RBP: 000000c00004db90 R08: 0000000000000009 R09: 0000000000bfa000 [29470650.447937] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00004da50 [29470650.456860] R13: 0000000002d50280 R14: 000000c0003edc00 R15: 0000000000047b1e [29470650.465851] FS: 000000000493e3c0 GS: 0000000000000000 [29471269.112526] potentially unexpected fatal signal 5. [29471269.117731] CPU: 14 PID: 309372 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29471269.129725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29471269.139344] RIP: 0033:0x7fffffffe062 [29471269.143338] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29471269.162561] RSP: 002b:000000c00089db08 EFLAGS: 00000297 [29471269.168204] RAX: 00007f4f784d8000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29471269.177129] RDX: 0000000000000001 RSI: 0000000000002000 RDI: 00007f4f784d8000 [29471269.186104] RBP: 000000c00089db90 R08: 0000000000000009 R09: 0000000000ffc000 [29471269.195033] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00089da50 [29471269.203999] R13: 000000c000181008 R14: 000000c00017b180 R15: 000000000004b632 [29471269.212907] FS: 00007f5bc29ff6c0 GS: 0000000000000000 [29471299.471057] exe[233723] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623a0e62c39 cs:33 sp:7fbcdad35858 ax:0 si:5623a0ecd3aa di:ffffffffff600000 [29471427.977356] potentially unexpected fatal signal 11. [29471427.983606] CPU: 16 PID: 327838 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29471427.997065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29471428.008019] RIP: 0033:0x56475df70bfb [29471428.013443] Code: ea 12 00 48 8d 34 19 48 39 d5 48 89 75 60 0f 95 c2 48 29 d8 48 83 c1 10 0f b6 d2 48 83 c8 01 48 c1 e2 02 48 09 da 48 83 ca 01 <48> 89 51 f8 48 89 46 08 eb 80 48 8d 0d 11 5e 09 00 48 8d 15 15 70 [29471428.034149] RSP: 002b:00007ff84d6222f0 EFLAGS: 00010206 [29471428.041183] RAX: 00000000000187f1 RBX: 0000000000008040 RCX: 000056475ec057e0 [29471428.050180] RDX: 0000000000008041 RSI: 000056475ec0d810 RDI: 0000000000000004 [29471428.059112] RBP: 000056475e09f660 R08: 0000000021fcceca R09: 0000000000000010 [29471428.068091] R10: 0000000000001000 R11: 0000000000000802 R12: 0000000000008030 [29471428.077030] R13: 0000000000000076 R14: 000056475e09f6c0 R15: 0000000000000000 [29471428.085947] FS: 000056475ec04480 GS: 0000000000000000 [29471634.161840] exe[273048] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55873c49bc39 cs:33 sp:7faa7f7fe858 ax:0 si:55873c5063aa di:ffffffffff600000 [29471680.739306] exe[248034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ce7c67c39 cs:33 sp:7fc01f140858 ax:0 si:557ce7cd23b8 di:ffffffffff600000 [29471681.468015] exe[246442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56458a981c39 cs:33 sp:7f0a647b0858 ax:0 si:56458a9ec3b8 di:ffffffffff600000 [29471682.086096] exe[242600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558417e4fc39 cs:33 sp:7f7782ba2858 ax:0 si:558417eba3b8 di:ffffffffff600000 [29471682.995362] exe[248292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2278e3c39 cs:33 sp:7f2492b7f858 ax:0 si:55c22794e3b8 di:ffffffffff600000 [29471683.659874] exe[240038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ce7c67c39 cs:33 sp:7fc01f140858 ax:0 si:557ce7cd23b8 di:ffffffffff600000 [29472193.920290] exe[344450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2afefec39 cs:33 sp:7f6dee9aa858 ax:0 si:55e2aff693aa di:ffffffffff600000 [29474164.595552] potentially unexpected fatal signal 5. [29474164.600765] CPU: 32 PID: 440009 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29474164.613203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29474164.622853] RIP: 0033:0x7fffffffe062 [29474164.626878] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29474164.647665] RSP: 002b:000000c00062db90 EFLAGS: 00000297 [29474164.653308] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29474164.662264] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29474164.671207] RBP: 000000c00062dc28 R08: 0000000000000000 R09: 0000000000000000 [29474164.678771] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00062dc18 [29474164.687716] R13: 000000c000636150 R14: 000000c00047b6c0 R15: 000000000006a3a5 [29474164.695284] FS: 000000c00013a898 GS: 0000000000000000 [29475357.904399] potentially unexpected fatal signal 5. [29475357.909604] CPU: 41 PID: 450116 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29475357.921680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29475357.931354] RIP: 0033:0x7fffffffe062 [29475357.935369] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29475357.955975] RSP: 002b:000000c00026bb90 EFLAGS: 00000297 [29475357.961636] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29475357.970561] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29475357.979484] RBP: 000000c00026bc28 R08: 0000000000000000 R09: 0000000000000000 [29475357.988420] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00026bc18 [29475357.997329] R13: 000000c000275320 R14: 000000c0001fee00 R15: 000000000006d249 [29475358.006218] FS: 000000c000180098 GS: 0000000000000000 [29475982.648153] exe[492871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d800583b7 cs:33 sp:7f032ad67ef8 ax:54e00000 si:562d800d754e di:ffffffffff600000 [29476027.676451] exe[515095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a9902fc7c1 cs:33 sp:7fb891a5b4c8 ax:8 si:1 di:7fb891a5b5c0 [29476079.236444] exe[509767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f2d56c7c1 cs:33 sp:7f095e48a4c8 ax:8 si:1 di:7f095e48a5c0 [29477276.563007] exe[481136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5597b9d43c39 cs:33 sp:7ea1ae941858 ax:0 si:5597b9dae3aa di:ffffffffff600000 [29477615.571085] exe[481922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565493c05c39 cs:33 sp:7f8098dfe858 ax:0 si:565493c703aa di:ffffffffff600000 [29479166.471343] exe[504855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf92550c39 cs:33 sp:7fbabbcf0858 ax:0 si:55cf925bb3aa di:ffffffffff600000 [29481257.029359] exe[724565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ec5e49c39 cs:33 sp:7f85c48e6858 ax:0 si:559ec5eb43df di:ffffffffff600000 [29486327.072553] exe[996130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c92ee993b7 cs:33 sp:7fd1eac3fef8 ax:54e00000 si:55c92ef1854e di:ffffffffff600000 [29487364.337196] potentially unexpected fatal signal 5. [29487364.342419] CPU: 78 PID: 57912 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29487364.354308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29487364.363942] RIP: 0033:0x7fffffffe062 [29487364.367891] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29487364.387122] RSP: 002b:000000c0005abb90 EFLAGS: 00000297 [29487364.392779] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29487364.401703] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29487364.410626] RBP: 000000c0005abc28 R08: 0000000000000000 R09: 0000000000000000 [29487364.419551] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005abc18 [29487364.428476] R13: 000000c0005bfd10 R14: 000000c000244700 R15: 000000000000de00 [29487364.437385] FS: 000000c00013b898 GS: 0000000000000000 [29487562.869140] exe[9265] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646321efc39 cs:33 sp:7ee61ca57ef8 ax:0 si:200001c0 di:ffffffffff600000 [29489764.531565] potentially unexpected fatal signal 5. [29489764.536798] CPU: 95 PID: 187681 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29489764.548775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29489764.558420] RIP: 0033:0x7fffffffe062 [29489764.562435] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29489764.581673] RSP: 002b:000000c0005c7b90 EFLAGS: 00000297 [29489764.588655] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29489764.597588] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29489764.606503] RBP: 000000c0005c7c28 R08: 0000000000000000 R09: 0000000000000000 [29489764.615389] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005c7c18 [29489764.624303] R13: 000000c000699a70 R14: 000000c00047e540 R15: 000000000002d9a9 [29489764.633218] FS: 000000c000180098 GS: 0000000000000000 [29489934.380146] potentially unexpected fatal signal 5. [29489934.385351] CPU: 68 PID: 178548 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29489934.397336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29489934.406973] RIP: 0033:0x7fffffffe062 [29489934.411012] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29489934.431555] RSP: 002b:000000c00020fb90 EFLAGS: 00000297 [29489934.438551] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29489934.446093] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29489934.455002] RBP: 000000c00020fc28 R08: 0000000000000000 R09: 0000000000000000 [29489934.463921] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00020fc18 [29489934.472829] R13: 000000c0001a6c00 R14: 000000c00047d500 R15: 000000000002a3bf [29489934.481746] FS: 000000c00013a898 GS: 0000000000000000 [29490556.455272] exe[206482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55624ff59c39 cs:33 sp:7ef7b5399858 ax:0 si:55624ffc43aa di:ffffffffff600000 [29492334.222482] potentially unexpected fatal signal 5. [29492334.227707] CPU: 62 PID: 316943 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29492334.240113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29492334.249757] RIP: 0033:0x7fffffffe062 [29492334.253730] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29492334.272933] RSP: 002b:000000c000205b90 EFLAGS: 00000297 [29492334.278568] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29492334.287485] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29492334.295020] RBP: 000000c000205c28 R08: 0000000000000000 R09: 0000000000000000 [29492334.303945] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000205c18 [29492334.312876] R13: 000000c00026cc00 R14: 000000c000172c40 R15: 000000000004a71e [29492334.321780] FS: 000000c00013b098 GS: 0000000000000000 [29494165.117190] exe[423530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575a64c33b7 cs:33 sp:7eaf271a1ef8 ax:54e00000 si:5575a654254e di:ffffffffff600000 [29497262.469104] exe[581393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5652ca39dc39 cs:33 sp:7f81003efef8 ax:0 si:20001280 di:ffffffffff600000 [29500520.298450] exe[771834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649a33dbc39 cs:33 sp:7f80afed3858 ax:0 si:5649a34463aa di:ffffffffff600000 [29500564.576843] potentially unexpected fatal signal 5. [29500564.582056] CPU: 80 PID: 779148 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29500564.594061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29500564.603686] RIP: 0033:0x7fffffffe062 [29500564.607663] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29500564.626881] RSP: 002b:000000c00065bb90 EFLAGS: 00000297 [29500564.633887] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29500564.642780] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29500564.650341] RBP: 000000c00065bc28 R08: 0000000000000000 R09: 0000000000000000 [29500564.659253] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00065bc18 [29500564.668168] R13: 000000c000660150 R14: 000000c000498a80 R15: 00000000000bc5f7 [29500564.677098] FS: 0000000002062bf0 GS: 0000000000000000 [29501461.490986] exe[826614] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55865818ec39 cs:33 sp:7f6a7d87a858 ax:0 si:5586581f93aa di:ffffffffff600000 [29505358.020266] potentially unexpected fatal signal 5. [29505358.025499] CPU: 62 PID: 98354 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29505358.037400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29505358.047054] RIP: 0033:0x7fffffffe062 [29505358.051082] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29505358.071637] RSP: 002b:000000c00060db90 EFLAGS: 00000297 [29505358.078639] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29505358.087585] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29505358.096489] RBP: 000000c00060dc28 R08: 0000000000000000 R09: 0000000000000000 [29505358.105410] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00060dc18 [29505358.114307] R13: 000000c00061a0c0 R14: 000000c0004cd340 R15: 0000000000012321 [29505358.123221] FS: 000000c000180098 GS: 0000000000000000 [29506058.960613] exe[133205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a971b3b7 cs:33 sp:7ece4104cef8 ax:54e00000 si:55d6a979a54e di:ffffffffff600000 [29506423.679552] exe[107191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a839405c39 cs:33 sp:7fb254bfe858 ax:0 si:55a8394703df di:ffffffffff600000 [29507927.954357] potentially unexpected fatal signal 5. [29507927.957190] potentially unexpected fatal signal 5. [29507927.959601] CPU: 88 PID: 231323 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29507927.964792] CPU: 2 PID: 231355 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29507927.964794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29507927.964801] RIP: 0033:0x7fffffffe062 [29507927.964804] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29507927.964805] RSP: 002b:000000c000019b90 EFLAGS: 00000297 [29507927.964807] RAX: 0000000000041876 RBX: 0000000000000000 RCX: 00007fffffffe05a [29507927.964808] RDX: 0000000000000000 RSI: 000000c00001a000 RDI: 0000000000012f00 [29507927.964809] RBP: 000000c000019c28 R08: 000000c0001943d0 R09: 0000000000000000 [29507927.964809] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000019c18 [29507927.964810] R13: 000000c00001ec00 R14: 000000c00015f500 R15: 0000000000038790 [29507927.964810] FS: 000000c000181098 GS: 0000000000000000 [29507928.075781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29507928.086799] RIP: 0033:0x7fffffffe062 [29507928.092161] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29507928.112700] RSP: 002b:000000c000019b90 EFLAGS: 00000297 [29507928.119694] RAX: 0000000000041874 RBX: 0000000000000000 RCX: 00007fffffffe05a [29507928.128619] RDX: 0000000000000000 RSI: 000000c00001a000 RDI: 0000000000012f00 [29507928.136184] RBP: 000000c000019c28 R08: 000000c000832010 R09: 0000000000000000 [29507928.145141] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000019c18 [29507928.154055] R13: 000000c00001ec00 R14: 000000c00015f500 R15: 0000000000038790 [29507928.162976] FS: 000000c000181098 GS: 0000000000000000 [29509035.756474] exe[320806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559132692c39 cs:33 sp:7fb06ac45858 ax:0 si:5591326fd3b8 di:ffffffffff600000 [29509036.428959] exe[328890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650ce6e0c39 cs:33 sp:7fbd146f2858 ax:0 si:5650ce74b3b8 di:ffffffffff600000 [29509037.586582] exe[324917] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650ce6e0c39 cs:33 sp:7fbd146f2858 ax:0 si:5650ce74b3b8 di:ffffffffff600000 [29509038.112029] exe[331243] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559132692c39 cs:33 sp:7fb06ac45858 ax:0 si:5591326fd3b8 di:ffffffffff600000 [29509038.865072] exe[329985] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559132692c39 cs:33 sp:7fb06ac45858 ax:0 si:5591326fd3b8 di:ffffffffff600000 [29515374.933948] exe[464940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a52d74c39 cs:33 sp:7f7bd12ca858 ax:0 si:555a52ddf3df di:ffffffffff600000 [29517183.051608] exe[507779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569eb8b4c39 cs:33 sp:7fdb4ddf2858 ax:0 si:5569eb91f3df di:ffffffffff600000 [29519903.386626] exe[598810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb1e8c2c39 cs:33 sp:7ea5a6b73858 ax:0 si:55bb1e92d3aa di:ffffffffff600000 [29520067.915373] potentially unexpected fatal signal 5. [29520067.920624] CPU: 55 PID: 612647 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29520067.932589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29520067.942211] RIP: 0033:0x7fffffffe062 [29520067.946205] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29520067.965444] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [29520067.972431] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29520067.981341] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29520067.990255] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [29520067.999161] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000029c18 [29520068.008056] R13: 000000c000030c00 R14: 000000c000169340 R15: 00000000000955e5 [29520068.016988] FS: 000000c00013b098 GS: 0000000000000000 [29521712.707653] potentially unexpected fatal signal 5. [29521712.712871] CPU: 38 PID: 687470 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29521712.724837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29521712.734468] RIP: 0033:0x7fffffffe062 [29521712.738457] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29521712.757701] RSP: 002b:000000c00064db90 EFLAGS: 00000297 [29521712.763351] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29521712.772275] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29521712.779826] RBP: 000000c00064dc28 R08: 0000000000000000 R09: 0000000000000000 [29521712.788764] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00064dc18 [29521712.797698] R13: 000000c00065a0c0 R14: 000000c000178700 R15: 00000000000a02e9 [29521712.805242] FS: 0000000002063bf0 GS: 0000000000000000 [29522339.448933] potentially unexpected fatal signal 5. [29522339.454162] CPU: 32 PID: 711492 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29522339.466203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29522339.475854] RIP: 0033:0x7fffffffe062 [29522339.479850] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29522339.499099] RSP: 002b:000000c00081fbe8 EFLAGS: 00000297 [29522339.506141] RAX: 00007f8deb36b000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29522339.515095] RDX: 0000000000000003 RSI: 0000000000040000 RDI: 00007f8deb36b000 [29522339.524024] RBP: 000000c00081fc80 R08: 0000000000000009 R09: 00000000080d9000 [29522339.532948] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00081fc70 [29522339.541884] R13: 000000c0001f9000 R14: 000000c000164c40 R15: 00000000000adab5 [29522339.550786] FS: 000000c00013b098 GS: 0000000000000000 [29524106.041041] potentially unexpected fatal signal 5. [29524106.046378] CPU: 68 PID: 753873 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29524106.058388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29524106.062740] potentially unexpected fatal signal 5. [29524106.068198] RIP: 0033:0x7fffffffe062 [29524106.073371] CPU: 29 PID: 752801 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29524106.073372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29524106.073377] RIP: 0033:0x7fffffffe062 [29524106.073381] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29524106.073385] RSP: 002b:000000c0005d3b90 EFLAGS: 00000297 [29524106.077408] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29524106.077410] RSP: 002b:000000c0005d3b90 EFLAGS: 00000297 [29524106.077412] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29524106.077413] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29524106.077413] RBP: 000000c0005d3c28 R08: 0000000000000000 R09: 0000000000000000 [29524106.077414] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005d3c18 [29524106.077415] R13: 000000c0005dcc30 R14: 000000c0002f9a40 R15: 00000000000b7a42 [29524106.077416] FS: 000000c00013a898 GS: 0000000000000000 [29524106.203419] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29524106.210990] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29524106.219944] RBP: 000000c0005d3c28 R08: 0000000000000000 R09: 0000000000000000 [29524106.228888] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005d3c18 [29524106.236450] R13: 000000c0005dcc30 R14: 000000c0002f9a40 R15: 00000000000b7a42 [29524106.245464] FS: 000000c00013a898 GS: 0000000000000000 [29525492.379226] exe[812451] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e903214c39 cs:33 sp:7fa7ef647ef8 ax:0 si:20002f00 di:ffffffffff600000 [29525608.049390] exe[826412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d817c2ac39 cs:33 sp:7f8d68c66858 ax:0 si:55d817c953df di:ffffffffff600000 [29525837.344990] exe[835513] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642af6acc39 cs:33 sp:7f5717b7a858 ax:0 si:5642af7173df di:ffffffffff600000 [29525837.451385] exe[835527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642af6acc39 cs:33 sp:7f5717b9b858 ax:0 si:5642af7173df di:ffffffffff600000 [29527131.167759] exe[907029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4997e03b7 cs:33 sp:7f147e6ecef8 ax:54e00000 si:55f49985f54e di:ffffffffff600000 [29527705.992131] potentially unexpected fatal signal 5. [29527705.997375] CPU: 34 PID: 910477 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29527706.009461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29527706.019057] RIP: 0033:0x7fffffffe062 [29527706.023012] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29527706.042193] RSP: 002b:000000c00057bb90 EFLAGS: 00000297 [29527706.047829] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29527706.055455] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29527706.064369] RBP: 000000c00057bc28 R08: 0000000000000000 R09: 0000000000000000 [29527706.073416] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00057bc18 [29527706.082340] R13: 000000c000016c00 R14: 000000c00047e540 R15: 00000000000dd2cd [29527706.091238] FS: 000000c00013b898 GS: 0000000000000000 [29528762.160079] exe[968704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be9430fc39 cs:33 sp:7f08a184cef8 ax:0 si:20000540 di:ffffffffff600000 [29532512.720023] potentially unexpected fatal signal 5. [29532512.725245] CPU: 62 PID: 172890 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29532512.737248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29532512.746899] RIP: 0033:0x7fffffffe062 [29532512.750917] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29532512.770157] RSP: 002b:000000c0001f9b90 EFLAGS: 00000297 [29532512.777157] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29532512.784686] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29532512.793655] RBP: 000000c0001f9c28 R08: 0000000000000000 R09: 0000000000000000 [29532512.802590] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0001f9c18 [29532512.811528] R13: 000000c0001d8c00 R14: 000000c0002f61c0 R15: 0000000000029287 [29532512.820437] FS: 000000c00013b098 GS: 0000000000000000 [29532613.145792] exe[186508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dadcbd7c39 cs:33 sp:7f7f9c32b858 ax:0 si:55dadcc423b8 di:ffffffffff600000 [29532785.449350] exe[194619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd4f492c39 cs:33 sp:7f86439bc858 ax:0 si:55bd4f4fd3b8 di:ffffffffff600000 [29532859.869931] exe[195699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd0e450c39 cs:33 sp:7fe6efca5ef8 ax:0 si:20000880 di:ffffffffff600000 [29537352.097109] exe[440804] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b525686c39 cs:33 sp:7f93332ce858 ax:0 si:55b5256f13df di:ffffffffff600000 [29538289.795772] exe[487171] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7038503b7 cs:33 sp:7f9428e9def8 ax:54e00000 si:55a7038cf54e di:ffffffffff600000 [29538512.680972] potentially unexpected fatal signal 5. [29538512.686188] CPU: 16 PID: 520868 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29538512.700952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29538512.710586] RIP: 0033:0x7fffffffe062 [29538512.714584] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29538512.733823] RSP: 002b:000000c000021b90 EFLAGS: 00000297 [29538512.740836] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29538512.749791] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29538512.758701] RBP: 000000c000021c28 R08: 0000000000000000 R09: 0000000000000000 [29538512.767614] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000021c18 [29538512.776534] R13: 000000c000024c00 R14: 000000c00047ec40 R15: 000000000007efa6 [29538512.785466] FS: 000000c00013b098 GS: 0000000000000000 [29538706.794233] exe[431386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc2dd9e3b7 cs:33 sp:7f4ae399cef8 ax:54e00000 si:55fc2de1d54e di:ffffffffff600000 [29538706.828128] exe[438144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc2dd9e3b7 cs:33 sp:7f4ae399cef8 ax:54e00000 si:55fc2de1d54e di:ffffffffff600000 [29539509.108737] potentially unexpected fatal signal 5. [29539509.113981] CPU: 6 PID: 548377 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29539509.125872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29539509.135491] RIP: 0033:0x7fffffffe062 [29539509.139470] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29539509.158861] RSP: 002b:000000c000031b90 EFLAGS: 00000297 [29539509.164523] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29539509.173446] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29539509.182355] RBP: 000000c000031c28 R08: 0000000000000000 R09: 0000000000000000 [29539509.191266] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000031c18 [29539509.200184] R13: 000000c000002c00 R14: 000000c0002ffa40 R15: 0000000000081e34 [29539509.209097] FS: 0000000002063bf0 GS: 0000000000000000 [29541018.923098] exe[719190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d53e3e5c39 cs:33 sp:7ff08bd4e858 ax:0 si:55d53e4503b8 di:ffffffffff600000 [29543584.342945] exe[853511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c865f4c39 cs:33 sp:7ea0e69f1ef8 ax:0 si:20000600 di:ffffffffff600000 [29544708.906679] potentially unexpected fatal signal 5. [29544708.911894] CPU: 48 PID: 972083 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29544708.923914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29544708.934915] RIP: 0033:0x7fffffffe062 [29544708.940266] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29544708.960846] RSP: 002b:000000c00004db08 EFLAGS: 00000297 [29544708.967891] RAX: 00007fc3d94d3000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29544708.975507] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007fc3d94d3000 [29544708.984423] RBP: 000000c00004db90 R08: 0000000000000009 R09: 0000000000dfc000 [29544708.993441] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00004da50 [29544709.002338] R13: 000000c000200008 R14: 000000c00052ea80 R15: 00000000000ed31b [29544709.011281] FS: 00007f670e29b6c0 GS: 0000000000000000 [29545064.040426] exe[964230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605a22dfc39 cs:33 sp:7fb001823858 ax:0 si:5605a234a3b8 di:ffffffffff600000 [29545691.434792] exe[965490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611ddc10c39 cs:33 sp:7fd02117a858 ax:0 si:5611ddc7b3b8 di:ffffffffff600000 [29545691.463807] exe[957262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611ddc10c39 cs:33 sp:7fd02117a858 ax:0 si:5611ddc7b3b8 di:ffffffffff600000 [29545691.492082] exe[957262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611ddc10c39 cs:33 sp:7fd02117a858 ax:0 si:5611ddc7b3b8 di:ffffffffff600000 [29546564.986356] exe[61030] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5daee73b7 cs:33 sp:7f04468f2ef8 ax:54e00000 si:55c5daf6654e di:ffffffffff600000 [29548861.325181] potentially unexpected fatal signal 5. [29548861.330559] CPU: 21 PID: 165748 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29548861.342709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29548861.352376] RIP: 0033:0x7fffffffe062 [29548861.356395] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29548861.375637] RSP: 002b:000000c0005abb90 EFLAGS: 00000297 [29548861.382671] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29548861.391611] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29548861.399188] RBP: 000000c0005abc28 R08: 0000000000000000 R09: 0000000000000000 [29548861.408198] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005abc18 [29548861.417203] R13: 000000c0005ba0c0 R14: 000000c0004cb500 R15: 0000000000027c12 [29548861.426148] FS: 000000c000180098 GS: 0000000000000000 [29552920.896170] exe[412709] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab9ac22c39 cs:33 sp:7eff2d837858 ax:0 si:55ab9ac8d3aa di:ffffffffff600000 [29553620.997014] potentially unexpected fatal signal 5. [29553621.002347] CPU: 41 PID: 407302 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29553621.014440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29553621.024176] RIP: 0033:0x7fffffffe062 [29553621.028231] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29553621.048019] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [29553621.053668] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29553621.061259] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29553621.070182] RBP: 000000c00004db30 R08: 0000000000000000 R09: 0000000000000000 [29553621.079131] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00004d9c8 [29553621.088017] R13: 000000c0004fc008 R14: 000000c000513340 R15: 000000000005f66f [29553621.095575] FS: 00007fbafbfff6c0 GS: 0000000000000000 [29553647.858239] exe[450812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffd1dfdc39 cs:33 sp:7f76d575c858 ax:0 si:55ffd1e683aa di:ffffffffff600000 [29553661.361020] potentially unexpected fatal signal 5. [29553661.366270] CPU: 3 PID: 433593 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29553661.378155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29553661.388051] RIP: 0033:0x7fffffffe062 [29553661.392060] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29553661.412736] RSP: 002b:000000c000535b90 EFLAGS: 00000297 [29553661.419796] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29553661.428727] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29553661.437745] RBP: 000000c000535c28 R08: 0000000000000000 R09: 0000000000000000 [29553661.446587] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000535c18 [29553661.455536] R13: 000000c000564ab0 R14: 000000c00015f340 R15: 0000000000060405 [29553661.464501] FS: 000000c00013b098 GS: 0000000000000000 [29553878.093969] exe[467592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f59098c39 cs:33 sp:7f38e331a858 ax:0 si:557f591033aa di:ffffffffff600000 [29554061.518090] exe[485174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9e0fdac39 cs:33 sp:7f4c3d079858 ax:0 si:55c9e10453aa di:ffffffffff600000 [29554249.685921] exe[475654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d83b4d0c39 cs:33 sp:7f4f3c5d7858 ax:0 si:55d83b53b3aa di:ffffffffff600000 [29554745.560017] exe[518023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca432d4c39 cs:33 sp:7eca89cc0ef8 ax:0 si:20000940 di:ffffffffff600000 [29554868.116712] potentially unexpected fatal signal 5. [29554868.122017] CPU: 40 PID: 508480 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29554868.134004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29554868.143830] RIP: 0033:0x7fffffffe062 [29554868.147816] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29554868.167135] RSP: 002b:000000c000031b90 EFLAGS: 00000297 [29554868.172790] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29554868.180396] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29554868.189468] RBP: 000000c000031c28 R08: 0000000000000000 R09: 0000000000000000 [29554868.197086] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000031c18 [29554868.206082] R13: 000000c0001ccc00 R14: 000000c000494700 R15: 00000000000778af [29554868.215109] FS: 0000000002063bf0 GS: 0000000000000000 [29555335.077221] exe[511419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff0b37c39 cs:33 sp:7ea7a0979858 ax:0 si:555ff0ba23df di:ffffffffff600000 [29556971.318966] exe[640011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560da761dc39 cs:33 sp:7ff828dfe858 ax:0 si:560da76883b8 di:ffffffffff600000 [29556971.771960] exe[655251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560da761dc39 cs:33 sp:7ff828dfe858 ax:0 si:560da76883b8 di:ffffffffff600000 [29556972.575653] exe[654708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d69698c39 cs:33 sp:7fcb932be858 ax:0 si:556d697033b8 di:ffffffffff600000 [29556972.938600] exe[630183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555942e25c39 cs:33 sp:7f8df26a6858 ax:0 si:555942e903b8 di:ffffffffff600000 [29556973.511075] exe[644980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560da761dc39 cs:33 sp:7ff828dfe858 ax:0 si:560da76883b8 di:ffffffffff600000 [29559050.794202] potentially unexpected fatal signal 5. [29559050.799596] CPU: 21 PID: 614931 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29559050.811850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29559050.821488] RIP: 0033:0x7fffffffe062 [29559050.825482] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29559050.844654] RSP: 002b:000000c0004e1b90 EFLAGS: 00000297 [29559050.850283] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29559050.857832] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29559050.865426] RBP: 000000c0004e1c28 R08: 0000000000000000 R09: 0000000000000000 [29559050.873174] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0004e1c18 [29559050.882086] R13: 000000c0004ea3f0 R14: 000000c0004b9180 R15: 0000000000092ba4 [29559050.891094] FS: 0000000002065bf0 GS: 0000000000000000 [29562578.474213] exe[705755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562067ae63b7 cs:33 sp:7fd586ec1ef8 ax:54e00000 si:562067b6554e di:ffffffffff600000 [29565508.620159] potentially unexpected fatal signal 11. [29565508.626268] CPU: 52 PID: 851846 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29565508.640370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29565508.650177] RIP: 0033:0x55ad4410df17 [29565508.655139] Code: 00 00 e9 8f e7 ff ff ba 01 00 00 00 e9 a9 ee ff ff 66 90 41 57 41 56 41 55 49 89 d5 41 54 55 53 48 89 fb 48 81 ec 18 05 00 00 <48> 89 74 24 08 89 4c 24 48 64 48 8b 04 25 28 00 00 00 48 89 84 24 [29565508.676299] RSP: 002b:00007f60156fac90 EFLAGS: 00010206 [29565508.683359] RAX: 00007f60156fb500 RBX: 00007f60156fb1f0 RCX: 0000000000000000 [29565508.692302] RDX: 00007f60156fb370 RSI: 000055ad441a16e5 RDI: 00007f60156fb1f0 [29565508.701435] RBP: 00007f60156fb2e0 R08: 0000000000000000 R09: 0000000000000000 [29565508.710586] R10: 0000000000001000 R11: 0000000000000293 R12: 000055ad441a16e5 [29565508.719548] R13: 00007f60156fb370 R14: 0000000000000000 R15: 00007f60156fb1f0 [29565508.728471] FS: 000055ad44db4480 GS: 0000000000000000 [29570592.079134] potentially unexpected fatal signal 5. [29570592.084402] CPU: 53 PID: 57995 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29570592.096315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29570592.105930] RIP: 0033:0x7fffffffe062 [29570592.109924] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29570592.129412] RSP: 002b:000000c0006f7be8 EFLAGS: 00000297 [29570592.135277] RAX: 000000000000e5c3 RBX: 0000000000000000 RCX: 00007fffffffe05a [29570592.142874] RDX: 0000000000000000 RSI: 000000c0006f8000 RDI: 0000000000012f00 [29570592.150489] RBP: 000000c0006f7c80 R08: 000000c000a24010 R09: 0000000000000000 [29570592.158112] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0006f7c70 [29570592.167031] R13: 000000c000419000 R14: 000000c0004ada40 R15: 000000000000e27b [29570592.175937] FS: 000000c00013a898 GS: 0000000000000000 [29571121.440023] potentially unexpected fatal signal 5. [29571121.445326] CPU: 74 PID: 44949 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29571121.457224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29571121.466850] RIP: 0033:0x7fffffffe062 [29571121.470817] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29571121.490022] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [29571121.495677] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29571121.503220] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29571121.510962] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [29571121.518534] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000029c18 [29571121.526096] R13: 000000c000033bc0 R14: 000000c000183dc0 R15: 000000000000aa58 [29571121.533673] FS: 0000000002065bf0 GS: 0000000000000000 [29572346.944080] exe[93138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d0d96c39 cs:33 sp:7ee5614a1ef8 ax:0 si:200044c0 di:ffffffffff600000 [29573521.465488] potentially unexpected fatal signal 5. [29573521.470695] CPU: 95 PID: 117166 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29573521.482701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29573521.492355] RIP: 0033:0x7fffffffe062 [29573521.496366] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29573521.516908] RSP: 002b:000000c0004f7b90 EFLAGS: 00000297 [29573521.523920] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29573521.532928] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29573521.541867] RBP: 000000c0004f7c28 R08: 0000000000000000 R09: 0000000000000000 [29573521.550808] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0004f7c18 [29573521.559743] R13: 000000c000690270 R14: 000000c0002d5880 R15: 000000000001c5f7 [29573521.568684] FS: 0000000002065bf0 GS: 0000000000000000 [29574091.965287] potentially unexpected fatal signal 5. [29574091.970515] CPU: 18 PID: 187910 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29574091.982515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29574091.992154] RIP: 0033:0x7fffffffe062 [29574091.996143] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29574092.015617] RSP: 002b:000000c00002bb90 EFLAGS: 00000297 [29574092.021334] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29574092.030231] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29574092.039250] RBP: 000000c00002bc28 R08: 0000000000000000 R09: 0000000000000000 [29574092.048288] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00002bc18 [29574092.057234] R13: 000000c000633a70 R14: 000000c0002f8700 R15: 000000000002d74c [29574092.066151] FS: 000000c000180098 GS: 0000000000000000 [29575914.981056] potentially unexpected fatal signal 5. [29575914.986288] CPU: 80 PID: 220772 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29575914.998415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29575915.008038] RIP: 0033:0x7fffffffe062 [29575915.012028] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29575915.031250] RSP: 002b:000000c00079fb90 EFLAGS: 00000297 [29575915.038393] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29575915.047339] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29575915.056290] RBP: 000000c00079fc28 R08: 0000000000000000 R09: 0000000000000000 [29575915.065403] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00079fc18 [29575915.072954] R13: 000000c0001a0a80 R14: 000000c000170a80 R15: 0000000000035ad4 [29575915.081967] FS: 000000c000498098 GS: 0000000000000000 [29579260.640802] exe[411983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f0fb1b3b7 cs:33 sp:7ee0bdc43ef8 ax:54e00000 si:564f0fb9a54e di:ffffffffff600000 [29580721.616291] potentially unexpected fatal signal 5. [29580721.621531] CPU: 87 PID: 461718 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29580721.633507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29580721.643280] RIP: 0033:0x7fffffffe062 [29580721.647353] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29580721.666596] RSP: 002b:000000c00002bb90 EFLAGS: 00000297 [29580721.673777] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29580721.682838] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29580721.691821] RBP: 000000c00002bc28 R08: 0000000000000000 R09: 0000000000000000 [29580721.700796] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00002bc18 [29580721.709749] R13: 000000c000162c00 R14: 000000c0005196c0 R15: 0000000000070930 [29580721.719027] FS: 000000c00013b098 GS: 0000000000000000 [29581275.265439] exe[493832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55620e2027c1 cs:33 sp:7fc867fdb4c8 ax:8 si:1 di:7fc867fdb5c0 [29581385.426049] exe[406239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55647139ec39 cs:33 sp:7eca9ac7c858 ax:0 si:5564714093df di:ffffffffff600000 [29581611.339583] exe[548728] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b8d77c87c1 cs:33 sp:7f46494d94c8 ax:8 si:1 di:7f46494d95c0 [29581716.400476] exe[551299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b261ecc39 cs:33 sp:7f1df9788858 ax:0 si:555b262573df di:ffffffffff600000 [29581765.416559] exe[540509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603f38fdc39 cs:33 sp:7ff714c91858 ax:0 si:5603f39683aa di:ffffffffff600000 [29581889.329291] exe[534563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7d0c63c39 cs:33 sp:7f5dd5e9f858 ax:0 si:55b7d0cce3df di:ffffffffff600000 [29583133.024845] exe[591986] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f932205c39 cs:33 sp:7fc2f57fe858 ax:0 si:55f9322703df di:ffffffffff600000 [29583578.367600] potentially unexpected fatal signal 5. [29583578.372834] CPU: 10 PID: 592838 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29583578.377272] potentially unexpected fatal signal 5. [29583578.384562] potentially unexpected fatal signal 5. [29583578.384567] CPU: 45 PID: 600856 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29583578.384569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29583578.384573] RIP: 0033:0x7fffffffe062 [29583578.384576] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29583578.384577] RSP: 002b:000000c00017bb90 EFLAGS: 00000297 [29583578.384579] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29583578.384580] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29583578.384581] RBP: 000000c00017bc28 R08: 0000000000000000 R09: 0000000000000000 [29583578.384582] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00017bc18 [29583578.384583] R13: 000000c00078ba70 R14: 000000c000165a40 R15: 000000000008fe5a [29583578.384584] FS: 000000c00013b098 GS: 0000000000000000 [29583578.384867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29583578.390064] CPU: 53 PID: 589423 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29583578.390067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29583578.390073] RIP: 0033:0x7fffffffe062 [29583578.390077] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29583578.390078] RSP: 002b:000000c00017bb90 EFLAGS: 00000297 [29583578.390081] RAX: 000000000009ebfc RBX: 0000000000000000 RCX: 00007fffffffe05a [29583578.390081] RDX: 0000000000000000 RSI: 000000c00017c000 RDI: 0000000000012f00 [29583578.390082] RBP: 000000c00017bc28 R08: 000000c00001a010 R09: 0000000000000000 [29583578.390083] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00017bc18 [29583578.390084] R13: 000000c00078ba70 R14: 000000c000165a40 R15: 000000000008fe5a [29583578.390085] FS: 000000c00013b098 GS: 0000000000000000 [29583578.613005] RIP: 0033:0x7fffffffe062 [29583578.617024] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29583578.637573] RSP: 002b:000000c00017bb90 EFLAGS: 00000297 [29583578.644587] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29583578.653493] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29583578.662411] RBP: 000000c00017bc28 R08: 0000000000000000 R09: 0000000000000000 [29583578.671330] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00017bc18 [29583578.680286] R13: 000000c00078ba70 R14: 000000c000165a40 R15: 000000000008fe5a [29583578.689281] FS: 000000c00013b098 GS: 0000000000000000 [29583880.444652] potentially unexpected fatal signal 5. [29583880.449854] CPU: 31 PID: 668845 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29583880.461852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29583880.471492] RIP: 0033:0x7fffffffe062 [29583880.475470] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29583880.494693] RSP: 002b:000000c000675b90 EFLAGS: 00000297 [29583880.501701] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29583880.510673] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29583880.519550] RBP: 000000c000675c28 R08: 0000000000000000 R09: 0000000000000000 [29583880.528456] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000675c18 [29583880.537365] R13: 000000c0001a1800 R14: 000000c00058a8c0 R15: 00000000000a24ad [29583880.546274] FS: 0000000002065bf0 GS: 0000000000000000 [29586484.490359] exe[808653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a08c9a9c39 cs:33 sp:7fb85cc65ef8 ax:0 si:20000340 di:ffffffffff600000 [29586638.415696] exe[794126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d03bb9ec39 cs:33 sp:7f981b303ef8 ax:0 si:20000340 di:ffffffffff600000 [29588671.697279] exe[943050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f5d0b9c39 cs:33 sp:7f4776e4d858 ax:0 si:557f5d1243aa di:ffffffffff600000 [29589082.853846] potentially unexpected fatal signal 5. [29589082.859101] CPU: 55 PID: 977178 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29589082.871081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29589082.880733] RIP: 0033:0x7fffffffe062 [29589082.884718] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29589082.904147] RSP: 002b:000000c00004db08 EFLAGS: 00000297 [29589082.911185] RAX: 00007f9905369000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29589082.920138] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007f9905369000 [29589082.929083] RBP: 000000c00004db90 R08: 0000000000000009 R09: 00000000005fe000 [29589082.938018] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004da50 [29589082.946955] R13: 0000000002d50280 R14: 000000c0003e3880 R15: 00000000000ed2e0 [29589082.955897] FS: 00000000052953c0 GS: 0000000000000000 [29589772.830618] exe[23488] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c23eb18c39 cs:33 sp:7f4fa72bdef8 ax:0 si:200007c0 di:ffffffffff600000 [29590717.362553] exe[84558] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fe115cc39 cs:33 sp:7eac06754858 ax:0 si:555fe11c73aa di:ffffffffff600000 [29591536.346980] exe[107659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55990b89fc39 cs:33 sp:7fc962dbc858 ax:0 si:55990b90a3b8 di:ffffffffff600000 [29592019.176047] exe[158704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a2ce389c39 cs:33 sp:7f569759b858 ax:0 si:55a2ce3f43b8 di:ffffffffff600000 [29593521.405123] exe[212493] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561786b70c39 cs:33 sp:7ecb84ae5858 ax:0 si:561786bdb3aa di:ffffffffff600000 [29593556.898337] exe[224124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0b50c8c39 cs:33 sp:7eecf6f91858 ax:0 si:55c0b51333df di:ffffffffff600000 [29594112.035751] exe[242654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55627b08b3b7 cs:33 sp:7ffa8fea7ef8 ax:54e00000 si:55627b10a54e di:ffffffffff600000 [29596326.599459] exe[349184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ab796c39 cs:33 sp:7edaf0544858 ax:0 si:55d0ab8013aa di:ffffffffff600000 [29598100.004560] potentially unexpected fatal signal 11. [29598100.009891] CPU: 55 PID: 526063 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29598100.021880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29598100.031557] RIP: 0033:0x56403e1d1bfb [29598100.035555] Code: ea 12 00 48 8d 34 19 48 39 d5 48 89 75 60 0f 95 c2 48 29 d8 48 83 c1 10 0f b6 d2 48 83 c8 01 48 c1 e2 02 48 09 da 48 83 ca 01 <48> 89 51 f8 48 89 46 08 eb 80 48 8d 0d 11 5e 09 00 48 8d 15 15 70 [29598100.056174] RSP: 002b:00007fd52f33e2f0 EFLAGS: 00010206 [29598100.063167] RAX: 00000000000187f1 RBX: 0000000000008040 RCX: 000056403ee667e0 [29598100.072081] RDX: 0000000000008041 RSI: 000056403ee6e810 RDI: 0000000000000004 [29598100.080990] RBP: 000056403e300660 R08: 0000000006d00818 R09: 000000000000001c [29598100.089894] R10: 0000000000001000 R11: 0000000000000802 R12: 0000000000008030 [29598100.098824] R13: 0000000000000076 R14: 000056403e3006c0 R15: 0000000000000000 [29598100.107714] FS: 000056403ee65480 GS: 0000000000000000 [29604043.155866] exe[571701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55569750fc39 cs:33 sp:7f4449466ef8 ax:0 si:200030c0 di:ffffffffff600000 [29604098.680372] potentially unexpected fatal signal 5. [29604098.682054] potentially unexpected fatal signal 5. [29604098.684338] potentially unexpected fatal signal 5. [29604098.684344] CPU: 10 PID: 646280 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29604098.684346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29604098.684352] RIP: 0033:0x7fffffffe062 [29604098.684354] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29604098.684355] RSP: 002b:000000c000653b90 EFLAGS: 00000297 [29604098.684357] RAX: 00000000000a0f81 RBX: 0000000000000000 RCX: 00007fffffffe05a [29604098.684358] RDX: 0000000000000000 RSI: 000000c000654000 RDI: 0000000000012f00 [29604098.684359] RBP: 000000c000653c28 R08: 000000c0008364c0 R09: 0000000000000000 [29604098.684360] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000653c18 [29604098.684361] R13: 000000c000016150 R14: 000000c0001a36c0 R15: 000000000009d948 [29604098.684362] FS: 0000000002065bf0 GS: 0000000000000000 [29604098.685597] CPU: 59 PID: 645707 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29604098.690830] CPU: 46 PID: 654661 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29604098.690832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29604098.690836] RIP: 0033:0x7fffffffe062 [29604098.690840] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29604098.690842] RSP: 002b:000000c000653b90 EFLAGS: 00000297 [29604098.690844] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29604098.690845] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29604098.690846] RBP: 000000c000653c28 R08: 0000000000000000 R09: 0000000000000000 [29604098.690847] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000653c18 [29604098.690848] R13: 000000c000016150 R14: 000000c0001a36c0 R15: 000000000009d948 [29604098.690849] FS: 0000000002065bf0 GS: 0000000000000000 [29604098.699881] potentially unexpected fatal signal 5. [29604098.709419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29604098.709423] RIP: 0033:0x7fffffffe062 [29604098.709426] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29604098.709427] RSP: 002b:000000c000653b90 EFLAGS: 00000297 [29604098.709429] RAX: 00000000000a0f83 RBX: 0000000000000000 RCX: 00007fffffffe05a [29604098.709429] RDX: 0000000000000000 RSI: 000000c000654000 RDI: 0000000000012f00 [29604098.709430] RBP: 000000c000653c28 R08: 000000c0006de010 R09: 0000000000000000 [29604098.709431] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000653c18 [29604098.709431] R13: 000000c000016150 R14: 000000c0001a36c0 R15: 000000000009d948 [29604098.709432] FS: 0000000002065bf0 GS: 0000000000000000 [29604099.007433] CPU: 55 PID: 646200 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29604099.020807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29604099.031821] RIP: 0033:0x7fffffffe062 [29604099.037170] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29604099.057746] RSP: 002b:000000c000653b90 EFLAGS: 00000297 [29604099.064744] RAX: 00000000000a0f80 RBX: 0000000000000000 RCX: 00007fffffffe05a [29604099.073656] RDX: 0000000000000000 RSI: 000000c000654000 RDI: 0000000000012f00 [29604099.082584] RBP: 000000c000653c28 R08: 000000c0004582e0 R09: 0000000000000000 [29604099.091507] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000653c18 [29604099.100432] R13: 000000c000016150 R14: 000000c0001a36c0 R15: 000000000009d948 [29604099.108006] FS: 0000000002065bf0 GS: 0000000000000000 [29605560.488849] exe[697387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584408a5c39 cs:33 sp:7f35b050def8 ax:0 si:20000080 di:ffffffffff600000 [29606751.528699] exe[720794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600405ecc39 cs:33 sp:7ecb6438cef8 ax:0 si:20000180 di:ffffffffff600000 [29606939.180564] exe[648033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d87e048c39 cs:33 sp:7efbd0037858 ax:0 si:55d87e0b33aa di:ffffffffff600000 [29607633.946683] exe[720941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b85afdc39 cs:33 sp:7f81a4f5f858 ax:0 si:558b85b683df di:ffffffffff600000 [29607650.855725] exe[648834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b85afdc39 cs:33 sp:7f81a4f1d858 ax:0 si:558b85b683df di:ffffffffff600000 [29607650.855756] exe[701251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b85afdc39 cs:33 sp:7f81a4f3e858 ax:0 si:558b85b683df di:ffffffffff600000 [29607797.422698] exe[744322] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614ac9ccc39 cs:33 sp:7f5d43ffe858 ax:0 si:5614aca373aa di:ffffffffff600000 [29607838.473624] exe[746274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b30c80cc39 cs:33 sp:7f39d7899858 ax:0 si:55b30c8773b8 di:ffffffffff600000 [29607839.151898] exe[762911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4b5a97c39 cs:33 sp:7f4650050858 ax:0 si:55f4b5b023b8 di:ffffffffff600000 [29607839.397584] exe[746926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b30c80cc39 cs:33 sp:7f39d7899858 ax:0 si:55b30c8773b8 di:ffffffffff600000 [29607839.692247] exe[746019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4b5a97c39 cs:33 sp:7f4650050858 ax:0 si:55f4b5b023b8 di:ffffffffff600000 [29607840.112365] exe[746019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4b5a97c39 cs:33 sp:7f4650050858 ax:0 si:55f4b5b023b8 di:ffffffffff600000 [29608389.351511] exe[776095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56009bc1ac39 cs:33 sp:7f99c49ca858 ax:0 si:56009bc853aa di:ffffffffff600000 [29608428.554543] exe[772501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e7c275c39 cs:33 sp:7f55026bd858 ax:0 si:561e7c2e03aa di:ffffffffff600000 [29608693.819265] exe[766777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc39040c39 cs:33 sp:7edb3dc2b858 ax:0 si:55cc390ab3aa di:ffffffffff600000 [29608710.097867] exe[777061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc1b8dbc39 cs:33 sp:7ec0232e8858 ax:0 si:55fc1b9463aa di:ffffffffff600000 [29608710.097888] exe[777059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc1b8dbc39 cs:33 sp:7ec0232c7858 ax:0 si:55fc1b9463aa di:ffffffffff600000 [29608975.514520] potentially unexpected fatal signal 5. [29608975.519765] CPU: 52 PID: 798912 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29608975.531784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29608975.541436] RIP: 0033:0x7fffffffe062 [29608975.545479] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29608975.564650] RSP: 002b:000000c00004db08 EFLAGS: 00000297 [29608975.571692] RAX: 0000564873823000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29608975.580628] RDX: 0000000000000003 RSI: 0000000000021000 RDI: 0000564873823000 [29608975.589562] RBP: 000000c00004db90 R08: 0000000000000009 R09: 0000000008571000 [29608975.598497] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00004da50 [29608975.607426] R13: 0000000002d50280 R14: 000000c000509180 R15: 00000000000c2a2c [29608975.616341] FS: 0000000004e953c0 GS: 0000000000000000 [29610098.541986] potentially unexpected fatal signal 5. [29610098.547294] CPU: 20 PID: 795067 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29610098.559338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29610098.568962] RIP: 0033:0x7fffffffe062 [29610098.573055] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29610098.592366] RSP: 002b:000000c00052fb90 EFLAGS: 00000297 [29610098.598081] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29610098.607008] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29610098.614695] RBP: 000000c00052fc28 R08: 0000000000000000 R09: 0000000000000000 [29610098.623630] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00052fc18 [29610098.632581] R13: 000000c0005420c0 R14: 000000c000166700 R15: 00000000000c1ce5 [29610098.641541] FS: 000000c000180898 GS: 0000000000000000 [29611779.287122] potentially unexpected fatal signal 11. [29611779.293359] CPU: 61 PID: 893000 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29611779.306722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29611779.317367] RIP: 0033:0x561b29ff6f17 [29611779.321409] Code: 00 00 e9 8f e7 ff ff ba 01 00 00 00 e9 a9 ee ff ff 66 90 41 57 41 56 41 55 49 89 d5 41 54 55 53 48 89 fb 48 81 ec 18 05 00 00 <48> 89 74 24 08 89 4c 24 48 64 48 8b 04 25 28 00 00 00 48 89 84 24 [29611779.340564] RSP: 002b:00007ffa098b4c90 EFLAGS: 00010206 [29611779.347571] RAX: 00007ffa098b5500 RBX: 00007ffa098b51f0 RCX: 0000000000000000 [29611779.356474] RDX: 00007ffa098b5370 RSI: 0000561b2a08a6e5 RDI: 00007ffa098b51f0 [29611779.365406] RBP: 00007ffa098b52e0 R08: 0000000000000000 R09: 0000000000000000 [29611779.374287] R10: 0000000000001000 R11: 0000000000000293 R12: 0000561b2a08a6e5 [29611779.383250] R13: 00007ffa098b5370 R14: 0000000000000000 R15: 00007ffa098b51f0 [29611779.392167] FS: 0000561b2ac9d480 GS: 0000000000000000 [29613698.578717] potentially unexpected fatal signal 5. [29613698.583924] CPU: 32 PID: 951999 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29613698.595944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29613698.605578] RIP: 0033:0x7fffffffe062 [29613698.609620] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29613698.628836] RSP: 002b:000000c00067bb90 EFLAGS: 00000297 [29613698.635899] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29613698.644866] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29613698.653820] RBP: 000000c00067bc28 R08: 0000000000000000 R09: 0000000000000000 [29613698.662740] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00067bc18 [29613698.671677] R13: 000000c000016c00 R14: 000000c00025fa40 R15: 00000000000df017 [29613698.680616] FS: 000000c000472098 GS: 0000000000000000 [29615072.565579] exe[2143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5599de133c39 cs:33 sp:7f56e5e9b858 ax:0 si:5599de19e3df di:ffffffffff600000 [29615149.898393] exe[997430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a18115c39 cs:33 sp:7f2819590858 ax:0 si:558a181803df di:ffffffffff600000 [29615149.898405] exe[5679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a18115c39 cs:33 sp:7f281950c858 ax:0 si:558a181803df di:ffffffffff600000 [29618044.063338] exe[54993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c3c2cd3b7 cs:33 sp:7f70d68a8ef8 ax:54e00000 si:563c3c34c54e di:ffffffffff600000 [29619339.694463] exe[66133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dff2142c39 cs:33 sp:7ef898ecb858 ax:0 si:55dff21ad3aa di:ffffffffff600000 [29619595.583010] exe[126263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55db1d9b43b7 cs:33 sp:7efc8b5bfef8 ax:54e00000 si:55db1da3354e di:ffffffffff600000 [29620282.014095] exe[210308] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595196a7c39 cs:33 sp:7f31e9b88858 ax:0 si:5595197123aa di:ffffffffff600000 [29621817.023007] exe[311159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f390f1cc39 cs:33 sp:7eb7ecef4858 ax:0 si:55f390f873aa di:ffffffffff600000 [29622893.321128] exe[368057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fe1cefc39 cs:33 sp:7eeee63bf858 ax:0 si:560fe1d5a3aa di:ffffffffff600000 [29622986.439801] exe[346230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec5186ac39 cs:33 sp:7f09543fe858 ax:0 si:55ec518d53df di:ffffffffff600000 [29623001.441303] exe[316431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ddd1caec39 cs:33 sp:7ecc1d5e8858 ax:0 si:55ddd1d193aa di:ffffffffff600000 [29623064.344296] exe[376198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561341a13c39 cs:33 sp:7f066cadf858 ax:0 si:561341a7e3aa di:ffffffffff600000 [29623156.476335] exe[382718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56326fd33c39 cs:33 sp:7fca2d063858 ax:0 si:56326fd9e3aa di:ffffffffff600000 [29623346.599527] exe[413442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5618577abc39 cs:33 sp:7fdb9f09c858 ax:0 si:5618578163aa di:ffffffffff600000 [29623411.473052] exe[413518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf4d385c39 cs:33 sp:7f4373d86858 ax:0 si:55cf4d3f03aa di:ffffffffff600000 [29623411.918148] exe[406700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e8889ac39 cs:33 sp:7f11ed676858 ax:0 si:559e889053aa di:ffffffffff600000 [29623965.936123] exe[430763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fa5de05c39 cs:33 sp:7f7943aad858 ax:0 si:55fa5de703aa di:ffffffffff600000 [29623968.353511] exe[411360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565405cfac39 cs:33 sp:7f7d59b81858 ax:0 si:565405d653aa di:ffffffffff600000 [29624018.763807] exe[437473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d7f1b0c39 cs:33 sp:7f398182f858 ax:0 si:559d7f21b3aa di:ffffffffff600000 [29624021.394900] exe[417604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f9787fc39 cs:33 sp:7f89635bb858 ax:0 si:559f978ea3aa di:ffffffffff600000 [29624088.410583] exe[366757] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdcad1cc39 cs:33 sp:7ef3a717e858 ax:0 si:55cdcad873aa di:ffffffffff600000 [29624183.963716] exe[423320] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558eb22dbc39 cs:33 sp:7ecbd4784858 ax:0 si:558eb23463aa di:ffffffffff600000 [29624257.581856] exe[451898] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557581737c39 cs:33 sp:7fc83e90b858 ax:0 si:5575817a23aa di:ffffffffff600000 [29624273.937771] exe[442482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b222327c39 cs:33 sp:7f83bbbd7858 ax:0 si:55b2223923aa di:ffffffffff600000 [29624297.919897] exe[420951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d4ee33ac39 cs:33 sp:7f7c69adc858 ax:0 si:55d4ee3a53aa di:ffffffffff600000 [29624936.138198] potentially unexpected fatal signal 5. [29624936.143465] CPU: 24 PID: 493170 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29624936.155449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29624936.165072] RIP: 0033:0x7fffffffe062 [29624936.169039] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29624936.188254] RSP: 002b:000000c00004db08 EFLAGS: 00000297 [29624936.193887] RAX: 0000559fdaa41000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29624936.201502] RDX: 0000000000000001 RSI: 0000000000021000 RDI: 0000559fdaa41000 [29624936.210411] RBP: 000000c00004db90 R08: 0000000000000009 R09: 00000000081c2000 [29624936.219344] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004da50 [29624936.226892] R13: 000000c000181008 R14: 000000c00037d6c0 R15: 0000000000077f90 [29624936.235868] FS: 00007f8fbffff6c0 GS: 0000000000000000 [29625472.631295] exe[419678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56123a3123b7 cs:33 sp:7f0093507ef8 ax:54e00000 si:56123a39154e di:ffffffffff600000 [29625805.201209] exe[530193] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3783a3c39 cs:33 sp:7f1a7ffdd858 ax:0 si:55b37840e3b8 di:ffffffffff600000 [29626333.175100] exe[554430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564765759c39 cs:33 sp:7f13a43f8858 ax:0 si:5647657c43b8 di:ffffffffff600000 [29626368.915992] potentially unexpected fatal signal 11. [29626368.921327] CPU: 13 PID: 554822 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29626368.933339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29626368.943162] RIP: 0033:0x56319c102bfb [29626368.947284] Code: ea 12 00 48 8d 34 19 48 39 d5 48 89 75 60 0f 95 c2 48 29 d8 48 83 c1 10 0f b6 d2 48 83 c8 01 48 c1 e2 02 48 09 da 48 83 ca 01 <48> 89 51 f8 48 89 46 08 eb 80 48 8d 0d 11 5e 09 00 48 8d 15 15 70 [29626368.966519] RSP: 002b:00007f1e557762f0 EFLAGS: 00010206 [29626368.973567] RAX: 00000000000187f1 RBX: 0000000000008040 RCX: 000056319cd977e0 [29626368.982550] RDX: 0000000000008041 RSI: 000056319cd9f810 RDI: 0000000000000004 [29626368.991498] RBP: 000056319c231660 R08: 0000000035050721 R09: 0000000000000050 [29626369.000468] R10: 0000000000001000 R11: 0000000000000802 R12: 0000000000008030 [29626369.009440] R13: 0000000000000076 R14: 000056319c2316c0 R15: 0000000000000000 [29626369.018368] FS: 000056319cd96480 GS: 0000000000000000 [29628502.915596] exe[662942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55788d90a3b7 cs:33 sp:7efdd468eef8 ax:54e00000 si:55788d98954e di:ffffffffff600000 [29630556.547144] exe[763465] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e8d04ac39 cs:33 sp:7f2186849858 ax:0 si:564e8d0b53df di:ffffffffff600000 [29631710.447151] potentially unexpected fatal signal 5. [29631710.452366] CPU: 10 PID: 797230 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29631710.464339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29631710.474029] RIP: 0033:0x7fffffffe062 [29631710.478064] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29631710.497393] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [29631710.504496] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29631710.513393] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29631710.520970] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [29631710.529908] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000029c18 [29631710.538855] R13: 000000c000002c00 R14: 000000c0001aae00 R15: 00000000000c095b [29631710.547780] FS: 0000000002065bf0 GS: 0000000000000000 [29633174.495188] exe[871174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d33669ac39 cs:33 sp:7fc62c981858 ax:0 si:55d3367053aa di:ffffffffff600000 [29633212.659395] exe[742791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4d48a97c1 cs:33 sp:7ee4cc8524c8 ax:8 si:1 di:7ee4cc8525c0 [29633463.556949] exe[843237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aab61897c1 cs:33 sp:7eb8674304c8 ax:8 si:1 di:7eb8674305c0 [29634474.039836] exe[941426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a444c73b7 cs:33 sp:7f7ce5da6ef8 ax:54e00000 si:558a4454654e di:ffffffffff600000 [29634590.686770] exe[957828] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56537d8c0c39 cs:33 sp:7f21815ac858 ax:0 si:56537d92b3df di:ffffffffff600000 [29636504.787320] potentially unexpected fatal signal 5. [29636504.792541] CPU: 94 PID: 49409 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29636504.804522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29636504.814150] RIP: 0033:0x7fffffffe062 [29636504.818148] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29636504.837783] RSP: 002b:000000c0002cdb90 EFLAGS: 00000297 [29636504.844798] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29636504.853732] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29636504.861307] RBP: 000000c0002cdc28 R08: 0000000000000000 R09: 0000000000000000 [29636504.870249] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0002cdc18 [29636504.879180] R13: 000000c0002c1a70 R14: 000000c0004bf500 R15: 000000000000bb76 [29636504.888095] FS: 0000000002065bf0 GS: 0000000000000000 [29637756.276249] exe[112833] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560faaec63b7 cs:33 sp:7ed61ac6fef8 ax:54e00000 si:560faaf4554e di:ffffffffff600000 [29638093.325933] exe[114762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acf6cc39 cs:33 sp:7fa988a27858 ax:0 si:5636acfd73aa di:ffffffffff600000 [29638174.458535] potentially unexpected fatal signal 5. [29638174.464424] CPU: 43 PID: 145526 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29638174.477921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29638174.488973] RIP: 0033:0x7fffffffe062 [29638174.494290] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29638174.514858] RSP: 002b:000000c00077dbe8 EFLAGS: 00000297 [29638174.521989] RAX: 0000560da37c1000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29638174.531010] RDX: 0000000000000001 RSI: 0000000000021000 RDI: 0000560da37c1000 [29638174.540137] RBP: 000000c00077dc80 R08: 0000000000000009 R09: 0000000007c75000 [29638174.549329] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00077dc70 [29638174.558235] R13: 000000c000423000 R14: 000000c00047b6c0 R15: 00000000000233d4 [29638174.567311] FS: 000000c00013a898 GS: 0000000000000000 [29646626.015992] potentially unexpected fatal signal 5. [29646626.021196] CPU: 87 PID: 426755 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29646626.033209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29646626.042834] RIP: 0033:0x7fffffffe062 [29646626.046840] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29646626.066034] RSP: 002b:000000c00004db08 EFLAGS: 00000297 [29646626.073027] RAX: 00007f75987dd000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29646626.081942] RDX: 0000000000000001 RSI: 0000000000002000 RDI: 00007f75987dd000 [29646626.090879] RBP: 000000c00004db90 R08: 0000000000000009 R09: 0000000000ffd000 [29646626.099815] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00004da50 [29646626.108731] R13: 0000000002d50280 R14: 000000c00017c380 R15: 0000000000067fe6 [29646626.117652] FS: 00000000057553c0 GS: 0000000000000000 [29646834.281602] exe[372186] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f9aaec3db38 ax:0 si:7f9aaec3dc70 di:19 [29647222.869322] exe[371157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c934ceac39 cs:33 sp:7f9fc31d6858 ax:0 si:55c934d553b8 di:ffffffffff600000 [29647223.528178] exe[365622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c934ceac39 cs:33 sp:7f9fc31d6858 ax:0 si:55c934d553b8 di:ffffffffff600000 [29647224.158419] exe[371157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b01f852c39 cs:33 sp:7f23100b2858 ax:0 si:55b01f8bd3b8 di:ffffffffff600000 [29647224.963939] exe[377240] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55795b7a3c39 cs:33 sp:7f45a1290858 ax:0 si:55795b80e3b8 di:ffffffffff600000 [29647225.447708] exe[425674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b01f852c39 cs:33 sp:7f23100b2858 ax:0 si:55b01f8bd3b8 di:ffffffffff600000 [29648052.434992] exe[457688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cbeff41c39 cs:33 sp:7fc0daea1858 ax:0 si:55cbeffac3aa di:ffffffffff600000 [29651160.370546] exe[535070] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646aa3bcc39 cs:33 sp:7f770f874858 ax:0 si:5646aa4273b8 di:ffffffffff600000 [29651160.976521] exe[526341] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646aa3bcc39 cs:33 sp:7f770f874858 ax:0 si:5646aa4273b8 di:ffffffffff600000 [29651161.390429] exe[507914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558998323c39 cs:33 sp:7fc5c925a858 ax:0 si:55899838e3b8 di:ffffffffff600000 [29651161.942042] exe[498781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558998323c39 cs:33 sp:7fc5c925a858 ax:0 si:55899838e3b8 di:ffffffffff600000 [29651162.557345] exe[581368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646aa3bcc39 cs:33 sp:7f770f874858 ax:0 si:5646aa4273b8 di:ffffffffff600000 [29657277.967019] exe[722367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a9e29b0c39 cs:33 sp:7fcbe7da2858 ax:0 si:55a9e2a1b3aa di:ffffffffff600000 [29657593.980730] potentially unexpected fatal signal 5. [29657593.985957] CPU: 58 PID: 749154 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29657593.997976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29657594.007828] RIP: 0033:0x7fffffffe062 [29657594.011860] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29657594.031165] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [29657594.036788] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29657594.044335] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29657594.053253] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [29657594.060785] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000029c18 [29657594.068312] R13: 000000c00002ec00 R14: 000000c000165880 R15: 00000000000b5d61 [29657594.077258] FS: 000000c00013a898 GS: 0000000000000000 [29657868.436361] exe[713873] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ed5c52c2b38 ax:0 si:7ed5c52c2c70 di:19 [29658048.389103] exe[695183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd4b648c39 cs:33 sp:7eee7fc4d858 ax:0 si:55fd4b6b33aa di:ffffffffff600000 [29659071.064236] exe[711059] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ff752470b38 ax:0 si:7ff752470c70 di:19 [29659391.445146] exe[725609] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f724828ab38 ax:0 si:7f724828ac70 di:19 [29659456.106619] exe[720457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563859615c39 cs:33 sp:7ff5dd8a8858 ax:0 si:5638596803aa di:ffffffffff600000 [29659757.249357] exe[756761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee8904fc39 cs:33 sp:7fec2393f858 ax:0 si:55ee890ba3aa di:ffffffffff600000 [29660029.263177] exe[817757] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e64f7cc39 cs:33 sp:7f4d14ebaef8 ax:0 si:20000000 di:ffffffffff600000 [29660103.156485] exe[824147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557acb55bc39 cs:33 sp:7f6fbc942ef8 ax:0 si:20000000 di:ffffffffff600000 [29660347.730587] exe[822560] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f97c2ec39 cs:33 sp:7f8fc2b04858 ax:0 si:557f97c993aa di:ffffffffff600000 [29660484.940013] exe[841033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c0b32bc39 cs:33 sp:7f58c16cc858 ax:0 si:560c0b3963b8 di:ffffffffff600000 [29663355.569820] exe[932248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f20a8a93b7 cs:33 sp:7fcf8e3feef8 ax:54e00000 si:55f20a92854e di:ffffffffff600000 [29664791.239725] exe[988925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a310e25c39 cs:33 sp:7f46f0497858 ax:0 si:55a310e903df di:ffffffffff600000 [29664916.298010] exe[882561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605d431c3b7 cs:33 sp:7ef1ad75fef8 ax:54e00000 si:5605d439b54e di:ffffffffff600000 [29664952.006992] exe[988945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d497482c39 cs:33 sp:7f0165ac2858 ax:0 si:55d4974ed3df di:ffffffffff600000 [29665221.831544] exe[3007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e659d97c39 cs:33 sp:7eec0feb4ef8 ax:0 si:20000340 di:ffffffffff600000 [29665343.484568] exe[998172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f755be2c39 cs:33 sp:7f7ec9f3eef8 ax:0 si:200012c0 di:ffffffffff600000 [29665570.930435] exe[950073] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c977cdc39 cs:33 sp:7f9df53fb858 ax:0 si:564c978383aa di:ffffffffff600000 [29665925.370141] exe[939134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ca5ab6c39 cs:33 sp:7ed99f290858 ax:0 si:558ca5b213aa di:ffffffffff600000 [29666562.109521] exe[936503] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f48f2a6c39 cs:33 sp:7f8da919f858 ax:0 si:55f48f3113aa di:ffffffffff600000 [29668428.756758] exe[125183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d39676c39 cs:33 sp:7fadaecf0858 ax:0 si:557d396e13aa di:ffffffffff600000 [29670607.664294] exe[223642] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eee699ac39 cs:33 sp:7f694a266858 ax:0 si:55eee6a053aa di:ffffffffff600000 [29671993.933713] potentially unexpected fatal signal 5. [29671993.938930] CPU: 13 PID: 294971 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29671993.950930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29671993.960560] RIP: 0033:0x7fffffffe062 [29671993.964595] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29671993.983781] RSP: 002b:000000c00061fb90 EFLAGS: 00000297 [29671993.990798] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29671993.999723] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29671994.008648] RBP: 000000c00061fc28 R08: 0000000000000000 R09: 0000000000000000 [29671994.017514] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00061fc18 [29671994.026464] R13: 000000c00062c0c0 R14: 000000c0002f8700 R15: 0000000000046f70 [29671994.035343] FS: 0000000002065bf0 GS: 0000000000000000 [29672855.139323] exe[331108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad7196bc39 cs:33 sp:7f939b76b858 ax:0 si:55ad719d63aa di:ffffffffff600000 [29674889.261389] potentially unexpected fatal signal 5. [29674889.266694] CPU: 1 PID: 481038 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29674889.278578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29674889.288214] RIP: 0033:0x7fffffffe062 [29674889.292214] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29674889.311595] RSP: 002b:000000c000021b90 EFLAGS: 00000297 [29674889.318568] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29674889.327575] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29674889.336502] RBP: 000000c000021c28 R08: 0000000000000000 R09: 0000000000000000 [29674889.345605] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000021c18 [29674889.354531] R13: 000000c00002ac00 R14: 000000c0002f7180 R15: 00000000000751cd [29674889.363442] FS: 000000c00013b098 GS: 0000000000000000 [29676793.611768] potentially unexpected fatal signal 5. [29676793.616964] CPU: 81 PID: 545894 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29676793.628942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29676793.638571] RIP: 0033:0x7fffffffe062 [29676793.642556] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29676793.661740] RSP: 002b:000000c00002bb90 EFLAGS: 00000297 [29676793.667367] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29676793.674929] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29676793.682483] RBP: 000000c00002bc28 R08: 0000000000000000 R09: 0000000000000000 [29676793.690046] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00002bc18 [29676793.697613] R13: 000000c000138c00 R14: 000000c00025e540 R15: 0000000000084f77 [29676793.705156] FS: 000000c00013a898 GS: 0000000000000000 [29677541.515256] exe[603297] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa57fd8c39 cs:33 sp:7fabb03b8858 ax:0 si:55aa580433aa di:ffffffffff600000 [29677556.257109] exe[631404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d28545c39 cs:33 sp:7f09c02fc858 ax:0 si:562d285b03aa di:ffffffffff600000 [29677593.684138] exe[630505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55968fa3ec39 cs:33 sp:7f5bcf4d4858 ax:0 si:55968faa93aa di:ffffffffff600000 [29677630.461574] exe[627475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556cc18f4c39 cs:33 sp:7f84495c7858 ax:0 si:556cc195f3aa di:ffffffffff600000 [29677634.286074] exe[633007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da66b20c39 cs:33 sp:7ee49a6e9858 ax:0 si:55da66b8b3aa di:ffffffffff600000 [29677895.473665] exe[646377] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b66df8cc39 cs:33 sp:7f752a7a3858 ax:0 si:55b66dff73aa di:ffffffffff600000 [29677971.588601] exe[644598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c4fd4fc39 cs:33 sp:7ef1f9827858 ax:0 si:561c4fdba3aa di:ffffffffff600000 [29677983.923169] exe[658052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c20ac69c39 cs:33 sp:7fd3beb7d858 ax:0 si:55c20acd43aa di:ffffffffff600000 [29678133.985097] exe[629994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac7c0ccc39 cs:33 sp:7eee5a29d858 ax:0 si:55ac7c1373aa di:ffffffffff600000 [29681568.978216] potentially unexpected fatal signal 11. [29681568.983569] CPU: 12 PID: 840723 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29681568.995571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29681569.005229] RIP: 0033:0x558093b27bdb [29681569.009262] Code: e9 ff ff 48 89 c1 48 85 c0 75 c9 e9 6d f8 ff ff 48 8d 3d 00 6c 09 00 e8 43 c7 ff ff 48 8d 15 8c ea 12 00 48 8d 34 19 48 39 d5 <48> 89 75 60 0f 95 c2 48 29 d8 48 83 c1 10 0f b6 d2 48 83 c8 01 48 [29681569.029865] RSP: 002b:00007fe63ebeb2f0 EFLAGS: 00010246 [29681569.036856] RAX: 0000000000020830 RBX: 0000000000008040 RCX: 00005580947bc7d0 [29681569.045805] RDX: 0000558093c56660 RSI: 00005580947c4810 RDI: 0000000000000004 [29681569.054725] RBP: 0000558093c56660 R08: 000000000fc78e40 R09: 000000000000000e [29681569.063647] R10: 0000000000001000 R11: 0000000000000802 R12: 0000000000008030 [29681569.072573] R13: 0000000000000076 R14: 0000558093c566c0 R15: 0000000000000000 [29681569.081510] FS: 00005580947bb480 GS: 0000000000000000 [29682660.134796] potentially unexpected fatal signal 5. [29682660.140043] CPU: 60 PID: 897750 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [29682660.152017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [29682660.161658] RIP: 0033:0x7fffffffe062 [29682660.165695] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [29682660.186239] RSP: 002b:000000c000623b90 EFLAGS: 00000297 [29682660.191906] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [29682660.199462] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [29682660.208376] RBP: 000000c000623c28 R08: 0000000000000000 R09: 0000000000000000 [29682660.215910] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000623c18 [29682660.224842] R13: 000000c0005fe150 R14: 000000c00047b500 R15: 00000000000d8c59 [29682660.233764] FS: 0000000002065bf0 GS: 0000000000000000 [29682674.093958] exe[881989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fad08fc39 cs:33 sp:7f1d1f347858 ax:0 si:559fad0fa3aa di:ffffffffff600000 [29684108.286285] exe[991146] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f11fabc9b38 ax:0 si:7f11fabc9c70 di:19 [29684108.601379] exe[991075] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f0138151b38 ax:0 si:7f0138151c70 di:19 [29684108.712265] exe[989486] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f73ff4cfb38 ax:0 si:7f73ff4cfc70 di:19 [29684108.813150] exe[998263] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f73ff4cfb38 ax:0 si:7f73ff4cfc70 di:19 [29684108.935949] exe[991115] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f73ff4cfb38 ax:0 si:7f73ff4cfc70 di:19 [29684382.151435] exe[991834] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f5f1a870b38 ax:0 si:7f5f1a870c70 di:19 [29684382.293170] exe[991305] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f5f1a870b38 ax:0 si:7f5f1a870c70 di:19 [29684382.433873] exe[981426] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f5f1a870b38 ax:0 si:7f5f1a870c70 di:19 [29684382.560849] exe[991313] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f5f1a870b38 ax:0 si:7f5f1a870c70 di:19 [29684382.698361] exe[991310] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f5f1a870b38 ax:0 si:7f5f1a870c70 di:19 [29684746.924323] exe[990622] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7edab634db38 ax:0 si:7edab634dc70 di:19 [29684747.970537] exe[968723] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7edfd83eab38 ax:0 si:7edfd83eac70 di:19 [29684748.995741] exe[968723] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7edfd83eab38 ax:0 si:7edfd83eac70 di:19 [29684749.796015] exe[968723] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7edfd83eab38 ax:0 si:7edfd83eac70 di:19 [29684750.589124] exe[968723] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7edfd83eab38 ax:0 si:7edfd83eac70 di:19 [29684768.073540] exe[975757] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f4412da7b38 ax:0 si:7f4412da7c70 di:19 [29684768.743402] exe[976291] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f4412da7b38 ax:0 si:7f4412da7c70 di:19 [29684796.117038] exe[998619] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd3b717bb38 ax:0 si:7fd3b717bc70 di:19 [29684864.825364] exe[996814] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f4a35ca3b38 ax:0 si:7f4a35ca3c70 di:19 [29684865.665167] exe[884] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f4a35ca3b38 ax:0 si:7f4a35ca3c70 di:19 [29684866.541681] exe[995005] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f4a35ca3b38 ax:0 si:7f4a35ca3c70 di:19 [29684867.404067] exe[884] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f4a35ca3b38 ax:0 si:7f4a35ca3c70 di:19 [29684868.254545] exe[996807] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f4a35ca3b38 ax:0 si:7f4a35ca3c70 di:19 [29685029.142765] exe[992220] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd8d1f85b38 ax:0 si:7fd8d1f85c70 di:19 [29685029.267244] exe[2350] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fbbed522b38 ax:0 si:7fbbed522c70 di:19 [29685029.490878] exe[995943] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fa5ce14bb38 ax:0 si:7fa5ce14bc70 di:19 [29685029.633378] exe[998143] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fa5ce14bb38 ax:0 si:7fa5ce14bc70 di:19 [29685029.776236] exe[991097] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fa5ce14bb38 ax:0 si:7fa5ce14bc70 di:19 [29685858.025663] exe[999187] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f5359febb38 ax:0 si:7f5359febc70 di:19 [29685858.195915] exe[4736] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f5359febb38 ax:0 si:7f5359febc70 di:19 [29685858.347711] exe[999177] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f5359febb38 ax:0 si:7f5359febc70 di:19 [29685858.530232] exe[999187] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f5359febb38 ax:0 si:7f5359febc70 di:19 [29685858.664786] exe[999171] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f5359febb38 ax:0 si:7f5359febc70 di:19 [29686540.757047] exe[997499] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ee6ac3feb38 ax:0 si:7ee6ac3fec70 di:19 [29686540.832715] exe[4890] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ee6ac3feb38 ax:0 si:7ee6ac3fec70 di:19 [29686541.776914] exe[4890] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ee6ac3feb38 ax:0 si:7ee6ac3fec70 di:19 [29686542.031485] exe[997499] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ee6ac3feb38 ax:0 si:7ee6ac3fec70 di:19 [29686542.115866] exe[997499] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ee6ac3feb38 ax:0 si:7ee6ac3fec70 di:19 [29687238.011707] exe[963949] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd3b6fb0b38 ax:0 si:7fd3b6fb0c70 di:19 [29687239.035165] exe[963949] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd3b6fb0b38 ax:0 si:7fd3b6fb0c70 di:19 [29687240.236365] exe[9197] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd3b6fb0b38 ax:0 si:7fd3b6fb0c70 di:19 [29687241.246130] exe[997152] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd3b6fb0b38 ax:0 si:7fd3b6fb0c70 di:19 [29687242.280480] exe[13830] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7fd3b6fb0b38 ax:0 si:7fd3b6fb0c70 di:19 [29687777.197252] exe[36344] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558de3909db9 cs:33 sp:7ebfc57a2858 ax:0 si:558de39743aa di:ffffffffff600000 [29688060.500529] exe[37656] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b423111db9 cs:33 sp:7fc7a8099858 ax:0 si:55b42317c3aa di:ffffffffff600000 [29688095.496022] exe[37984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c2e66bdb9 cs:33 sp:7fc52378b858 ax:0 si:558c2e6d63aa di:ffffffffff600000 [29688221.856981] exe[41648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a90e8dedb9 cs:33 sp:7fc0a2692858 ax:0 si:55a90e9493aa di:ffffffffff600000 [29688628.483837] exe[40333] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7ebfa5bc7b38 ax:0 si:7ebfa5bc7c70 di:19 [29688886.775904] exe[32110] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f17c02c0b38 ax:0 si:7f17c02c0c70 di:19 [29689077.439435] exe[38229] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:7f6e21221b38 ax:0 si:7f6e21221c70 di:19